Pay the ransom?

Ransomware payment is widely misunderstood. Insurance companies do not simply pay ransoms, and there is no independent broker that removes decision-making or liability from the organization. In practice, payment involves coordinated decision-making across the board, legal counsel, insurers, and specialized incident response firms — all under extreme time pressure. This post breaks down how ransomware payment actually works and why preparation is a governance issue, not a technical one.

This is where many boards have a misconception.

While there are specialized firms that facilitate ransomware payments, there is no broker that removes decision-making, liability, or regulatory risk from the company.

In practice, payment works like this:

  • The company decides whether to pay

  • Insurance constrains what is covered, when, and through whom

  • Specialized incident-response firms facilitate execution

  • Legal counsel oversees sanctions, compliance, and disclosure

The company always:

  • Provides the funds (directly or via reimbursement)

  • Retains legal and regulatory responsibility

  • Owns the outcome of the decision

Insurance companies:

  • Do not wire money

  • Do not hold cryptocurrency

  • Do not communicate with attackers

They approve coverage and require the use of pre-approved partners.

If a board’s answer to “Would we pay?” is “Depends” or “Yes,” then one governance step is unavoidable:

The organization should have a pre-established relationship with a qualified ransomware response firm.

Not to plan for payment — but to ensure:

  • Decision-making doesn’t happen in chaos

  • Legal and insurance requirements are understood in advance

  • Execution, if ever authorized, is controlled and compliant

Common firms boards may encounter in this role include:

  • Coveware

  • Arete Incident Response

  • GuidePoint Security

  • GroupSense

  • Kivu Consulting

Having these relationships in place doesn’t commit a company to paying. It ensures the board retains control, speed, and optionality if pressure forces a decision.

One important and often overlooked risk

Ransomware payment can create legal exposure if the recipient is a sanctioned entity. In the U.S., the Treasury Department’s Office of Foreign Assets Control (OFAC) prohibits payments to individuals, groups, or organizations on sanctions lists, which can include terrorist organizations, nation-state actors, or affiliated criminal groups. Even when a company is acting under duress, intent does not eliminate liability. This is why sanctions screening, legal oversight, and insurer-approved response partners are required before any payment is considered — and why ransomware payment is not simply a financial decision, but a regulated activity with potential civil and criminal consequences.

Coming next

Rather than debating payment in the abstract, the better question is whether the organization actually has the controls in place to support a “yes” or confidently stand behind a “no.” In the next post, I’ll share a simple board-level tool designed to assess ransomware readiness across recovery capability, downtime tolerance, regulatory exposure, and business continuity. The goal isn’t to tell boards what decision to make — it’s to make sure the decision, whichever way it goes, is grounded in reality rather than assumptions.

RELATED POSTS

Discover more from Stasiak

Subscribe now to keep reading and get access to the full archive.

Continue reading

[mailpoet_form id="5"]
[mailpoet_form id="1"]