Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Ransomware

Australia Enforces Ransomware Payment Reporting

Covered organizations in Australia are now required to report ransomware and other cyber extortion payments within three days.

Ransomware reporting requirements

Australia has enforced new regulation that requires reporting businesses to inform the government if they make ransomware or other cyber extortion payments.

Per the legislation, organizations in the country with an annual turnover of $3 million AUD (approximately $1.94 million USD) or higher within the last financial year are considered reporting businesses and are covered by the legislation.

All organizations within the critical infrastructure sector are considered reporting business entities.

According to the ransomware payment reporting rules, which became mandatory on May 30, all covered companies are required to report ransomware or cyber extortion payments, made by them or by others on their behalf, within 72 hours of making that payment.

Reports about such payments should include information on the cybersecurity incident, the attackers’ demands, their contact information, the communication with the attackers, the ransom amount itself, and any other relevant information.

“The legislation captures both monetary and non-monetary benefits that are given or exchanged to an extorting entity as being ransomware or cyber extortion payments. For example, this may include the exchange of gifts, services or other benefits to an entity in respect of the demand,” a factsheet (PDF) accompanying the legislation reads.

The reports should be submitted to the Australian Signals Directorate (ASD) using an online form. The ASD will not monitor organizations’ compliance with the ransomware reporting regulation and assist entities in responding to, mitigating, and resolving cyberattacks.

For the first six months, Australia’s Department of Home Affairs will focus on guiding organizations through the reporting process, to identify challenges and compliance issues.

Advertisement. Scroll to continue reading.

Beginning January 1, 2026, after the reporting entities become acquainted with the obligation, the department will adopt a more active regulatory focus.

The reports will be used to collect information on the threat actors and the type of malware they use, to keep small and medium-sized enterprises (SMEs) informed on active threats, and to assist the government in designing future legislative programs.

“Governments and regulators globally are grappling with limited visibility into cyber risks, particularly ransomware, which hinders their ability to effectively detect, disrupt, and deter cyberattacks. The concerning underreporting of ransomware incidents, with only one in five victims reporting attacks according to the Australian Institute of Criminology, highlights the urgent need for proportionate regulatory interventions,” NCC Group director Tim Dillon said in an emailed comment.

Related: CISA Releases Guidance on SIEM and SOAR Implementation

Related: The Hidden Cost of Compliance: When Regulations Weaken Security

Related: Australian Human Rights Commission Discloses Data Breach

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn how the LOtL threat landscape has evolved, why traditional endpoint hardening methods fall short, and how adaptive, user-aware approaches can reduce risk.

Watch Now

Join the summit to explore critical threats to public cloud infrastructure, APIs, and identity systems through discussions, case studies, and insights into emerging technologies like AI and LLMs.

Register

People on the Move

Coro, a provider of cybersecurity solutions for SMBs, has appointed Joe Sykora as CEO.

SonicWall has hired Rajnish Mishra as Senior Vice President and Chief Development Officer.

Kenna Security co-founder Ed Bellis has joined Empirical Security as Chief Executive Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.