Incident response

Consequences of the Late Announcement of Cyber-security Incidents

Daniel Dimov
February 17, 2018 by
Daniel Dimov

Introduction

Cyber-security attacks that are becoming more and more common among various types and sizes of organizations may have serious effects on electronic communication networks, provision of services, and national security. Although significant breaches that affect many users or extensively disrupt the functioning of an organization usually receive extensive media coverage, smaller security incidents may remain unreported to the public. This can occur because of several reasons. For example, the affected organization may become aware of the incident later, it considers the incident insignificant (e.g., no personal data has been accessed), the local law does not impose requirements on reporting cyber-attacks, or, after conducting balancing tests, the reporting of the incident will cause substantial damages. Nevertheless, in practice, late announcement of cyber-security incidents may be beneficial only in a small number of very specific and selective cases. In most cases, late announcement of incidents may cause significant reputational harm and possible legal liabilities.

Legal requirements

It is important to note that the laws of some jurisdictions impose short time frames and strict procedures for reporting computer security incidents, especially those entailing personal data breaches. For example, the new soon-to-come EU data protection law (GDPR) stipulates that, if a security incident that includes a personal data breach may result in a risk to the rights and freedoms of natural persons, it should be reported to the national supervisory authority within 72 hours after the organization becomes aware of it. In the US, the reporting timeframe depends on the type of the cyber-attack experienced by an entity. The US Computer Readiness Emergency Team should be notified about reportable incidents within an hour or two after the discovery of such an incident. In addition, there are voluntary incident reporting schemes and requirements imposed by industry-specific regulators. For example, in summer 2017, the European Central Bank (ECB) imposed new mandatory tailored cyber incident reporting requirements that do not stem from legislation on more than 100 banks.

Learn Incident Response

Learn Incident Response

Get hands-on experience with incident response tools and techniques as you progress through nine courses.

Incident response plan

Implementation of organization's incident response plan and incident reporting timeframes depend on various aspects of the cyber incident, such as the type of the organization that has experienced the attack, the data and/or systems that have been accessed, as well as the severity, scope and the type of the attack. In addition to national agencies that should be contacted in case of an incident for receiving assistance in coordinating the incident, it is a good industry practice of an organization to report incidents to their clients and the public in general. Such an external communication strategy, which usually includes informing clients by e-mail and preparing press releases, accompanies internal communication during the mitigation of the incident.

Failure to report timely

Due to the fear of possible adverse effects of security events or belated information about such events, some organizations fail to announce the experienced attack promptly. By way of illustration, in late November 2017, Uber notified its users worldwide about the massive incident that had occurred in 2016, a year before the actual announcement date. During the attack, hackers accessed personal data of 57 million Uber users, including their driver license numbers, names, and phone numbers. The breach was facilitated by accessing third-party cloud storage used by Uber's systems. Nevertheless, to avoid the reputational impact of this large-scale event, Uber did not notify its users and law enforcement bodies. Instead, the company paid USD 100.000 to the hackers asking to destroy the obtained personal data.

Intentional or unintentional late public disclosure practices may have benefits and drawbacks that are further discussed below. We do not consider the legal liabilities for not complying with timely reporting requirements as they may differ depending on the jurisdiction in which the affected organization is operating.

A benefit of late announcement

The main benefit that can stem from a delayed public reporting is a possibility to mitigate the associated reputational harm and mitigate the damages related to it. The organization may "postpone" the immediate negative reputational effect of the incident and rely on the possibility that, in a perspective of time, the incident would be less severe. The effect of such a measure can be twofold. The difference in a psychological perception of the incident that has just occurred and the incident that happened a long time ago may make such an action plan effective. However, it is of utmost importance to note that such a move may also have a completely
reverse effect. The organization may be a negligent undertaking that does not respect its clients, partners, reputation, and honest industry practices.

Other situations in which organizations may choose to announce the cyber incident later are those particular cases when an immediate reporting could cause physical harm to persons, organizations, environment, or affect the confidentiality, integrity, and availability of other secured data.

Drawbacks of late announcement

The drawbacks related to the late announcement of cyber-security incidents include the following:

  • Preventing the rise of awareness about the incident. The targeted organization may not be the only victim of the attack as more entities can be affected by it. By not discussing the incident publicly, the affected organization cannot share and receive helpful information (e.g., information about perpetrator's tactic, a timeline of events, and effective mitigation techniques) that can help to avoid the incident in the future.
  • Preventing victims from taking remedial action immediately. By failing to inform the affected parties about the incident, the organization will prevent the victims from taking actions immediately and employing preventive measures for possible future incidents.
  • Losing the chance to test incident response plans and practice external communication strategies. Although an incident response plan drafted and maintained by an organization may be foolproof, its strengths and flaws can only be seen in practice. Thus, by applying an incident response plan in a real-time environment, an organization can assess the effectiveness of its cyber-security strategies.

Conclusion

To conclude, external and internal communication strategies are essential elements of an effective incident response plan. They regulate not only mitigation of incidents within the organization, but also assist in limiting the reputational harm that follows them. It is important to stress that a well-structured, professional, and detailed announcement of a security incident may mitigate the adverse effects the event, share good practices, and keep transparent and reliable relationships with organization's partners. Finally, a timely public dialogue about the incident may evolve into a broader discussion about the core of the problem and help to find a solution.

Learn Incident Response

Learn Incident Response

Get hands-on experience with incident response tools and techniques as you progress through nine courses.

Late announcement of cyber-security incidents can rarely be justified or beneficial. Usually, the failure to announce an incident promptly will discredit the compromised organization and raise legal liabilities.

References

  1. ENISA, EU Agency for Network and Information Security. Available at https://www.enisa.europa.eu/topics/incident-reporting
  2. Larson, S., 'Uber's massive hack: What we know,' CNN, 23 November 2017. Available at http://money.cnn.com/2017/11/22/technology/uber-hack-consequences-cover-up/index.html
  3. US-CERT, Incident Reporting System. Available at https://www.us-cert.gov/forms/report?

    Co-Author

    Rasa Juzenaite works as a project manager at Dimov Internet Law Consulting (www.dimov.pro), a legal consultancy based in Belgium. She has a background in digital culture with a focus on digital humanities, social media, and digitization. Currently, she is pursuing an advanced Master's degree in IP & ICT Law.

Daniel Dimov
Daniel Dimov

Dr. Daniel Dimov is the founder of Dimov Internet Law Consulting (www.dimov.pro), a legal consultancy based in Belgium. Daniel is a fellow of the Internet Corporation for Assigned Names and Numbers (ICANN) and the Internet Society (ISOC). He did traineeships with the European Commission (Brussels), European Digital Rights (Brussels), and the Institute for EU and International law “T.M.C. Asser Institute” (The Hague). Daniel received a Ph.D. in law from the Center for Law in the Information Society at Leiden University, the Netherlands. He has a Master's Degree in European law (The Netherlands), a Master's Degree in Bulgarian Law (Bulgaria), and a certificate in Public International Law from The Hague Academy of International law.