Non-Lawyers Summary

Winning a cyber case is not just about proving harm. Victims still have to identify the right defendant, show the court has power over that person, prove they suffered a concrete injury, and find a realistic way to collect money or get relief. This post explains those practical hurdles.

The Cruel Paradox of Being a Victim

The breach was real. The stolen data was real. The harm — financial, operational, reputational — was undeniably real. And yet, when victims walk into a lawyer's office and ask what can be done, the answer is almost never simple.

The law provides impressive remedies on paper. Civil lawsuits. Restitution orders. Asset forfeiture. Injunctions that can freeze a hacker's infrastructure overnight. On paper, the victim holds powerful weapons.

But reaching those weapons requires crossing a gauntlet of procedural hurdles — each one capable of ending the case before it begins. Attribution problems. Standing doctrine. Jurisdiction traps. Sovereign immunity. Courts that demand concrete, documented harm from plaintiffs who often only know that something was taken and something is broken.

The realistic question is never just "what does the statute provide?" It is always: can we actually get to court against this specific defendant?

This module maps both the remedies and the traps.


Part I: Remedies Available

Criminal Track — Restitution and Forfeiture

When the government successfully prosecutes a hacker, victims may receive:

Restitution (18 U.S.C. § 3663A — Mandatory Victims Restitution Act): Courts must order restitution in the amount of the victim's losses. Covers:

  • Direct losses (cost of breach response, forensics, notification)
  • Lost business revenue from system downtime
  • Cost of credit monitoring services provided to consumers
  • Ongoing costs of remediation

The collection problem: Restitution is only as valuable as the defendant's assets. A 22-year-old hacker with no legitimate income is judgment-proof. Restitution orders sit uncollected. The exception: where significant cryptocurrency was seized and forfeited, those funds may be used to satisfy restitution.

Forfeiture: The government can seize all proceeds of the crime and assets used to facilitate it. Major cryptocurrency seizures — Colonial Pipeline's 63 BTC; Bitfinex's 94,000 BTC — have produced victim-facing asset pools that are then distributed through restitution proceedings. When forfeiture is successful, it is the most practically effective victim recovery mechanism. And it can happen years after the attack, long after the victim stopped expecting any recovery at all.


Civil Track — Suing the Hacker

Victims who identify an accessible defendant can pursue:

Injunctive relief:

  • Temporary restraining orders (TRO) to stop ongoing access immediately
  • Preliminary and permanent injunctions prohibiting further access, requiring return/destruction of data, mandating takedown of malware infrastructure
  • Courts have used injunctive relief to authorize government and private parties to disrupt botnet infrastructure

Compensatory damages:

  • CFAA § 1030(g): civil action for "any person who suffers damage or loss" — but only for conduct involving specific CFAA provisions and meeting the $5,000 loss threshold per-year
  • California PC § 502: compensatory damages including "any expenditure reasonably and necessarily incurred by the owner or lessee to verify that a computer system, computer network, computer program, or data was or was not altered, damaged, or deleted by the access"
  • Common law negligence, trespass to chattels, conversion: available in some circuits depending on whether intangible property claims are recognized

Attorney's fees: Available under California PC § 502 in certain circumstances.

Punitive damages: Available under California PC § 502 where the violation was willful and committed with malice, oppression, or fraud. Courts rarely award punitive damages in cybercrime civil cases, but the possibility creates settlement leverage.


Civil Track — Suing the Breached Organization

Most data breach litigation does not target the hacker. It targets the company that got breached.

Why? Because the hacker is invisible, unreachable, and broke. The breached company is on the SEC's EDGAR database. It has a registered agent. It has D&O insurance. And if it held millions of consumers' data, its aggregate statutory exposure can be staggering.

California Civil Code § 1798.150 (CCPA): $100–$750 statutory damages per consumer per incident for failure to maintain reasonable security. Class action aggregation makes this the primary civil liability mechanism for large consumer breaches.

Common law theories:

  • Negligence: duty to maintain reasonable security for data held
  • Breach of contract: if the company promised security controls in its terms of service
  • Intrusion upon seclusion: minority approach in some circuits
  • Bailment: company was entrusted with data and failed to safeguard it

European remedies: GDPR allows data subjects to seek compensation from controllers for material or non-material damage resulting from infringement. GDPR also enables supervisory authorities to impose administrative fines — these flow to regulators, not victims, but create powerful regulatory enforcement leverage.


Part II: The Procedural Hurdles

Hurdle 1: Attribution — The First and Biggest Barrier

Without warning, a company discovers its entire customer database is for sale on a darknet forum. Security investigators spend months reconstructing the attack. They find the entry point, the lateral movement, the exfiltration path. They can trace the tool signatures to a known threat actor cluster. But they cannot, with legal certainty, name a human being.

The gap between technical attribution and legal attribution is where most cyber civil suits die.

Technical reality: Security investigators can often determine how an attack occurred — attack vector, tooling, malware families, TTPs. Attribution to a specific person is harder. Attackers use VPNs, Tor, compromised infrastructure, and stolen identities to mask their origin.

Legal standard: Civil plaintiffs must plead facts establishing that the named defendant committed the intrusion. Criminal charges require proof beyond reasonable doubt.

The "John Doe" problem: Many breach civil suits are filed against "John Doe" defendants, hoping that the litigation process — subpoenas to ISPs, data providers — will eventually identify the attacker. Courts have imposed time limits and skepticism on long-running Doe cases.

State-sponsored attackers: Where intelligence indicates a nation-state conducted the attack, the legal attribution problem is acute. Intelligence agency findings are often classified and cannot be presented in court as direct evidence. The government's solution — indicting named individuals using declassified or parallel evidence — may not be available to private civil plaintiffs.


Hurdle 2: Standing — The Constitutional Gatekeeper

The Supreme Court handed down two rulings that changed everything for data breach class actions. And most breach victims never saw them coming.

Standing is the threshold constitutional requirement that a plaintiff must meet to bring a case in federal court. The Supreme Court has significantly tightened standing in data breach class actions.

The three requirements (Article III):

  1. Injury-in-fact: A concrete and particularized harm, not merely a risk or a statutory violation
  2. Causation: The injury must be fairly traceable to the defendant's conduct
  3. Redressability: The court must be able to provide a remedy that addresses the injury

The key cases:

  • Spokeo, Inc. v. Robins (2016): A statutory violation alone — without a corresponding concrete harm — is insufficient for Article III standing. Bare procedural violations do not automatically establish standing.
  • TransUnion LLC v. Ramirez (2021): Further tightened standing for damages claims. Plaintiffs whose information appeared in an internal database but was never disclosed to third parties lacked standing for damages claims — no concrete harm occurred.

What happened next would define breach class action litigation for years: courts began dismissing cases where the breach was real, the violation was documented, but the plaintiffs could not prove their specific data had been misused.

Application in breach cases:

  • If a hacker stole your data but you've suffered no actual financial loss, fraudulent account opening, or documented harm — you may lack standing for damages
  • If you are seeking injunctive relief to stop the ongoing breach, standing is easier — risk of future harm is sufficient for injunctive claims even after TransUnion
  • Class certification compounds the problem — many class members have no documented actual harm even if a small subset do

Circuit approaches vary:

  • 9th Circuit (Zappos): More permissive — credible risk of future misuse of stolen credential data may be sufficient
  • 11th Circuit: More restrictive — actual misuse or specific, imminent risk of misuse generally required
  • This circuit split creates real incentives for plaintiff venue selection

Hurdle 3: Jurisdiction and Venue

Personal jurisdiction: A court must have authority over the defendant. For foreign hackers, establishing personal jurisdiction requires showing the defendant:

  • Purposefully directed conduct at the forum state, AND
  • The plaintiff's claim arises out of or relates to that conduct

Specific jurisdiction via "effects" doctrine: Courts applying Calder v. Jones (1984) in cyber contexts look at whether the defendant's attack targeted victims in the forum state and caused harm there. Courts have split on how specifically the hacker must have "targeted" the forum versus merely affecting persons there.

Venue: Even with valid personal jurisdiction, the case must be brought in the right federal district. As Auernheimer shows, cyber cases can fail on venue even when personal jurisdiction is sound — "where the crime happened" is genuinely ambiguous for distributed network attacks.

Forum non conveniens: Even if venue and jurisdiction are technically valid, defendants can seek dismissal for inconvenient forum — particularly relevant when the defendant is foreign.


Hurdle 4: Sovereign Immunity — The Dead End

No moment is more deflating for a breach victim than this one: counsel explains that the nation-state behind the attack cannot be sued in U.S. courts. Not really. Not practically. Not in any way that ends with a check.

Foreign Sovereign Immunities Act (FSIA): Foreign states are generally immune from suit in U.S. courts. State-sponsored hackers — employees of a foreign intelligence service — who are sued in their capacity as state actors may claim immunity.

The private contractor gap: WhatsApp v. NSO (9th Cir. 2021) held that private companies (even government contractors) do not qualify for FSIA immunity. This is a significant limitation on the immunity defense.

The terrorism exception: FSIA includes an exception for state sponsors of terrorism — suits against North Korean or Iranian government hackers may be cognizable under this exception. But judgments obtained against sovereign defendants face profound collection challenges.

Practical dead end for most plaintiffs: Suing a foreign government or its intelligence service for a cyberattack is possible in narrow circumstances, but collecting on any judgment requires additional proceedings against seized sovereign assets — a process measured in years and rarely fully successful.


Hurdle 5: Extradition and Cross-Border Custody — The Travel Trap

For criminal cases: Extradition requires:

  • A valid extradition treaty between the U.S. and the suspect's country
  • Dual criminality (the conduct must be criminal in both countries)
  • A political decision by the extraditing country to surrender the suspect

Practical limits:

  • Russia, China, North Korea, and Iran have no extradition treaties with the United States — suspects residing there are effectively immune from U.S. criminal process
  • Even treaty-based extradition can be denied on human rights or health grounds (Lauri Love, UK High Court — extradition denied to U.S. on mental health grounds)
  • Competing extradition requests (Russia's competing request for Nikulin) can delay or complicate transfer

The "travel trap": Many indicted foreign hackers are arrested when they travel to third countries with U.S. extradition treaties. This creates a de facto detention risk for named defendants — some effectively cannot travel internationally after indictment.

They are free. But they are also permanently grounded, living within invisible borders drawn by DOJ prosecutors half a world away.


Practical Decision Framework: Should You Sue the Hacker?

Step 1: Is the attacker identified?
  → No: Can you identify them through litigation (Doe subpoenas)? If not, civil suit is impractical.

Step 2: Is the attacker reachable?
  → Foreign state employee: FSIA immunity; collection nearly impossible
  → Foreign private actor in non-treaty country: Judgment obtainable in theory; collection very difficult
  → Foreign private actor in treaty country or U.S. person: Civil suit is viable

Step 3: Does the attacker have collectible assets?
  → No assets, no insurance: Judgment is worthless
  → Cryptocurrency: Government seizure + forfeiture may be more effective than civil judgment
  → Corporate assets: Civil judgment has value

Step 4: Is there a parallel government investigation?
  → Yes: Forfeiture and restitution through criminal proceedings may be more efficient
  → No: Civil suit may be the only recovery mechanism

Step 5: What relief do you actually need?
  → Stop ongoing access: TRO/injunction NOW — standing is easier for injunctive relief
  → Compensation: Civil damages claim — map standing carefully
  → Accountability: Consider whether supporting criminal prosecution is a better use of resources

Conclusion: Most cybercrime victims are better served by:
(a) Suing the breached organization (if a third party) for failure to secure their data
(b) Supporting criminal prosecution and pursuing restitution
(c) Filing insurance claims (cyber insurance)
than by filing civil suits directly against foreign attackers

Practitioner Takeaways

1. Standing is usually the merits in breach class actions — brief it first. Do not let a breach class action go to merits briefing without first securing standing. Plaintiffs must allege concrete, particularized harm — not just "our data was stolen." Defendants should file early standing challenges.

2. Civil suits against hackers are best reserved for identified, reachable defendants with assets. The cost-benefit analysis rarely favors filing civil suit against an unknown or offshore attacker. Exceptions: injunctive relief to stop ongoing access (lower standing threshold, immediate practical value) and cases where the attacker is domestically located.

3. Forfeiture through criminal proceedings is often more effective than civil judgment. If the government seizes cryptocurrency connected to the attack, victim counsel should actively participate in the restitution proceeding to ensure client losses are documented and considered in the distribution of seized assets.

4. Privilege questions around forensics reports require early attention. The forensics report is the bridge between technical attribution and legal proceedings. Whether it is protected by attorney-client privilege or work product doctrine, and whether the government can compel it in a parallel criminal investigation, are questions that must be resolved at engagement, not at deposition.

5. Document losses with litigation in mind from day one. Every hour of response cost, every forensics invoice, every consumer notification cost, every lost revenue calculation — documented contemporaneously with receipts — is potentially recoverable under CFAA, state statutes, and restitution orders. Companies that reconstruct their losses months later face credibility challenges.


Quiz

See: artifacts/quizzes/quiz-01f.md

Test your knowledge

Ready to check what stuck?

10 questions — cases, statutes, and the practical move for each. Takes 5 minutes.

Take the quiz now →