Changeflow GovPing Courts & Legal ABA Panel: AI Empowers Cybercriminals in Ransom...
Routine Notice Added Final

ABA Panel: AI Empowers Cybercriminals in Ransomware Attacks

Favicon for www.americanbar.org ABA Legal News
Detected
Email

Summary

An ABA Science & Technology Law Section panel discussion examined how AI enables cybercriminals to execute ransomware attacks more efficiently, allowing data exfiltration within hours while victims may take over 200 days to notice. The panel advised companies to prepare incident response plans in advance, retain forensic and negotiation firms proactively, and verify whether threat actors appear on the OFAC sanctions list before considering any ransom payment, since companies face strict liability for payments to sanctioned groups.

“If the cybercriminals are on the OFAC sanctions list, companies will be held strictly liable.”

ABA , verbatim from source
Why this matters

Organizations should confirm their incident response plans include a step to verify whether ransom-demanding threat actors appear on the OFAC sanctions list before any payment discussion. The strict liability exposure for paying sanctioned groups applies regardless of whether the company knew the actor was sanctioned.

AI-drafted from the source document, validated against GovPing's analyst note standards . For the primary regulatory language, read the source document .
Published by ABA on americanbar.org . Detected, standardized, and enriched by GovPing. Review our methodology and editorial standards .

About this source

GovPing monitors ABA Legal News for new courts & legal regulatory changes. Every update since tracking began is archived, classified, and available as free RSS or email alerts — 104 changes logged to date.

What changed

This article summarizes a panel discussion covering AI-enabled cybercrime tactics and corporate defense strategies. Cybercriminals have shifted to franchised corporate structures to appear more reliable to clients, and use AI for social engineering, phishing, automated malware, and ransom negotiations. The panel recommends that companies develop incident response plans before attacks occur, retain forensic and negotiation firms proactively, and check the OFAC sanctions list before engaging with threat actors. Companies should conduct tabletop exercises and hire ethical hackers to test systems regularly.

Affected organizations should review their ransomware readiness by confirming they have documented incident response plans, pre-vetted forensic and negotiation firms on retainer, and clear procedures for verifying whether threat actors are OFAC-sanctioned. Companies facing ransomware demands must not pay sanctioned groups under any circumstances, and should document all negotiation decisions carefully.

Archived snapshot

Apr 23, 2026

GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.

Science & Technology Law Section



The panel, moderated by Lisa R. Lifshitz and featuring Jason S.T. Kotler, Melissa Maalouf, and Bezawit Sumner, used a question-and-answer format to walk through cybercriminals' latest tactics, options for responding to ransomware attacks, and proactive steps companies can take to protect themselves.

Cybercriminal organizations have shifted to a more franchised or corporate structure rather than their former mafia structure, to appear more “reliable” to their clients. They are using AI to steal data more efficiently in numerous ways, even if they lack technical skills. AI assists cybercriminals with social engineering, phishing schemes, automated malware, ransom and negotiation scripts, and outreach. It enables them to extract data within an hour, while it can take over 200 days for affected individuals to notice. Threat actors seek the most sensitive, high-value information they can access, such as CEO messages, intellectual property, or customers’ financial and health data, to use as leverage over their victims.





Having an incident response plan in place before an attack is important; due to AI, it is reasonable to assume that data theft is inevitable. The first hours are the most critical, but a company should not rush when informing its customers or negotiating with threat actors; this is the time for a reasonable investigation. A company should follow its incident response plan, notify counsel, retain a forensic firm to perform containment, and then, lastly, have its breach counsel contact the ransomware negotiation firm so they can become the primary communicator with the threat actors. All these teams can be retained prior to a cyber-attack to be prepared. Companies should also be aware of the cybercriminals they negotiate with. It is important to never trust these criminals, but if the group has a relatively straightforward history and is not on the OFAC sanctions list, a company may be able to proceed with negotiations and pay them. If the cybercriminals are on the OFAC sanctions list, companies will be held strictly liable. If the cybercriminals have a complicated history of behavior, companies are advised not to pay.

Adopt a resiliency approach by accepting that an attack is inevitable and preparing accordingly. To prevent ransomware attacks, companies should have an incident response plan, a documented process understood by all named individuals, and provide a psychological safety net for the named individuals so they can handle the situation without panicking. The company should routinely check its technological systems by hiring an ethical hacker and ensure that users utilize multi-factor authentication to log in. Additionally, the company should follow proper data retention policies (e.g., removing access from former employees); it is also advisable to conduct tabletop exercises and involve the technological, legal, and communications staff to develop realistic scenarios for practicing data defense. It is recommended to practice these steps as often as possible.


Endnotes


Author

Emily Joinville

Emily Joinville is a first-year law student at the University of Massachusetts School of Law. She earned a Bachelor of Science in Behavioral and Cognitive Neuroscience at the age of 19 and served as both a science teacher and...

View Bio →


Author

Emily Joinville


Committees

This content was produced by:

Related Content

Get daily alerts for ABA Legal News

Daily digest delivered to your inbox.

Free. Unsubscribe anytime.

About this page

What is GovPing?

Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission

What's from the agency?

Source document text, dates, docket IDs, and authority are extracted directly from ABA.

What's AI-generated?

The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.

Last updated

Classification

Agency
ABA
Instrument
Notice
Branch
Executive
Legal weight
Non-binding
Stage
Final
Change scope
Minor

Who this affects

Applies to
Technology companies Employers
Industry sector
5112 Software & Technology
Activity scope
Ransomware defense Incident response planning Cybersecurity governance
Geographic scope
United States US

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Compliance frameworks
NIST CSF
Topics
Data Privacy Sanctions

Get alerts for this source

We'll email you when ABA Legal News publishes new changes.

Free. Unsubscribe anytime.

You're subscribed!