Non-Lawyers Summary
Five doctrinal areas that don't make headlines but determine what actually happens after a cybercrime prosecution or regulatory action:
- Restitution — Courts can order hackers to repay victims for investigation costs, notification expenses, and downtime revenue. The numbers are often larger than the prison sentence and almost always uncollectable.
- Parallel proceedings — The DOJ, SEC, FTC, and private plaintiffs can all sue the same defendant at the same time. Invoking the Fifth Amendment in one proceeding can blow up another.
- Crypto forfeiture — DOJ seizes Bitcoin by controlling the private key, not by breaking cryptography. Blockchain traceability means "crypto is anonymous" is a myth prosecutors now routinely disprove.
- OFAC ransomware liability — Paying ransom to a sanctioned group (even unknowingly) is a sanctions violation. Enforcement is discretionary, but the liability is not.
- Critical infrastructure sentencing — Attacking a hospital or power grid does not create a separate crime, but it triggers sentencing enhancements that can double or triple time served.
The call came at 3:47 a.m. to a hospital's on-call security director. Ransomware. Every clinical workstation locked. Nurses charting on paper. Surgical procedures postponed. By the time the incident response firm arrived six hours later, the attackers had been inside the network for eleven days. The ransom demand: $4.2 million in Bitcoin, payable to a wallet that — as the IR firm would discover three days later — belonged to a group OFAC had designated six months prior.
Nobody in the boardroom understood what that designation meant. Within 48 hours, their outside counsel did. Paying the ransom was a sanctions violation. Not paying meant another week of downtime. And the DOJ's parallel investigation — which had opened the moment the hospital filed an FBI complaint — meant that every document they produced to the FBI could be subpoenaed by the SEC's enforcement division, which was separately investigating whether the hospital had disclosed the breach material to investors. Three forks in the same road, and every choice on one fork could destroy the case on another.
This is the hidden architecture of cybercrime law. Not the headline charges — the quiet machinery that determines what actually happens after the indictment, the breach notice, and the ransom decision. Restitution orders that follow defendants for life. Privilege waivers that collapse criminal defenses. Crypto wallets seized without breaking a single algorithm. This module maps all of it.
What This Module Answers Fast
| Question | Section |
|---|---|
| What costs count as "loss" under the CFAA for restitution? | Restitution — Key Facts |
| Can I plead the Fifth in an SEC civil case without hurting my criminal case? | Parallel Proceedings — Fifth Amendment |
| How did DOJ recover Colonial Pipeline ransom if Bitcoin is encrypted? | Crypto Forfeiture — How DOJ Seizes |
| Is using Tornado Cash illegal? | Crypto Forfeiture — Tornado Cash |
| We paid ransom to avoid downtime — are we criminally liable? | OFAC — Safe Harbor |
| Does attacking a hospital get you a longer sentence? | Critical Infrastructure — Enhanced Sentencing |
| What is the Evil Corp alias problem? | OFAC — Evil Corp |
| What was the largest crypto seizure in DOJ history? | Crypto Forfeiture — Key Cases |
Overview
Five doctrinal pressure points. Each one quietly reshapes the real aftermath of a cybercrime — and none of them make the headlines.
- Restitution orders routinely exceed sentences in psychological and financial impact but are structurally uncollectable from incarcerated defendants.
- Parallel proceedings create cross-forum privilege problems that neither criminal defense attorneys nor civil litigators consistently anticipate.
- Cryptocurrency forfeiture is now a mature DOJ capability — the limiting factor is private key access, not cryptographic strength.
- OFAC ransomware liability shifts accountability upstream from hacker to victim-organization and their insurers, creating a chilling effect on incident disclosure.
- Critical infrastructure sentencing enhancements turn what would be a 5-year statutory maximum into a 10-year maximum with Guideline-level multipliers that compound on top.
Audience: hackers building threat models, incident responders advising clients post-breach, corporate security teams navigating insurer and regulatory pressure to pay or not pay ransomware demands.
Start Here If Your Issue Is...
| Situation | Go To |
|---|---|
| Calculating potential CFAA sentencing exposure | Restitution Calculation |
| Defendant in both civil SEC case and DOJ grand jury investigation | Parallel Proceedings — Stay Doctrine |
| Company paid ransom; IR firm asking whether to report to FBI | OFAC — Safe Harbor |
| IR firm preparing incident response report for legal counsel | Parallel Proceedings — Privilege |
| Crypto wallet seized; client claims funds are legitimate | Crypto Forfeiture — Seizure Mechanics |
| Ransomware affiliate attacked hospital or water utility | Critical Infrastructure — Enhanced Sentencing |
| Client not sure if ransomware group is OFAC-designated | OFAC — Evil Corp Alias Problem |
| Defense attorney challenging inflated restitution claim | Restitution — Defense Arguments |
Issue Map
flowchart TD
A[Cybercrime Incident] --> B{Criminal Prosecution?}
B -->|Yes| C[CFAA Charges\n18 U.S.C. § 1030]
B -->|Yes| D[Restitution Order\n18 U.S.C. § 3663A]
B -->|No| E[Civil / Regulatory Only]
C --> F{Critical Infrastructure\nTarget?}
F -->|Yes| G[Enhanced Penalties\n10yr max + USSG 2B1.1 b18]
F -->|No| H[Standard Penalties\n5yr max]
A --> I{Ransom Paid?}
I -->|Yes| J{OFAC-Designated\nGroup?}
J -->|Yes| K[Sanctions Liability\nOFAC Advisory Sept 2021]
J -->|Unclear / Alias| L[Evil Corp Alias Risk]
J -->|No| M[No OFAC exposure]
I -->|No| N[No OFAC Issue]
A --> O{Crypto Assets\nInvolved?}
O -->|Yes| P[Forfeiture\n18 U.S.C. §§ 981 / 982]
P --> Q[DOJ Needs Private Key\nNot Crypto Crack]
A --> R{Multiple Enforcement\nActions?}
R -->|Yes| S[Parallel Proceedings]
S --> T[5th Amendment\nAdverse Inference Risk]
S --> U[Stay Doctrine\nLandis 1936]
S --> V[Privilege Issues\nIR Reports Discoverable]Timeline Overview
timeline
title Key Doctrinal Milestones — Cybercrime Sentencing & Forfeiture
2000 : US v. Middleton 9th Cir
: CFAA loss includes security/investigation costs without data destruction
2011 : US v. Szymuszkiewicz 7th Cir
: Surveillance costs to investigate intrusion counted as loss
2013 : Silk Road Seizure
: 144000 BTC from Ulbricht laptop at arrest
2019 : Evil Corp Designation
: OFAC designates Maksim Yakubets and Evil Corp
: Dridex operators begin alias rotation
2020 : Second Silk Road Wallet
: DOJ recovers 70000 BTC from hidden wallet
2021 : Colonial Pipeline Recovery
: FBI recovers 63.7 BTC of DarkSide ransom
2021 : OFAC Ransomware Advisory Updated
: Paying sanctioned groups = sanctions violation regardless of victim status
2023 : Tornado Cash Indictment
: Roman Storm indicted for mixer operation
: First criminal prosecution of smart contract developer for laundering by tool
2024 : Bitfinex Recovery Sentencing
: 94636 BTC recovered — largest DOJ financial seizure
: ALPHV BlackCat designated by OFAC
: Change Healthcare breach — 100M patients affectedKey Facts
| Stat / Threshold | Value | Source |
|---|---|---|
| CFAA federal jurisdiction threshold | $5,000 loss to any single victim | 18 U.S.C. § 1030(c)(4)(A)(i)(I) |
| Standard CFAA max (first offense) | 5 years | 18 U.S.C. § 1030(c)(4)(A) |
| Critical infrastructure CFAA max (first offense) | 10 years | 18 U.S.C. § 1030(c)(4)(B) |
| USSG critical infrastructure enhancement | +4 levels | USSG § 2B1.1(b)(18) |
| OFAC civil penalty cap | Greater of $1,000,000 or 2x transaction value | 50 U.S.C. § 1705(a) |
| OFAC criminal penalty (willful) | Up to 20 years | 50 U.S.C. § 1705(c) |
| Albert Gonzalez restitution ordered | $200M+ | US v. Gonzalez (D. Mass. 2010) |
| Largest DOJ crypto seizure | $3.6B (94,636 BTC, Bitfinex hack) | US v. Lichtenstein & Morgan (2024) |
| Colonial Pipeline ransom paid | ~$4.4M (75 BTC) | Public disclosure, May 2021 |
| Colonial Pipeline BTC recovered | 63.7 BTC (~$2.3M at recovery) | DOJ press release, June 2021 |
| CNA Financial ransom reportedly paid | $40M (Phoenix Cryptolocker) | Bloomberg, May 2021 |
| Change Healthcare ransom paid | $22M | UnitedHealth disclosure, 2024 |
| Change Healthcare patients affected | 100M+ | HHS OCR, 2024 |
| UHS attack (September 2020) estimated loss | ~$67M | UHS Q3 2020 earnings disclosure |
| OFAC-designated ransomware groups (as of 2025) | Evil Corp, Lazarus Group, REvil/Vasinskyi, ALPHV/BlackCat | OFAC SDN List |
| Critical infrastructure sectors per PPD-21 | 16 | Presidential Policy Directive 21 (2013) |
1. The Bill That Never Gets Paid — Restitution in Cybercrime Cases
The Calm Before the Sentence
Albert Gonzalez sat in a Massachusetts courtroom in 2010, his fate already sealed by a guilty plea. The judge knew what was coming: concurrent 20-year sentences, the longest ever handed down for computer crime at the time. What the galleries didn't fully grasp was the other number — the one that would trail Gonzalez for the rest of his life like a shadow that never shrinks.
Over $200 million in restitution.
Not a fine to the government. A debt to the victims. Payable in full. Non-dischargeable in bankruptcy. Owed by a man who would spend two decades in federal prison.
No one would ever collect it.
But that wasn't the real story. The real story was the machine that calculated that number — and what it means for anyone who touches a system they shouldn't.
Statutory Framework
Restitution in federal cybercrime cases is governed by two overlapping statutes:
18 U.S.C. § 3663A — Mandatory Victims Restitution Act (MVRA) The MVRA requires courts to order restitution for "an offense against property" — which includes CFAA violations — to each identifiable victim. Restitution under the MVRA is not discretionary for qualifying offenses. The court must order the full amount of each victim's losses, regardless of the defendant's ability to pay.
18 U.S.C. § 1030(e)(11) — CFAA "Loss" Definition Loss under the CFAA means "any reasonable cost to any victim, including the cost of responding to an offense, conducting a damage assessment, and restoring the data, program, system, or information to its condition prior to the offense, and any revenue lost, cost incurred, or other consequential damages incurred because of interruption of service."
This definition serves double duty: it establishes the $5,000 threshold for federal jurisdiction and it informs the Sentencing Guidelines loss table that drives the offense level.
Sentencing Guidelines: USSG § 2B1.1 — The Loss Table
This is where a breach becomes a sentence. The Guidelines calculate cybercrime sentences primarily through the loss table at USSG § 2B1.1(b)(1). Each threshold is a ratchet that clicks upward:
| Loss Amount | Offense Level Addition |
|---|---|
| More than $6,500 | +2 |
| More than $15,000 | +4 |
| More than $40,000 | +6 |
| More than $95,000 | +8 |
| More than $150,000 | +10 |
| More than $250,000 | +12 |
| More than $550,000 | +14 |
| More than $1,500,000 | +16 |
| More than $3,500,000 | +18 |
| More than $9,500,000 | +20 |
| More than $25,000,000 | +22 |
| More than $65,000,000 | +24 |
| More than $150,000,000 | +26 |
| More than $250,000,000 | +28 |
| More than $550,000,000 | +30 |
Additional enhancements apply for: sophisticated means (+2), organized criminal group (+4), substantial number of victims (+2 to +6), targeting critical infrastructure (+4 under USSG § 2B1.1(b)(18)).
What Counts as "Loss" — The Circuits Disagree, But You Still Pay
Revenue lost during attack-related downtime: The majority of circuits include lost revenue during the period of service interruption as a cognizable CFAA loss. Courts examine whether the revenue loss was directly caused by the intrusion and not speculative.
Notification costs: Generally included. Courts treat statutory breach notification obligations as "reasonable costs to respond to the offense" — the notification duty was triggered by the offense, so costs are attributable to it.
Credit monitoring offered to victims: Split authority. Some courts treat proactively offered credit monitoring as a "reasonable cost to respond." Others reject it as voluntary spending not caused by the intrusion itself.
Investigation and remediation costs: Broadly included. Forensic investigation, incident response firm fees, security consultant costs, system restoration, and rehiring to replace compromised staff all qualify.
The Two Cases That Drew the Map
US v. Middleton, 231 F.3d 1207 (9th Cir. 2000)
A disgruntled former employee. A deleted customer database. Passwords changed overnight to lock everyone out. The Ninth Circuit faced a deceptively simple question: does it count as "loss" if the primary harm was disruption, not permanent destruction? The answer — yes — established that investigation costs are recoverable even where the data walks back through the door unscathed. You don't have to destroy something to generate a federal restitution bill.
US v. Szymuszkiewicz, 622 F.3d 701 (7th Cir. 2011)
A federal employee. His supervisor's email. A secret interception running silently for months. No files deleted. No passwords changed. No data destroyed. Just a man reading another person's inbox. The Seventh Circuit held the government's cost to hire a private investigator — to surveil Szymuszkiewicz and confirm the intrusion — constituted CFAA "loss." The surveillance costs to catch the crime counted as part of the crime's damage. In a federal courtroom, the cost of proving you did it becomes part of what you owe.
Defense Arguments Against Loss Inflation
Speculative revenue loss: Prosecution relies on executive testimony about "what we would have made." Defense argues projections aren't losses. Most effective where claims extend beyond the immediate downtime window.
Double-counting notification costs: Where an independent state-law breach notification obligation would have triggered regardless of the federal offense, the federal restitution order shouldn't include costs the company would have borne anyway.
Reasonable cost challenge: The MVRA requires "reasonable" costs. Defense challenges excessive IR billing rates, unnecessary forensic scope, or remediation work that went beyond offense-related restoration into pre-existing deferred maintenance.
Loss inflation generally: Large organizations facing a breach routinely generate massive remediation invoices that include overhead, opportunity costs, and security improvements the company should have made before the breach. Defense examines each line item for nexus to the specific offense.
The Paradox That Defines the Doctrine
Restitution orders in cybercrime cases are frequently nominal. Albert Gonzalez — 90 million stolen credit cards, over $200 million ordered — will serve his sentence long before any meaningful restitution is collected. The MVRA does not cap restitution at the defendant's ability to pay. Courts must order the full amount. The money almost never appears.
But the number matters. It becomes the ceiling for victim civil litigation. It anchors damage calculations in subsequent class actions. And for corporate defendants in parallel proceedings — companies, not individuals — restitution through plea agreements is often collectible, negotiated alongside fines and disgorgement. That is a different story entirely.
2. The Many-Front War — Parallel Civil and Criminal Proceedings
The Disruption
December 2020. A quiet morning in the security community shattered when Volexity and FireEye reported that SolarWinds' Orion software had been weaponized. Trojanized updates had been pushed to 18,000 customers. Treasury, State, Justice, defense contractors — all of them, already breached, for months.
But what happened next would define the law for a different decade.
The Multi-Forum Reality
A single cybersecurity incident can trigger simultaneous enforcement actions across multiple authorities:
- DOJ Criminal Division: grand jury investigation, CFAA charges, wire fraud, money laundering
- SEC: civil enforcement action for material misstatement of cybersecurity risk or delayed breach disclosure (Securities Exchange Act § 10(b) and Rule 10b-5)
- FTC: civil enforcement under Section 5 of the FTC Act for unfair or deceptive practices in data security representations
- State AGs: enforcement under state breach notification laws and consumer protection statutes
- Private plaintiffs: class action litigation by breach victims
- Regulatory bodies: HHS OCR for HIPAA violations, OCC for banking regulators, FERC for energy sector
These proceedings run on independent tracks. The same facts are litigated simultaneously before different forums with different evidentiary standards, different privilege rules, and different burdens of proof.
The SolarWinds Pattern
The SolarWinds breach demonstrates the full parallel proceeding architecture in motion:
- SEC (civil): Filed charges in October 2023 against SolarWinds and its CISO Timothy Brown for fraud and internal control failures — the company had misrepresented its cybersecurity posture before and after the breach. The SEC action resolved in 2024.
- DOJ (criminal): Grand jury investigation ongoing as of 2025. No criminal charges filed.
- Private plaintiffs: Shareholder derivative suits and class action litigation filed in multiple districts.
- Congressional investigations: Senate Intelligence Committee hearings running concurrently.
The CISO personally faced civil SEC enforcement. Not the company. The individual. This wasn't a story about a breach anymore — it was a story about what you said about your security before it happened.
Fifth Amendment Trap — The Paradox That Has No Clean Exit
In a criminal proceeding, the Fifth Amendment right to remain silent is absolute. The jury is instructed not to draw adverse inferences.
In a civil proceeding — that runs simultaneously — the civil court may draw adverse inferences from the same silence. This creates an impossible calculus:
- Testify in civil proceedings to avoid adverse inference? The criminal prosecution now has your transcript.
- Invoke the Fifth in civil proceedings? The civil fact-finder treats your silence as evidence against you.
There is no clean solution. Defense counsel must weigh both forums simultaneously. Every decision in one proceeding is a move in the other.
The Stay — Landis v. North American Co., 299 U.S. 248 (1936)
The Supreme Court recognized that federal courts have inherent power to stay civil proceedings pending related criminal investigations. The power derives from the court's authority to manage its docket and prevent interference with justice.
Courts applying Landis weigh:
- Overlap of issues: How substantially do the civil and criminal matters share common factual and legal questions?
- Stage of criminal proceeding: A stay is more likely when the criminal investigation is at the grand jury stage and charges are imminent.
- Harm to civil plaintiff from delay: Witnesses may become unavailable, evidence may be lost.
- Interests of the public and courts: Judicial economy favors resolving related issues once.
A company under SEC investigation for breach disclosures can move to stay SEC civil proceedings pending the DOJ criminal investigation. Courts often grant partial stays — staying depositions but not document production — rather than full stays.
Privilege — The IR Report Trap
The core problem: After a breach, companies hire IR firms. Those reports are detailed, specific, and highly damaging if disclosed in litigation. Whether they are protected turns entirely on how the engagement was structured.
Attorney-client privilege: An IR firm engaged directly by outside counsel — rather than directly by the company — to assist counsel in providing legal advice may be covered. The engagement letter, billing, and reporting structure all matter.
Work product doctrine: Materials prepared "in anticipation of litigation" by or for a party's attorney. IR reports prepared after a breach, when litigation is reasonably anticipated, may qualify. But courts have gone both ways.
The practical limit: Even properly structured privilege can be overcome if the company shares the IR report with third parties without a common interest agreement. Sharing with insurers is particularly dangerous — courts have held that disclosure to insurers waives privilege.
Garner v. Wolfinbarger doctrine: In shareholder derivative suits, corporate attorney-client privilege may not be asserted against the corporation's own shareholders where good cause is shown. The IR report held as privileged can become accessible to shareholder plaintiffs.
3. The Permanent Ledger — Cryptocurrency Seizure and Forfeiture
The Myth That Built a Legend
For years, the myth held. Bitcoin was anonymous. Transactions were untraceable. A ransomware operator in Magnitogorsk could drain a hospital in Pittsburgh and disappear into the blockchain fog, forever beyond reach.
In May 2021, Colonial Pipeline paid roughly $4.4 million — 75 BTC — to a DarkSide affiliate to restore fuel delivery to the Eastern Seaboard. The story everyone expected: the money was gone. The story that actually happened: within weeks, the FBI recovered 63.7 BTC.
The blockchain had been read the whole time.
Statutory Framework
Federal crypto forfeiture operates under three primary statutes:
18 U.S.C. § 981 — Civil Forfeiture: Authorizes civil forfeiture of property constituting or derived from proceeds of specified unlawful activity, including wire fraud, CFAA violations, and money laundering. Government files civil action against the property itself (in rem) — the defendant need not be convicted or even charged.
18 U.S.C. § 982 — Criminal Forfeiture: Authorizes criminal forfeiture as part of sentencing. After conviction, court orders forfeiture of property involved in or traceable to the offense.
21 U.S.C. § 853: The primary criminal forfeiture statute broadly applied by cross-reference. Includes substitute asset provisions — if directly traceable property is unavailable, the court can order forfeiture of substitute assets of equivalent value.
How DOJ Actually Seizes Cryptocurrency — The Reality Behind the Legend
The mechanism is almost never cryptographic compromise. DOJ seizes crypto through:
1. Private key access at arrest: Defendant's devices seized at arrest contain wallet files, seed phrases, or direct private key material. This is how Silk Road's primary wallet was seized — agents arrested Ulbricht in a San Francisco library and grabbed his laptop before he could close it. The unencrypted wallet was accessible.
2. Seizure warrant for wallet address: DOJ identifies specific wallet addresses through blockchain analysis (Chainalysis, Elliptic, CipherTrace are common tools). If self-custodied, DOJ needs the key itself.
3. Cooperation from cryptocurrency exchanges: If traced funds reach a KYC-compliant exchange, DOJ issues subpoena or emergency request. Exchange must comply. This is why mixing is used — to break the traceable link.
4. Infrastructure takedown: Law enforcement operations against ransomware C2 servers or dark web infrastructure may recover private keys stored on seized servers.
5. Defendant cooperation: Plea agreements routinely include forfeiture of specific identified wallet addresses.
What DOJ cannot do: Break secp256k1 elliptic curve cryptography to recover a properly generated, properly stored private key from the public address alone. The limiting factor is key access, not cryptographic strength.
The Cases That Rewrote the Story
US v. Lichtenstein and Morgan — The $3.6 Billion Reveal
February 2022. DOJ arrested Ilya Lichtenstein and Heather Morgan — a cryptocurrency entrepreneur and a rapper who called herself "Razzlekhan" — for laundering proceeds of the 2016 Bitfinex exchange hack. 119,754 BTC stolen. By the time of arrest, 94,636 BTC remained in wallets under Lichtenstein's control. Valued at approximately $3.6 billion. The largest financial seizure in DOJ history.
The investigation was blockchain forensics combined with old-fashioned detective work. Lichtenstein had moved funds through darknet markets, chain-hopping through altcoins, and multiple mixing attempts. Chainalysis traced the funds despite the obfuscation. The critical break: DOJ obtained cloud storage account credentials, recovered encrypted files, and cracked the encryption on those files — standard AES encryption with a password, not Bitcoin cryptography — to find private key material.
The blockchain couldn't be broken. The password file could.
Lichtenstein pleaded guilty in 2023. Sentenced in 2024 to 5 years. Morgan sentenced to 18 months. The forfeiture of 94,636 BTC was ordered as part of plea.
DOJ Colonial Pipeline Recovery (2021)
The FBI obtained the DarkSide private key through its investigation. DOJ has not disclosed the full operational details. The price of Bitcoin dropped significantly between payment and recovery — which is why the dollar-amount recovery was lower than the original payment despite recovering most of the BTC. The money was almost there. The price moved.
Silk Road — The Open Laptop
Ross Ulbricht ran the world's most famous dark web marketplace from coffee shops. At his arrest in October 2013, agents grabbed his laptop while it was open and unlocked. The wallet was accessible. 144,000 BTC seized.
Seven years later, in November 2020, DOJ seized an additional 69,370 BTC from a wallet belonging to "Individual X" — an unnamed person who had hacked Ulbricht's Silk Road server and stolen funds before shutdown. Individual X cooperated and surrendered the private keys. DOJ sold those coins at auction over subsequent years for over $1 billion.
Tornado Cash — US v. Roman Storm — The Tool Becomes the Crime
August 2023. DOJ indicted Roman Storm — co-founder of Tornado Cash, an Ethereum smart contract-based cryptocurrency mixer — on three counts: money laundering conspiracy, sanctions violations, and operating an unlicensed money transmitting business.
The theory: Tornado Cash had processed over $1 billion in funds from Lazarus Group (North Korean state-sponsored hackers, OFAC-designated). Storm was charged with knowingly facilitating these transactions despite public knowledge that the mixer was being used by sanctioned parties.
This is the first criminal prosecution of a developer for money laundering through a tool they created. The legal theory extends the traditional money transmitter analysis to decentralized smart contracts — prosecutors argued Storm controlled key parameters of the protocol and profited from its operation.
The lesson lands like a revelation: writing code that sanctioned actors use may make you a money transmitter. The permissionless blockchain does not provide permission from the law.
4. The Trap for Victims — OFAC Ransomware Payment Liability
The Revelation That Changed Everything
CNA Financial, one of the largest insurance companies in the United States, paid $40 million in March 2021 to restore access to its own systems. The group they paid called itself "Phoenix Cryptolocker." Months later, Bloomberg connected the dots: Phoenix Cryptolocker was Evil Corp — designated by OFAC in December 2019.
CNA had paid a sanctioned entity. Not knowingly. Not willingly. Coerced, by ransomware, into a transaction that may have constituted a federal sanctions violation.
No enforcement action was announced. But the liability had already accrued.
The Regulatory Framework
The Office of Foreign Assets Control (OFAC) administers U.S. economic sanctions. The International Emergency Economic Powers Act (IEEPA, 50 U.S.C. §§ 1701-1707) provides the statutory authority.
In September 2021 (updating an October 2020 advisory), OFAC issued definitive guidance: paying, facilitating, or processing a ransomware payment to an OFAC-designated individual or entity violates U.S. sanctions law. This applies regardless of:
- Whether the victim knew the threat actor was a designated entity
- Whether the victim was coerced
- Whether an intermediary — cyber insurance company, incident response firm, cryptocurrency exchange — made the actual payment on the victim's behalf
Strict liability: OFAC sanctions violations can be assessed on a strict liability basis for civil penalties — actual knowledge of the designation is not required. The question for criminal penalties is whether the violation was willful.
The Designated — Names That Trigger Liability
Evil Corp / Maksim Yakubets: Designated December 2019. Operators of Dridex banking trojan and associated ransomware. Yakubets, a Russian national, has never been extradited.
Lazarus Group / North Korean State-Sponsored Actors: Designated under Executive Order 13722. Responsible for WannaCry, the Sony Pictures hack, the Bangladeshi Central Bank SWIFT heist, and an estimated $3+ billion in cryptocurrency theft since 2016.
REvil / Vasinskyi: Designated and indicted following the Kaseya attack.
ALPHV/BlackCat: Designated by OFAC in February 2024 — two weeks before the Change Healthcare attack, which UnitedHealth responded to with a $22 million ransom payment.
The Evil Corp Alias Problem — The Trap That Keeps Moving
Evil Corp is the paradigm case for why victims cannot simply check the SDN list at the time of payment.
After the December 2019 designation, Evil Corp operators spun off their ransomware under a series of new aliases specifically to avoid triggering victim recognition:
- WastedLocker (2020)
- Hades (2020-2021)
- Phoenix Cryptolocker (2021) — linked to the CNA Financial attack
- PayloadBin (2021)
- Macaw Locker (2021)
A victim organization may pay a ransom to what appears to be an undesignated group, only to have attribution published weeks or months later linking the group to a designated entity. The liability accrued at the time of payment — not at the time attribution was made public.
IR Firm exposure: Incident response firms that facilitate ransom payments are potentially liable as facilitators if they pay a designated group. Screening requires more than checking the ransom note's self-identification — it requires current threat intelligence on alias rotation.
OFAC Penalties
Civil penalties (non-willful violations): Up to the greater of $1,000,000 per violation or 2 times the value of the transaction.
Criminal penalties (willful violations): Up to $1,000,000 in fines and 20 years imprisonment per the IEEPA.
Aggravating factors OFAC weighs in enforcement:
- Deliberate or reckless conduct
- Large transaction volume or value
- Concealment from regulators
- Prior violations
- Harm to U.S. sanctions program objectives
Mitigating factors OFAC weighs:
- Voluntary self-disclosure
- Sanctions compliance program in place at time of violation
- Cooperation with investigation
- First-time violation
- Remediation steps taken
The Safe Harbor — Discretionary, Not Statutory
OFAC's 2021 advisory identifies factors that receive "significant weight" in enforcement decisions for ransomware victims:
- Existence of a sanctions compliance program at the time of payment
- Prompt and complete reporting to OFAC and law enforcement (FBI, CISA) within a reasonable timeframe
- Active cooperation with government investigators
These factors can result in a reduced or no civil monetary penalty. However, there is no statutory safe harbor — a compliant company that checks all three boxes still violated the law if they paid a sanctioned group. OFAC enforcement is a discretionary executive action, not a statutory immunity.
The decision to pay ransomware to a potentially-designated group is a bet that OFAC will exercise enforcement discretion favorably if disclosure is made promptly. The bet is most favorable where the victim had a real compliance program, disclosed immediately, and cooperated fully. The bet is least favorable where the victim tried to pay quietly without reporting.
Cyber insurance complications: Most ransomware cyber insurance policies now include OFAC exclusions — the policy will not cover ransom payments to OFAC-designated entities. This means the insurer's coverage question and the company's liability question are aligned in one respect but misaligned in another: the insurer has financial incentive to conduct attribution before authorizing payment; the victim has operational pressure to pay quickly.
5. The Hospital Attack — Critical Infrastructure and the Doubled Sentence
The Case That Never Came
September 2020. Düsseldorf, Germany. A ransomware attack hit the university hospital — not its target, but the malware landed there anyway. Systems went dark. A critically ill patient was rerouted 30 kilometers to another facility. She died during the delay.
German prosecutors investigated for negligent homicide. They ultimately concluded the delay was not the direct cause. The investigation was closed.
But the theory — that ransomware operators could face homicide-related charges for patient deaths — did not die with that investigation.
Statutory Framework for Enhanced Penalties
18 U.S.C. § 1030(c)(4)(B) — Enhanced Penalties: A defendant convicted under § 1030(a)(5) (damaging a protected computer) faces enhanced penalties if the offense:
- Affects a computer used in or for critical infrastructure (as defined by 42 U.S.C. § 5195c(e))
- Affects a computer of a department or agency of the United States government
- Affects 10 or more protected computers during any 1-year period
Enhanced maximum: 10 years (first offense); 20 years (subsequent offense)
Standard maximum without these factors: 5 years (first offense); 10 years (subsequent offense)
42 U.S.C. § 5195c(e) — Critical Infrastructure Definition: "Systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters."
The 16 Sectors — Presidential Policy Directive 21 (2013)
Any attack against these 16 sectors triggers the enhanced 10-year maximum:
- Chemical
- Commercial Facilities
- Communications
- Critical Manufacturing
- Dams
- Defense Industrial Base
- Emergency Services
- Energy
- Financial Services
- Food and Agriculture
- Government Facilities
- Healthcare and Public Health
- Information Technology
- Nuclear Reactors, Materials, and Waste
- Transportation Systems
- Water and Wastewater Systems
Healthcare, energy, water, and financial services are the most frequent ransomware targets — and the bulk of federal prosecutorial focus.
USSG Enhancement — USSG § 2B1.1(b)(18) — The Multiplier
Beyond the statutory maximum increase, the Sentencing Guidelines add a specific enhancement for critical infrastructure attacks:
USSG § 2B1.1(b)(18): If the offense resulted in "substantial disruption of a critical infrastructure" — +4 levels to the offense level.
This stacks. A major ransomware attack on a hospital system causing $10 million in losses might calculate like this:
- Base offense level: 6
- Loss $10M → +20 (USSG § 2B1.1(b)(1)(K))
- More than 10 victims → +2
- Sophisticated means → +2
- Critical infrastructure (substantial disruption) → +4
- Total: 34
Offense level 34, Criminal History Category I = 151-188 months (approximately 12.5-15.7 years) — well beyond the statutory maximum of 10 years, which then caps the sentence. The Guidelines are advisory post-Booker, but they heavily anchor the outcome.
The Cases That Define the Stakes
Universal Health Services (UHS) — September 2020 Ryuk ransomware. 400 hospitals and healthcare facilities across the United States, offline simultaneously. Surgeries delayed. Ambulances diverted. Handwritten records. UHS estimated losses of approximately $67 million in its Q3 2020 earnings disclosure. No U.S. criminal convictions obtained for this attack as of 2025.
Change Healthcare / UnitedHealth Group — February 2024 The largest healthcare breach in U.S. history. An ALPHV BlackCat affiliate attacked Change Healthcare — which processes approximately 40% of U.S. medical claims. Systems offline for weeks. UnitedHealth paid approximately $22 million in ransom.
Then ALPHV exit-scammed their own affiliate: received the payment, shut down their infrastructure, and did not provide the decryptor to the group that conducted the attack. The affiliate attempted to sell the stolen data separately through RansomHub.
Over 100 million patients affected. UnitedHealth Group total costs expected to exceed $2.5 billion. The OFAC designation of ALPHV — two weeks before the payment — created potential OFAC liability. No enforcement action announced as of 2025. The exposure remains.
The Involuntary Manslaughter Theory — Viable. Not Yet Tested.
No U.S. criminal conviction has been obtained for a ransomware attack on a hospital where patient harm resulted. If a patient can be shown to have died as a direct result of delayed care attributable to a ransomware attack, a U.S. prosecution for homicide-related charges — potentially involuntary manslaughter, 18 U.S.C. § 1112 — against operators is legally feasible.
The practical barriers are attribution and extradition. Most ransomware operators reside in non-extradition jurisdictions. But the legal theory is not speculative. It is available. And DOJ's Ransomware and Digital Extortion Task Force has it in view.
For IR professionals advising hospital clients: The patient safety dimension is not only a regulatory risk — it is potential evidence in the most serious criminal charges available. Documenting care disruption during an incident, including specific patient diversions and procedure delays, is not just a regulatory obligation. It is evidence preservation.
Practical Takeaways
For hackers and red teams building threat models:
- CFAA "loss" is broadly defined and routinely exceeds what you think — IR costs, notification costs, and downtime revenue compound quickly past the $5,000 jurisdictional threshold to numbers that push offense levels into double-digit years.
- The critical infrastructure sentencing tier is not a separate crime — it is the same CFAA charge with a doubled statutory maximum and +4 Guidelines enhancement. Targeting a hospital, water utility, or financial institution is the same act with dramatically different consequences.
- Cryptocurrency does not provide anonymity. It provides a permanent public ledger. Blockchain forensics firms can trace funds through mixing and chain-hopping in the majority of cases. The limiting factor is private key access, not cryptographic strength.
For incident responders:
- Privilege protect your IR report from day one. Engagement through outside counsel with a clear mandate for legal advice, controlled disclosure, and a common interest agreement with insurance counsel is not bureaucratic formality — it is the difference between a protected work product and a discovery document in the subsequent class action.
- OFAC screening before recommending ransom payment is now a baseline professional obligation. Screening requires more than checking the ransom note's self-identification — it requires current threat intelligence on alias rotation for known designated groups.
- Document patient safety impacts in healthcare engagements. This serves regulatory, insurance, and law enforcement purposes simultaneously.
For corporate security teams:
- Parallel proceedings are the rule, not the exception, for material breaches at public companies. SEC, DOJ, FTC, state AGs, and private plaintiffs will all receive your breach notification and act on it. Plan your disclosure strategy with lawyers who understand all four forums simultaneously.
- The OFAC safe harbor is discretionary. Prompt reporting to law enforcement (FBI, CISA) and active cooperation are the strongest available mitigation — but they are not a legal guarantee.
- Restitution orders are uncollectable from individual defendants but create significant precedent for civil damage calculations. The "loss" numbers DOJ argues at sentencing become reference points in victim civil litigation.
What This Module Does Not Cover
- HIPAA enforcement mechanics — civil monetary penalties, OCR investigation process, corrective action plans (see Module 01i — HIPAA Security Rule)
- State-level data breach notification statutes — 50-state survey of timing requirements, content requirements, and AG enforcement (see Module 01b — State Breach Notification)
- International ransomware extradition — the mechanics of mutual legal assistance treaties (MLATs), Interpol Red Notices, and the practical limits of extraditing defendants from Russia, China, North Korea, and Iran
- CIRCIA mandatory incident reporting — 72-hour and 24-hour reporting obligations for critical infrastructure owners and operators (see Module 01h — CIRCIA)
- SEC cybersecurity disclosure rules — Form 8-K 4-day material incident disclosure, annual Form 10-K cybersecurity risk factor requirements effective December 2023
- Insurance coverage disputes — insurer denial of ransomware claims on war exclusion or OFAC exclusion grounds (emerging litigation area)
- FTC Section 5 enforcement — the FTC's independent civil enforcement authority for inadequate data security practices
For Non-Technical Readers
Why these five areas matter more than headlines suggest:
When a major ransomware attack happens, coverage focuses on the ransom demand, whether it was paid, and how long systems were down. The legal aftermath is more complex and more consequential for everyone involved.
Restitution means the hacker can be ordered to pay the victim back — but those orders are frequently for tens or hundreds of millions of dollars owed by someone who will spend the next two decades in federal prison. The money rarely appears. The victim's real recovery comes from cyber insurance and civil litigation against their own company's leadership for inadequate security.
Parallel proceedings means a company can face criminal investigation, an SEC lawsuit, a consumer class action, and state AG enforcement simultaneously — all arising from the same breach. Each proceeding has different rules about what you have to say and what you can keep confidential. Saying the wrong thing in the wrong proceeding at the wrong time is how companies that handled the breach adequately still end up paying billions in subsequent litigation.
Crypto forfeiture means the common belief that paying ransom in Bitcoin makes it untraceable is operationally false. Government forensics firms can trace most cryptocurrency flows. The question is whether they can access the private key — not whether they can read the blockchain. They can always read the blockchain.
OFAC liability means that when a hospital pays a ransomware group to restore patient care, the hospital — the victim — may have committed a federal sanctions violation. The law does not distinguish between willing payments and coerced payments to sanctioned entities. Enforcement is discretionary, but the legal exposure is real and the safe harbor is not guaranteed.
Critical infrastructure sentencing means that attacking a hospital or power grid is legally treated as the same act as attacking a tech company's internal systems, but with twice the maximum prison term and sentencing multipliers that can push Guidelines recommendations well above the statutory cap.
None of these outcomes are intuitive. All of them are the current law.
Test your knowledge
Ready to check what stuck?
10 questions — cases, statutes, and the practical move for each. Takes 5 minutes.