State Dept. to Pay Up to $10M for Information on Foreign CyberattacksState Dept. to Pay Up to $10M for Information on Foreign Cyberattacks
The Rewards for Justice program, a counterterrorism tool, is now aimed at collecting information on nation-states that use hackers to disrupt critical infrastructure.
July 15, 2021
The United States will pay up to $10 million for information on cyberattacks against critical infrastructure that violate the nation's anti-hacking statute, the Computer Fraud and Abuse Act (CFAA), and that are carried out "at the direction or under the control of a foreign government," the US Department of State announced on July 15.
The State Department's Rewards for Justice office will run the program, operating a Tor-based tip channel to receive information on potential foreign-directed hacking and sifting through information with a number of other government partners. The agency listed ransomware extortion, hacking or exceeding authorization on any protected computers, and transmitting malicious code as potential violations that — if conducted by a foreign agent — would constitute a relevant cyber threat.
The fund will pay up to $10 million "for information leading to the identification or location of any person who, while acting at the direction or under the control of a foreign government, participates in malicious cyber activities against U.S. critical infrastructure," the State Department said in a statement.
The bounty offer comes as cyberattacks against US and European infrastructure and companies have ratcheted up. In early May, oil and gas transport network Colonial Pipeline paid $4.4 million to recover from a ransomware attack that had disrupted pipeline operations for more than a week, leading to gas shortages in the southeastern United States. In late May, meat producer JBS USA acknowledged that the company had been hit with a ransomware attack, delaying food shipments. And on July 2, Russia-linked ransomware group REvil launched an attack on a zero-day vulnerability in Kaseya Virtual System Administrator (VSA) servers used by many managed service providers, affecting more than 1,500 businesses.
The US government has made responding to the attacks a priority, with the Biden administration putting pressure on Russian President Vladimir Putin to act. The State Department's offer to pay for leads and evidence linking countries to serious cyberattacks could make taking action against bad actors easier, Mike Hamilton, founder and chief information security officer at Critical Insight, says in a statement sent to Dark Reading.
"It appears to be an attempt to short-cut the process of detailed attribution that is necessary to implicate a foreign government in collusion or cooperation with organized crime," he says. "If the US government can incentivize someone to provide evidence of such, paying out $10 million is probably a good deal considering the resources we bring to bear with the intelligence community for the same outcome."
However, the approach also has significant downsides. While the reward program will likely produce leads, sifting through those leads to find verifiable evidence will consume a great deal of resources, Austin Berglas, global head of professional services at cybersecurity services firm BlueVoyant and a former FBI assistant special agent in charge of the New York Office Cyber Branch, says in a statement sent to Dark Reading.
"The difficulty is the amount of resources that will be necessary to separate the 'signal' from the 'noise' and identify the legitimate tips," he says, adding that "if there was an arrest made and follow-on prosecution — based on an anonymous lead — investigators will have to be able to provide evidence of the crimes alleged by the anonymous party."
He also says that such offers could produce dissension in the ransomware community with rival groups trying to get information on each other, potentially reducing competition. Yet in many cases, the members of those groups will be in countries that will not extradite them, Berglas says.
"[W]e still have to overcome the safe harbor provided by Russia and others," he says. "There are numerous existing cases where warrants are obtained and red notices are disseminated for criminals residing in these countries."
The US government has already issued indictments for hacking against 12 Russian nationals for their operations interfering the US elections and against another six Russian military officers for a variety of attacks, including disrupting Ukraine's power grid and the NotPetya ransomware attack. None of those indicted have been delivered to the United States to stand trial.
The State Department Rewards for Justice program is not new. Since 1984, the program has paid more than $200 million to more than 100 people worldwide who provided information on terrorist threats and threats to national security, according to the State Department.
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
Passwords Are Passe: Next Gen Authentication Addresses Today's Threats
What Ransomware Groups Look for in Enterprise Victims
Concerns Mount Over Ransomware, Zero-Day Bugs, and AI-Enabled Malware
Everything You Need to Know About DNS Attacks
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks