Ransomware Attacks: Legal Framework and Response

Constitutional Law Section 43 Section 384 Section 420 Section 66F Reasonable security practices under IT Act
Veritect
Veritect AI
Deep Research Agent
12 min read
Continue with Veritect

Compare Constitutional Law positions across the Supreme Court & 25 High Courts.

Try Veritect free Book a demo

Executive Summary

Ransomware attacks, where malicious actors encrypt data and demand ransom for decryption, implicate multiple legal frameworks in India:

  • IT Act offenses: Sections 43, 66, 66B (unauthorized access, damage, extortion)
  • IPC offenses: Sections 384, 385 (extortion), 420 (cheating)
  • DPDP obligations: Data breach notification requirements
  • CERT-In directions: Mandatory incident reporting within 6 hours
  • Law enforcement: Cyber Crime Police, CBI, NIA jurisdiction
  • Payment considerations: Legal and regulatory risks of paying ransom
  • Prevention obligations: Reasonable security practices under IT Act

This guide examines the legal framework for ransomware incidents and compliance obligations.

1. Understanding Ransomware

Attack Methodology

Stage Description
1. Initial access Phishing, vulnerability exploitation, RDP compromise
2. Lateral movement Spread through network
3. Data exfiltration Steal sensitive data (double extortion)
4. Encryption Lock files with strong encryption
5. Ransom demand Payment in cryptocurrency
6. Negotiation Extortion tactics

Common Variants

Type Characteristics
Crypto-ransomware Encrypts files, demands payment
Locker ransomware Locks system, demands payment
Double extortion Encryption + data leak threat
Triple extortion + DDoS attack threat
Ransomware-as-a-Service Commercial ransomware platforms

2. Applicable Criminal Laws

IT Act Offenses

Section Offense Punishment
43 Unauthorized access/damage Compensation up to Rs. 5 crores
66 Computer-related offenses Up to 3 years + Rs. 5 lakh fine
66B Receiving stolen data Up to 3 years + Rs. 1 lakh fine
66F Cyber terrorism (if CII targeted) Life imprisonment

Indian Penal Code Offenses

Section Offense Punishment
384 Extortion Up to 3 years + fine
385 Putting person in fear to commit extortion Up to 2 years + fine
420 Cheating Up to 7 years + fine
120B Criminal conspiracy As per object offense

Which Law Applies?

Element IT Act IPC Both
Unauthorized access Section 43, 66 - Primary
Data encryption Section 43, 66 - Primary
Ransom demand - Section 384, 385 Primary
Payment fraud - Section 420 Primary
Complete attack - - Both applicable

3. CERT-In Incident Reporting

Mandatory Reporting Obligation

Under CERT-In Directions (April 2022):

Requirement Specification
Timeline Within 6 hours of noticing incident
Reporting entity Service providers, intermediaries, data centers, VPNs, govt bodies
Reporting portal CERT-In portal (https://nciipc.gov.in)
Information Incident details, impact, actions taken

Reportable Ransomware Incidents

Incident Type Examples
Malware attacks Ransomware, trojans
Unauthorized access Compromise of systems
Data breach Exfiltration of data
Data leak Threatened or actual publication
Denial of service DDoS accompanying ransomware

Information to be Reported

Data Point Details
Incident type Ransomware attack
Date/time When attack detected
Systems affected Servers, databases, endpoints
Data compromised Types and volume
Attack vector How attackers gained access
Ransom demand Amount and cryptocurrency
Actions taken Containment, investigation

4. DPDP Act Breach Notification

Data Breach Obligations

If ransomware involves personal data:

Obligation Timeline Recipient
DPB notification Immediately Data Protection Board
Individual notification Without undue delay Affected Data Principals
Content Nature, scope, consequences, mitigation -

When DPDP Applies to Ransomware

Scenario DPDP Notification Required
Data encrypted only Yes - data unavailable
Data exfiltrated Yes - unauthorized disclosure
System locked (no data) Possibly not (if no personal data)
Double extortion Yes - mandatory

5. Law Enforcement Jurisdiction

Investigation Agencies

Agency Jurisdiction
Cyber Crime Police Stations First responders, state-level
State Cyber Cells Coordination within state
CBI Cyber Crime Unit Inter-state, complex cases
National Investigation Agency (NIA) National security, terrorism (Section 66F)
CERT-In Technical coordination, advisory

When to Involve Which Agency

Situation Agency
Initial attack Local Cyber Crime Police
Multi-state attack CBI
Critical infrastructure NIA + CERT-In
International perpetrators CBI + Interpol coordination
Ongoing incident CERT-In (technical support)

6. To Pay or Not to Pay Ransom

Aspect Implication
No legal obligation Paying is voluntary
Funding crime May support criminal enterprises
Terrorist financing If attackers are designated entities
No guarantee Payment doesn't ensure decryption
Repeat targeting Marks organization as willing to pay

Regulatory Guidance

Authority Position
CERT-In Advises against payment
Law enforcement Recommends not paying
RBI No specific prohibition (cryptocurrency challenges)
FATF Caution on terrorist financing risks

If Organization Decides to Pay

Consideration Action
Legal advice Consult before payment
Law enforcement Inform authorities
Cryptocurrency Legal and tax implications
Documentation Maintain records
Reporting CERT-In, DPB, tax authorities
Sanctions check Ensure not paying designated entities

7. Incident Response Framework

Immediate Actions (0-6 Hours)

Step Action
1. Isolate Disconnect infected systems from network
2. Preserve evidence Take forensic images
3. Assess scope Identify affected systems and data
4. Activate team Incident response team assembly
5. Report to CERT-In Within 6 hours
6. Law enforcement File FIR with Cyber Crime Police

Short-Term Actions (6-72 Hours)

Step Action
7. Investigation Root cause analysis, forensics
8. Containment Stop spread, patch vulnerabilities
9. Backup restoration If clean backups available
10. DPB notification If personal data breach
11. Individual notification Inform affected Data Principals
12. Communication Internal and external stakeholders

Recovery Actions (72+ Hours)

Step Action
13. System restoration Rebuild or restore from backups
14. Decryption If key obtained or available
15. Monitoring Watch for re-infection
16. Security upgrades Implement improvements
17. Audit Post-incident review
18. Policy updates Revise security policies

8. Prevention Obligations

Reasonable Security Practices (IT Act Section 43A)

Requirement Implementation
Technical safeguards Firewalls, encryption, access controls
Organizational measures Policies, training, audits
IS/ISO 27001 Information security standards
Regular updates Patch management
Backup strategy 3-2-1 rule (3 copies, 2 media, 1 offsite)

Prevention Best Practices

Measure Purpose
Email filtering Block phishing attempts
Endpoint protection Anti-malware, EDR
Network segmentation Limit lateral movement
MFA Prevent unauthorized access
Privileged access management Control admin credentials
Regular backups Enable restoration
Offline backups Prevent encryption by ransomware
Security awareness Train employees
Vulnerability management Regular scanning and patching
Incident response plan Preparedness

9. Evidence Preservation

Digital Forensics

Evidence Type Preservation Method
System logs Secure export before wiping
Network traffic Packet captures
Ransomware note Screenshot and text copy
Encrypted files Sample files for analysis
Payment demands Communication records
Decryption attempts Document all actions

Chain of Custody

Requirement Purpose
Timestamped logs Prove evidence integrity
Write-blocked copies Prevent alteration
Hash values Verify authenticity
Documentation Who handled what when
Storage Secure evidence retention

10. Insurance Considerations

Cyber Insurance Coverage

Coverage Application to Ransomware
Ransom payment May cover (policy-dependent)
Forensic investigation Usually covered
Business interruption Covered if in policy
Data recovery Covered
Legal expenses Covered
Regulatory fines May be excluded
Third-party claims Covered if liability policy

Policy Exclusions

Exclusion Reason
Acts of war Cyber warfare may be excluded
Known vulnerabilities Failure to patch
Intentional acts Insider threats
Prior incidents Pre-existing conditions

Claims Process

Step Action
Immediate notice Notify insurer ASAP
Incident documentation Detailed records
Follow panel vendors Use approved forensic firms
Ransom negotiation Involve insurer
Proof of loss Document all costs

11. International Cooperation

Cross-Border Challenges

Challenge Issue
Attribution Attackers in foreign jurisdictions
Cryptocurrency Anonymous payment channels
Jurisdiction Legal complexities
Evidence MLAT procedures slow
Mechanism Purpose
MLAT treaties Formal evidence exchange
Interpol Police cooperation
Budapest Convention Cyber crime cooperation (India not party)
Bilateral agreements Country-specific cooperation

12. Penalties for Non-Compliance

For Organizations

Non-Compliance Penalty
CERT-In reporting failure Under consideration (guidelines)
DPDP breach notification failure Up to Rs. 250 crores
Reasonable security failure Compensation under Section 43A
Negligence Civil liability to affected parties

For Attackers

Offense Maximum Penalty
IT Act Section 66 3 years + Rs. 5 lakh fine
IPC Section 384 3 years + fine
IPC Section 420 7 years + fine
Cyber terrorism (66F) Life imprisonment

13. Sector-Specific Considerations

Critical Information Infrastructure

Sector Additional Requirements
Banking/Finance RBI cyber security framework
Power/Energy CEA/CERC guidelines
Telecom DoT security requirements
Healthcare Patient data protection
Government NCIIPC guidelines

14. Compliance Checklist

Pre-Incident Preparation

  • Implement reasonable security practices (IT Act Section 43A)
  • Develop incident response plan
  • Establish CERT-In reporting procedure
  • Train incident response team
  • Implement 3-2-1 backup strategy
  • Test backup restoration
  • Obtain cyber insurance
  • Conduct regular security audits
  • Deploy anti-ransomware tools
  • Educate employees on phishing

During Incident

  • Isolate infected systems immediately
  • Preserve digital evidence
  • Activate incident response team
  • Report to CERT-In within 6 hours
  • File FIR with Cyber Crime Police
  • Assess personal data impact
  • Notify DPB if data breach (immediately)
  • Notify affected individuals (without delay)
  • Notify cyber insurer
  • Document all actions

Post-Incident

  • Complete forensic investigation
  • Submit final report to CERT-In
  • Submit final report to DPB (if applicable)
  • Conduct post-incident review
  • Implement security improvements
  • Update incident response plan
  • Train staff on lessons learned
  • Monitor for re-infection
  • Review insurance coverage

15. Key Takeaways for Practitioners

  1. Multiple Laws Apply: Ransomware implicates IT Act, IPC, DPDP Act, and CERT-In directions.

  2. 6-Hour Reporting: CERT-In notification mandatory within 6 hours of detection.

  3. Data Breach Notification: If personal data compromised, notify DPB immediately and individuals without delay.

  4. Law Enforcement Essential: File FIR with Cyber Crime Police immediately.

  5. Payment Risks: Paying ransom has legal, regulatory, and practical risks - consult legal advice first.

  6. Prevention Obligations: Reasonable security practices mandatory under IT Act Section 43A.

  7. Evidence Preservation: Maintain chain of custody for forensic evidence.

  8. Cyber Insurance: Review policy coverage for ransomware, including ransom payment.

Conclusion

Ransomware attacks trigger multiple legal obligations under Indian law, including immediate CERT-In reporting, data breach notification under DPDP Act, and criminal complaints under IT Act and IPC. Organizations must prioritize prevention through reasonable security practices, maintain robust backup strategies, and develop comprehensive incident response plans. The decision to pay ransom involves significant legal and regulatory considerations and should only be made after legal consultation and law enforcement notification. Effective response requires coordination between legal, technical, and law enforcement stakeholders.

Written by
Veritect. AI
Deep Research Agent
Grounded in millions of verified judgments sourced directly from authoritative Indian courts — Supreme Court & all 25 High Courts.
About Veritect

AI research & drafting, purpose-built for Indian litigation.

Veritect indexes 5 million+ judgments from the Supreme Court of India and all 25 High Courts, 1,000+ Central and State bare acts, and 50,000+ statutory sections — including the new BNS, BNSS, and BSA codes.

Built for Indian courts. Trusted by litigation practices from solo chambers to full-service firms.

Try Veritect free