ABA Panel: AI Empowers Cybercriminals in Ransomware Attacks
Summary
An ABA Science & Technology Law Section panel discussion examined how AI enables cybercriminals to execute ransomware attacks more efficiently, allowing data exfiltration within hours while victims may take over 200 days to notice. The panel advised companies to prepare incident response plans in advance, retain forensic and negotiation firms proactively, and verify whether threat actors appear on the OFAC sanctions list before considering any ransom payment, since companies face strict liability for payments to sanctioned groups.
“If the cybercriminals are on the OFAC sanctions list, companies will be held strictly liable.”
Organizations should confirm their incident response plans include a step to verify whether ransom-demanding threat actors appear on the OFAC sanctions list before any payment discussion. The strict liability exposure for paying sanctioned groups applies regardless of whether the company knew the actor was sanctioned.
About this source
GovPing monitors ABA Legal News for new courts & legal regulatory changes. Every update since tracking began is archived, classified, and available as free RSS or email alerts — 104 changes logged to date.
What changed
This article summarizes a panel discussion covering AI-enabled cybercrime tactics and corporate defense strategies. Cybercriminals have shifted to franchised corporate structures to appear more reliable to clients, and use AI for social engineering, phishing, automated malware, and ransom negotiations. The panel recommends that companies develop incident response plans before attacks occur, retain forensic and negotiation firms proactively, and check the OFAC sanctions list before engaging with threat actors. Companies should conduct tabletop exercises and hire ethical hackers to test systems regularly.
Affected organizations should review their ransomware readiness by confirming they have documented incident response plans, pre-vetted forensic and negotiation firms on retainer, and clear procedures for verifying whether threat actors are OFAC-sanctioned. Companies facing ransomware demands must not pay sanctioned groups under any circumstances, and should document all negotiation decisions carefully.
Archived snapshot
Apr 23, 2026GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.
Science & Technology Law Section
The panel, moderated by Lisa R. Lifshitz and featuring Jason S.T. Kotler, Melissa Maalouf, and Bezawit Sumner, used a question-and-answer format to walk through cybercriminals' latest tactics, options for responding to ransomware attacks, and proactive steps companies can take to protect themselves.
Cybercriminal organizations have shifted to a more franchised or corporate structure rather than their former mafia structure, to appear more “reliable” to their clients. They are using AI to steal data more efficiently in numerous ways, even if they lack technical skills. AI assists cybercriminals with social engineering, phishing schemes, automated malware, ransom and negotiation scripts, and outreach. It enables them to extract data within an hour, while it can take over 200 days for affected individuals to notice. Threat actors seek the most sensitive, high-value information they can access, such as CEO messages, intellectual property, or customers’ financial and health data, to use as leverage over their victims.
Having an incident response plan in place before an attack is important; due to AI, it is reasonable to assume that data theft is inevitable. The first hours are the most critical, but a company should not rush when informing its customers or negotiating with threat actors; this is the time for a reasonable investigation. A company should follow its incident response plan, notify counsel, retain a forensic firm to perform containment, and then, lastly, have its breach counsel contact the ransomware negotiation firm so they can become the primary communicator with the threat actors. All these teams can be retained prior to a cyber-attack to be prepared. Companies should also be aware of the cybercriminals they negotiate with. It is important to never trust these criminals, but if the group has a relatively straightforward history and is not on the OFAC sanctions list, a company may be able to proceed with negotiations and pay them. If the cybercriminals are on the OFAC sanctions list, companies will be held strictly liable. If the cybercriminals have a complicated history of behavior, companies are advised not to pay.
Adopt a resiliency approach by accepting that an attack is inevitable and preparing accordingly. To prevent ransomware attacks, companies should have an incident response plan, a documented process understood by all named individuals, and provide a psychological safety net for the named individuals so they can handle the situation without panicking. The company should routinely check its technological systems by hiring an ethical hacker and ensure that users utilize multi-factor authentication to log in. Additionally, the company should follow proper data retention policies (e.g., removing access from former employees); it is also advisable to conduct tabletop exercises and involve the technological, legal, and communications staff to develop realistic scenarios for practicing data defense. It is recommended to practice these steps as often as possible.
Endnotes
Author
Emily Joinville
Emily Joinville is a first-year law student at the University of Massachusetts School of Law. She earned a Bachelor of Science in Behavioral and Cognitive Neuroscience at the age of 19 and served as both a science teacher and...
View Bio →
Author
Emily Joinville
Committees
This content was produced by:
Related Content
Related changes
Get daily alerts for ABA Legal News
Daily digest delivered to your inbox.
Free. Unsubscribe anytime.
About this page
Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission
Source document text, dates, docket IDs, and authority are extracted directly from ABA.
The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.
Classification
Who this affects
Taxonomy
Browse Categories
Get alerts for this source
We'll email you when ABA Legal News publishes new changes.
Subscribed!
Optional. Filters your digest to exactly the updates that matter to you.