
Reflecting on President Trump’s first 100 days in office
Australia has implemented a first-of-its kind requirement for eligible businesses to report ransomware payments. From 30 May 2025, eligible businesses that make a payment in response to a cyber security incident, or become aware of a payment being made on their behalf, must report this information to the Australian Signals Directorate (ASD).
This requirement under the Cyber Security Act 2024 aims to increase transparency in the management of a crime that is increasingly impacting Australian businesses and the general public. The high-profile nature of recent cyberattacks involving Australians’ data means that there is increasing scrutiny on the response of businesses to these attacks, including any decisions to pay ransoms.
A cyber security incident includes the unauthorised impairment of electronic communication to or from a computer, including the interception of this communication. If a payment is made in response to such an incident, including where the incident has already happened or is imminent, then eligible businesses are required to report this payment. Businesses will be required to make a report if they:
A business does not necessarily have to be Australian-based or owned to ‘carry on business’ in Australia. Rather, if they have any business operations that occur in Australia, and have an annual turnover of AUD 3 million or more, they may be required to report a ransomware payment.
Within 72 hours of either making a ransomware payment or becoming aware of the payment, the business must submit a report on the ASD Government website.
This report must include:
Importantly, ‘payment’ includes any non-monetary benefits given to the extorting entity. This may include the exchange of gifts, services, or other benefits.
While the law does not make ransomware payments themselves illegal, failure to report any such payments can lead to a penalty of up to 60 penalty units (currently this is AUD19,800). The Department of Home Affairs (Department) has indicated that the first six months (30 May 2025 to 31 December 2025) will be characterised by an ‘education first’ approach. During this period, regulatory action will only be pursued where there have been cases of egregious non-compliance.
From 1 January 2026 onwards, however, the Department will take a more active regulatory focus and will publish further guidance on the regime taking into account feedback from the initial six months of its operation.
Businesses need to take proactive steps to ensure that they are equipped to deal with any cyberattack in a manner consistent with the new regime.
This will include determining whether they meet the eligibility thresholds and updating their cyber incident response plans to include the new reporting requirements. Training employees to identify and escalate ransomware incidents quickly is also essential as is having clear procedures in place that are understood and can be easily followed.
In any event, aligning your incident response with the new reporting requirements in Australia will likely leave your business in good stead should other jurisdictions decide to follow Australia’s lead and introduce similar requirements. As the technological capabilities of would-be cyber attackers continue to advance, it is clear that this is an area that will continue to be the subject of regulatory and public focus going forward. It is critical that businesses adequately prepare themselves to deal with this scrutiny.
Should you require any assistance, feel free to reach out to the authors or your usual Hogan Lovells contact.
Authored by Charmian Aw and Paris Buti.