> "The cheaper we make it to pay that ransom, then the more incentives we’re creating for companies to pay, and the more incentives we’re creating for companies to pay, the more incentive we’re creating for criminals to continue," said Josephine Wolff
In an ECON 101 sense, ransomware attackers want to set the price as high as they can such that the victim will pay. A rational victim will consider their tax bill in the cost/benefit calculation. So although giving a tax deduction for ransomware seems like it reduces the burden on the victim, in the long run it just increases the reward for the hacker at the expense of the treasury.
That is to say, it's a sliiiightly entitled way to look at the matter.
They already are for more conventional crimes. If a business burns to the ground, its loss of assets is a business loss for tax purposes. Even if it doesn't, insurance premiums are a deductible expense, so the government sees its deduction for the amortized fire damage regardless (since insurers recover expenses plus profit via premiums).
The full article covers this. It's not like there's a specific "pay criminals, get a refund" item in the tax code, it's that damages and losses from crimes are treated like any other business expense.
When you still have reserve currency status for the world you can do dumb things.
Unfortunately those dumb things are catching up to us…
Seems that everyone is choosing an easy way out instead of the hard choice that needs to be made.
I would rather see the hard choices made instead.
IE, Maybe Russia cannot be directly attacked but certainly Russia forces in Ukraine can be attacked in a cyber manner,
New hotness: Sorry IRS, our entire business didn’t turn a profit so we don’t owe taxes (because we sent $5 billion in ransoms to one of our shell companies).
The shell can shift its profits tax-free back to the Canadian parent.
If you pay extortion money or bribes as a company, it‘s not just that they‘re deductible, you‘re actually obligated to account for them.
Being illegal and being deductible don‘t have to do anything with each other.
Don‘t forget Al Capone was actually convicted for tax evasion in the end, as even illegal businesses have to pay taxes.
Perhaps there is a UK, European, or other jurisdiction accountant on HN who could comment?
If the government really wants to reduce this then perhaps they should actually help companies. Setup teams to address these situations in real time. Put that extensive NSA internet spying network to good use and track these situations. When a company calls the FBI to report an ongoing ransomware attack, they shouldn't have to leave a message in hopes that maybe someone might call them back in a couple weeks, nor should they be told to report the situation to their local cops.
[1] https://www.irs.gov/publications/p547#en_US_2020_publink1000...
But I doubt that it could happen like that, the skillset requirements just don't have the overlap it would take.
But taking some liberties extrapolating a dark future, imagine what would happen if key persons who failed particularly hard at avoiding payment suddenly found themselves with unsolicited keys for wallets containing some amount of finder's fee. Deniable, yes, but how much would that deniability be worth in the end? If that could be the future of business computing, should we buy stocks of fax machine companies?
So, a lot.
[1] https://www.irs.gov/publications/p547#en_US_2020_publink1000...
That's order of magnitude easier than requesting paper money
"Deductibility is a piece of a bigger quandary stemming from the rise in ransomware attacks, in which cybercriminals scramble computer data and demand payment for unlocking the files. The government
A ransomware attack on Colonial Pipeline last month led to gas shortages in parts of the United States. The company, which transports about 45% of fuel consumed on the East Coast,"
What are the effects of mortgage interest payments being tax deductable, and given these, what do you think the effect of ransoms being deductable will be?
If this policy weren't just dumb, it would be like these government people actually just want to create more chaos so they can direct it at target groups then only selectively respond to it as a way to paralyze opposition. Not to be political, but any sufficiently idiotic policy is indistinguishable from partisanism, imo.
That would entail actual work, reduce company productivity and induce steps that could go wrong along the way. I'd call that Rube-Goldberg style tax evasion.
You could just stage a ransomware before a prolonged downtime (eg. phishing happy new year emails from an account with a leaked credentials in the source code that's accessible via website.com/.git) and hope that one of your employees will click on the attachment.
That would be quite easy IMHO
Ok, let me just put the moral compass aside for a moment and put on my John Grisham fanfic hat so I can answer to this:
You simply buy $CRYPTO_CURRENCY, siphon the money off into a shell company in your favorite tax heaven, write it up as ransom payment, done. You might not even need the first step by having the shell company pretend to be a crypto currency exchange.
If you are a big enough company to bother with shell company tax evasion shenanigans, you probably have enough departments that some of them barely know each other or communicate. Spreading a rumor of a single department being hit by ransomware should be enough in case someone from the IRS actually bothers to come by and ask around.
If you really must, maybe pay someone in IT some hush money and ask them to turn a few servers off for a day or so to put up a convincing show. I'd advise against that though, since in my experience, technical people are notoriously bad at lying about technical things.
But actually phishing your own employees and staging a real ransomware attack is an unnecessary risk with too many variables where things might actually go wrong. Besides, the people pulling the strings here may have a law and/or accounting background, but probably not IT.
Somehow they need to be taken into account, if you pay US $ 100,000 to a consultant to harden your infrastructure or if you pay US $ 100,000 as a ransom, you have in both cases US $ 100,000 less, the difference is that in the first case you have an invoice, whilst in the second the IRS has to trust you.
Point might be how to "certify" whether the ransomware attack is "real" or if it could be simulated to only get away with hiding/divert the money (and pay no taxes on those).
Paying a ransom by definition puts the whole sum in a black hole, tax-wise.
Well, exactly this. Clarifying that ransom payments are tax-deductible creates a moral hazard whereby companies set up off-shore entities to conduct ransomware attacks. The parent company gets attacked, establishes a paper trail of "damages" (whether these damages are material is irrelevant, particularly as the stock market has shown that it won't punish companies for being the victim of cyberattacks), quickly pays the ransom, which moves the money off-shore into crypto accounts which can then be tumblered and funneled into shell companies. The off-shore cash can then be used off-the-books for a variety of purposes that indirectly benefit the parent company.
Good luck to the forensic auditors who try to follow the trail to show that the money never really left the parent company's control.
1. Sabotage your company security
2. Stage a ransomware attack with enough plausible deniability
3. Get a fat bonus
The IRS does not have enough muscle to get to the bottom of this, so this works out great.
that would just incentivize businesses to hide and obscure their breaches.
From my point of view, whether or not there is a legitimate process built around the ransomware attacks, the attackers will simply continue business as usual; there's no fear or penalty for them, the workflow of their process is not disrupted in the slightest (the bitcoin payments can still go through), and I don't really get the impression that the legal background of the victim's country is taken into consideration by the attackers.
(All of the above is why I'm pretty sure that the idea of "make paying the ransom illegal" will have no impact on the number of attacks, as such a policy does nothing to actually impede the workflow of ransomware; all it does is create another decision point for an already damaged group of persons as to whether they commit an illegal act or not to try to save their business)
https://www.bloomberg.com/opinion/articles/2019-06-26/everyt...