U.S. poised to sue contractors who don’t report cyber breaches

  • Comments
  • Print
Listen to this story

Subscriber Benefit

As a subscriber you can listen to articles at work, in the car, or while you work out. Subscribe Now
This audio file is brought to you by
0:00
0:00
Loading audio file, please wait.
  • 0.25
  • 0.50
  • 0.75
  • 1.00
  • 1.25
  • 1.50
  • 1.75
  • 2.00

The Justice Department is poised to sue government contractors and other companies who receive U.S. government grants if they fail to report breaches of their computer systems or misrepresent their cybersecurity practices, the department’s No. 2 official said Wednesday.

Deputy Attorney General Lisa Monaco said the department is prepared to take action under a statute called the False Claims Act that permits the government to file lawsuits over misused federal funds. The Justice Department will also protect whistleblowers who come forward to report those issues, she said.

“For too long, companies have chosen silence under the mistaken belief that it’s less risky to hide a breach than to bring it forward and to report it. Well, that changes today,” Monaco said.

The action, unveiled at the Aspen Cyber Summit, is aimed at contractors who fail to report hacks or who knowingly provide deficient cybersecurity products. It’s an outgrowth of an ongoing Justice Department cyber policy review, and is also part of a broader Biden administrative effort to incentivize contractors and private companies to share information with the government about breaches and to bolster their own cybersecurity defenses.

Officials have repeatedly spoken of the need for better private-sector engagement as the government confronts a surge in ransomware attacks that in the last year have targeted critical infrastructure and major corporations.

The measure underscores the extent to which the government views cyberattacks as not just harmful to an individual company but also to the American public in general, especially given recent attacks against a major fuel pipeline and meat processor.

“Where those who are entrusted with government dollars, who are entrusted to work on sensitive government systems, fail to follow required cybersecurity standards, we’re going to go after that behavior and extract very hefty fines,” Monaco said.

Monaco also announced the creation of a new cryptocurrency enforcement team within the department—drawing from experts in cybersecurity and money laundering—aimed at destabilizing the financial ecosystem that drives ransomware attacks and the criminal hacking gangs behind them.

The action follows Treasury Department sanctions last month against a Russia-based virtual currency brokerage that officials say helped at least eight ransomware gangs launder virtual currency.

Monaco’s appearance came hours after the publication of a CNBC opinion piece in which she urged Congress to pass legislation creating a national standard for the reporting of significant cyber incidents so that information about digital attacks can be quickly disseminated across the federal government.

Most breaches, she wrote, are not reported to law enforcement.

“The current gap in reporting hinders the government’s ability to combat not just the ransomware threat, but all cybercriminal activity,” Monaco wrote. “It means we go at it alone, without key insights from our partners in the private sector, and it needs to change, today.”

Separately, Homeland Security Secretary Alejandro Mayorkas said Wednesday that new regulations are coming for railroads and transit entities.

Mayorkas said the Transportation Security Administration this year will issue a security directive that will require railroads and transit entities to comply with new regulations similar to ones issued in May for pipeline operators following the Colonial Pipeline hack that disrupted gas supplies in several states.

What the secretary called “higher risk” railroads and transit entities will be required to identify a cyber security point person, report incidents to the Cybersecurity and Infrastructure Security Agency and develop a contingency and recovery plan in case of malicious cyber activity.

Those deemed “low risk” will be subjected to guidance that “encourages” them to take those measures but don’t require it, Mayorkas said in remarks to the Billington Cybersecurity Summit.

He did not specify which railroads or transit entities were in either category.

Please enable JavaScript to view this content.

Story Continues Below

Editor's note: You can comment on IBJ stories by signing in to your IBJ account. If you have not registered, please sign up for a free account now. Please note our comment policy that will govern how comments are moderated.

Get the best of Indiana business news. ONLY $1/week Subscribe Now

Get the best of Indiana business news. ONLY $1/week Subscribe Now

Get the best of Indiana business news. ONLY $1/week Subscribe Now

Get the best of Indiana business news. ONLY $1/week Subscribe Now

Get the best of Indiana business news.

Limited-time introductory offer for new subscribers

ONLY $1/week

Cancel anytime

Subscribe Now

Already a paid subscriber? Log In

Get the best of Indiana business news.

Limited-time introductory offer for new subscribers

ONLY $1/week

Cancel anytime

Subscribe Now

Already a paid subscriber? Log In

Get the best of Indiana business news.

Limited-time introductory offer for new subscribers

ONLY $1/week

Cancel anytime

Subscribe Now

Already a paid subscriber? Log In

Get the best of Indiana business news.

Limited-time introductory offer for new subscribers

ONLY $1/week

Cancel anytime

Subscribe Now

Already a paid subscriber? Log In