top of page

Australia’s New Mandatory Ransomware-Payment Reporting: What Every Business Needs to Know


Image of Australia and ransomware warning
Ransomware Reporting

New Mandatory Ransomware-Payment Reporting, Why this change matters

On 30 May 2025, Australia introduced a world-first requirement: certain organisations must notify the Australian Signals Directorate (ASD) whenever they transfer money or anything of value to ransomware or cyber-extortion criminals. The reform, set out in Part 3 of the Cyber Security Act 2024 and fleshed out by the Cyber Security (Ransomware Payment Reporting) Rules 2025, is aimed at dragging ransom activity out of the shadows so government and industry can finally see the whole picture.

Who must report?

  1. Annual-turnover test – Any “reporting business entity” with ≥ AUD 3 million turnover in the previous financial year. A pro-rata formula applies if you only traded part-year.

  2. Critical-infrastructure operators – Responsible entities under the Security of Critical Infrastructure Act 2018 are automatically in scope, regardless of turnover.

Pro tip for SMEs: The AU $3 m threshold captures roughly the top 6.5 % of Australian businesses, but even smaller firms in critical supply chains may be swept in via the infrastructure

What counts as a “payment”?


  • Cash, crypto, bank transfers

  • Non-monetary benefits such as gift cards, services, or other concessions offered

The 72-hour clock


If you pay (or learn that someone paid on your behalf) you must lodge a report via the ASD’s online form within 72 hours. Late or missing reports risk a civil penalty of 60 penalty units (~ AU $18,000 at today’s rates).

What goes into the report?

Category

Examples of required details

Entity info

ABN, contact person, turnover bracket

Incident timeline

When the attack occurred & when it was discovered

Technical details

Malware/ransomware variant, exploited vulnerability

Impact

Effect on your business & customers

Extorter’s demand

Amount/asset type requested & paid

Negotiation history

Timing & nature of messages with the attacker


Two-phase rollout

Phase

Dates

Regulatory stance

“Education-first”

30 May – 31 Dec 2025

Guidance & outreach; enforcement only for egregious non-compliance

Full enforcement

1 Jan 2026 onward

Active monitoring & penalties for breaches


Why does the government want the data?

  • Map active threat actors and their preferred tactics.

  • Provide tailored advice to industry sectors, particularly small to medium-sized enterprises (SMEs).

  • Shape future cyber-policy and defence.

Privacy & Legal protections


Information in a ransomware-payment report is shielded from use in most civil or criminal proceedings (except false-statement offences). Legal-professional privilege is preserved.

Action checklist for CISOs & MSPs


  1. Update your incident-response playbook – Add a “Report to ASD within 72 h” step and name an internal owner.

  2. Tag payments early – Finance teams should flag any unusual crypto or offshore transfers immediately to security.

  3. Prepare evidence templates – Capture extortioner comms, ransom notes, and system logs in a standard packet.

  4. Brief the board – Directors need to understand the penalties and reputation impacts of non-compliance.

  5. Run a tabletop exercise – Simulate a ransomware scenario that includes drafting and lodging the ASD form.

  6. Leverage the data – Monitor anonymised threat-trend reports, ASD plans to release and feed them into your protective controls roadmap.


Looking ahead


Australia is now the testbed for compulsory ransom reporting. Other jurisdictions (UK, EU, several US states) are watching closely. Expect global harmonisation talks once the Australian scheme’s first-year data emerges.


For local businesses, early compliance isn’t just about avoiding fines; it’s an opportunity to refine incident response, influence future policy, and demonstrate cyber-maturity to customers.


Need help aligning your runbooks or coaching clients through the new obligation? Our cyber-response team at Q10 Systems can run a compliance gap assessment in a single afternoon. Contact us today


(This is general information, not legal advice. Consult counsel for formal opinions.)

bottom of page