Lexis+ AI ® transformed Whitehall & Associates, a growing law firm, into a dynamic force in institutional abuse and personal injury law. Partner Daniela Anicic explains how Lexis+ AI helped to facilitate...
Australia’s merger clearance process is undergoing significant reform, driven by longstanding concerns the current voluntary, informal regime does not sufficiently prevent anticompetitive mergers. After...
As AI is poised to transform workplaces, employee engagement is falling, resulting in a real economic cost. For corporate legal departments, AI adoption presents a significant opportunity to increase department...
Corporate legal departments are under increasing pressure to do more with less. A key area of opportunity lies in how organisations manage their outside counsel spend. With outside counsel hourly rates...
Authored by Shaun Burmester, Legal Writer, Property, Practical Guidance One of the most significant overhauls in Queensland property law in over 50 years is set to take effect on 1 August 2025. The...
After nearly a week, the details of the Optus cyber attack are still unclear. At one point, it was thought that confidential data relating to 10,000 unlucky Optus customers had potentially been leaked by the now infamous Optus hackers. Passport details, dates of birth, addresses. All data leaked, purportedly in the open. To make matters worse, the hackers behind the Optus data breach were said to have announced that they would continue to leak the sensitive data of an additional 10,000 Optus customers each and every day for the next 4 days unless Optus paid their hackers a ransom of 1.5 million in cryptocurrency for the cyber attack.
That’s a lot of data.
Hackers are often crystal clear about their motivations for hacking. In many cases, they are doing it for ransom. But not the regular cash kind of money that you can stuff in a suitcase or bury in a vault. Hackers usually demand cryptocurrency. Cryptocurrency has obvious advantages for extortionists. The transfer of cryptocurrency allows criminally minded hackers to remain anonymous – likely untraceable, which is an important requirement for criminal activities!
Organisations faced with a cybercrime like the Optus one, are often left having to decide whether to pay the ransom. The ACSC (Australian Cyber Security Centre) advises against paying ransoms. Payment of the ransom may increase an organisation’s vulnerability to future cybercrimes. In addition, there is no guarantee that payment will undo the data breach.
But for a moment let’s imagine that your organisation decides that your hackers are of the honest type (yes – honest hackers. That is, actually a “thing”) and that the risks of paying the ransom outweigh the risks of failing to do so. You cannot simply bring in your security experts to arrange a drop (James Bond style) or call the bank for an electronic transfer – you are going to need to make that ransom payment on the blockchain.
Yes. The blockchain.….so perhaps it’s not just trading enthusiasts who benefit from prior knowledge about trading on the blockchain.
For more information around the legal implications of blockchain and cryptocurrency, take a closer look at Practical Guidance, Cybersecurity, Data Protection & Privacy. Contact us for a demo or free trial here.