Earlier this week, Colonial Pipeline CEO Joseph Blount testified before the House Homeland Security Committee that his company had filed a claim with its cyberinsurance carrier for the $4.4 million cryptocurrency ransom it paid last month. This week, US authorities announced that they had managed to recover $2.3 million of that ransom, raising further questions about who would receive that money—Colonial Pipeline or its insurance carriers—and what signal it would send to ransomware victims and their insurers.
In May, the same week that Colonial Pipeline made its ransom payment, the insurance carrier AXA announced that it would stop covering ransom payments under its cyberinsurance policies in France. Around the same time, Swiss Re CEO Christian Mumenthaler said in an interview that “overall the problem [of cybersecurity] is so big it’s not insurable.” But anyone hoping that insurance companies might be the ones to break the cycle of million-dollar ransom payments will likely end up disappointed.
In fact, paying a ransom claim is often more appealing to insurers than having to cover all of the costs associated with restoring compromised systems and any resulting downtime or lost business their policyholders suffer. Blount, for instance, confirmed in his testimony that he had discussed the ransom with Colonial’s insurer prior to making the payment, and that he believed the insurer would ultimately cover the claim, suggesting the carrier had likely signed off on the decision to pay.
The role of insurance carriers in responding to ransomware attacks and paying ransom demands is often difficult to pin down, but it shows few signs of abating. Cyberinsurance carriers acknowledge that they have seen a growing number of claims for ransomware attacks and that they offer coverage for ransom payments, but, understandably, neither they nor their customers are eager to publicize just how often they cover ransom payments or how much they pay out in these cases. That’s partly because they don’t want to attract attention from regulators and others trying to discourage the payment of ransoms, and partly because they don’t want to attract the attention of cybercriminals who might use that information to target organizations with good cyberinsurance coverage. DarkSide, the group believed to be responsible for the Colonial Pipeline attack, reportedly searches the systems it infiltrates—prior to encrypting them with ransomware—to find information about the victims’ cyberinsurance coverage, and adjusts ransom demands accordingly.
Insurance coverage for ransoms has been criticized for years for potentially making victims more likely to pay ransoms, therefore encouraging more attacks. But these criticisms have had little impact on insurers. Even AXA’s decision to stop covering ransom payments in France is not as much of a bellwether as it might seem. Instead, it appears to have been motivated by a French Senate roundtable in April at which several regulators indicated their disapproval of ransom payments. “We will have to toughen up the tone in terms of ransom,” said cybercrime prosecutor Johanna Brousse at the event. “We no longer want to pay and we will no longer pay. Hackers must realize that France is not the goose that lays the golden eggs.”
While French authorities did not explicitly outlaw the payment of ransoms, AXA France spokesperson Corinne Gaudoux said in an email to WIRED that they indicated sufficient ambiguity on the subject that AXA France decided to “temporarily suspend” their coverage for ransom payments “until the French authorities clarify their position on whether or not it is permitted for insurers to cover ransom payments.” In the meantime, AXA France will continue to cover other costs associated with ransomware—including the costs of restoring computer systems and data, hiring expert computer assistance, consecutive operating losses, and legal protection costs. AXA divisions in other countries are continuing to offer coverage for ransom payments.