Risk Management Strategies

Cyber Ransom Payments in India: Insurance Coverage, Legal Boundaries, and the OFAC Sanctions Trap

An expert analysis of whether Indian cyber insurance policies actually cover ransomware extortion payments, how the IT Act 2000, DPDP Act 2023, and CERT-In directives shape the legal boundaries of paying threat actors, and why OFAC sanctions screening is now a non-negotiable step before any ransom disbursement.

Tarun Kumar Singh
Tarun Kumar SinghStrategic Risk & Compliance SpecialistAIII · CRICP · CIAFP
16 min read
cyber-insuranceransomwareransom-paymentirdaiit-act-2000cert-indpdp-actofac-sanctionscyber-extortionrisk-management

Last reviewed: April 2026

The Ransom Dilemma: Why Indian Businesses Are Paying and What It Costs Them

Ransomware attacks against Indian businesses have moved from a theoretical risk to a recurring operational crisis. CERT-In's incident reporting data shows a steep acceleration in ransomware events targeting Indian enterprises, with manufacturing, healthcare, financial services, and logistics firms bearing a disproportionate share. The average ransom demand against mid-market Indian companies now sits between INR 2 crore and INR 15 crore, with large enterprises facing demands that routinely cross the INR 50 crore threshold. The economic pressure to pay is intense: a manufacturing plant losing INR 40 lakh per day in production downtime, or a hospital unable to access patient records during a medical emergency, faces a calculus where paying the ransom appears cheaper and faster than the alternative.

Yet the decision to pay a ransom is far more complex than a simple cost comparison. Payment does not guarantee data recovery. Research from global incident response firms consistently shows that roughly 20-25% of organisations that pay receive either defective decryption keys or no keys at all. Even when decryption succeeds, the median time to restore systems from the decryption point is 10-15 days, not the instant recovery that desperate decision-makers imagine. The total cost of a ransomware event, including forensic investigation, business interruption, notification costs, regulatory penalties, and reputational damage, typically runs 5-10 times the ransom amount itself.

For Indian businesses, the ransom payment decision also carries a set of legal and regulatory consequences that most boards and CISOs do not fully appreciate at the moment the demand arrives. India does not have a blanket statutory prohibition on ransom payments, unlike the position in some other jurisdictions. However, the intersection of the Information Technology Act 2000, the Digital Personal Data Protection Act 2023, CERT-In's mandatory reporting directives, RBI guidelines for regulated entities, and the extraterritorial reach of US OFAC sanctions creates a legal environment where an unadvised payment can expose the organisation to criminal liability, regulatory sanctions, and even policy voidance under the very cyber insurance policy the company purchased to cover this scenario.

What Indian Cyber Insurance Policies Actually Cover for Ransomware Extortion

Cyber insurance in India is still a relatively young product. IRDAI does not prescribe a standard cyber insurance policy wording in the way that it mandates the SFSP wording for fire insurance. Each insurer files its own policy form, and the coverage for ransomware extortion varies significantly between carriers. Understanding what your specific policy covers, and what it excludes, before an incident occurs is essential.

Most Indian cyber insurance policies that include extortion coverage operate through a 'cyber extortion' or 'ransomware response' section. This section typically covers the ransom payment itself (subject to prior written consent from the insurer), the costs of engaging a specialist ransom negotiation firm, and the forensic investigation costs directly related to the extortion event. Some policies also cover the business interruption loss attributable to the ransomware event under a separate insuring clause, with a waiting period (commonly 8-12 hours) before the BI cover triggers.

The critical condition in virtually every Indian cyber extortion policy is the requirement for prior written consent from the insurer before the ransom is paid. This is not a formality. If the policyholder pays the ransom without obtaining the insurer's consent, the extortion claim will almost certainly be denied. The consent requirement exists because the insurer needs to verify that the threat is genuine, assess whether payment is the optimal response (as opposed to decryption from backups or other technical remediation), ensure that the payment does not violate any applicable sanctions regime, and engage its own approved ransom negotiation and cryptocurrency tracing partners.

Sub-limits on extortion payments are common. A policy with an aggregate limit of INR 25 crore may cap the extortion payment at INR 5 crore or INR 10 crore, with the remaining limit available for other first-party and third-party costs. Some policies impose a co-insurance or retention specifically on the ransom payment, requiring the insured to bear 10-20% of the amount even after the retention is satisfied. Waiting periods for business interruption triggered by ransomware may differ from the general BI waiting period in the policy, and some insurers impose a separate sub-limit for ransomware-related BI.

Exclusions to watch for include: payments made to sanctioned entities (discussed in detail below), payments made without insurer consent, losses arising from failure to maintain minimum security controls specified in the policy's warranty or condition precedent clauses, and losses arising from known but unremediated vulnerabilities where patches were available for more than a specified period (commonly 30-60 days).

The IT Act 2000, IPC Provisions, and Whether Paying a Ransom Is Itself a Crime in India

The legal status of ransomware payments in India occupies an uncomfortable grey zone. There is no specific provision in Indian law that explicitly prohibits a victim organisation from paying a ransom to a cyber extortionist. However, several provisions create indirect legal risk for organisations that pay without due diligence.

Section 43 of the Information Technology Act 2000 (as amended in 2008) addresses unauthorised access and damage to computer systems, but it targets the perpetrator, not the victim. Section 66 criminalises computer-related offences including identity theft and fraud, again directed at the attacker. Section 66F, which deals with cyber terrorism, carries severe penalties including life imprisonment, but applies to those who commit acts of cyber terrorism rather than those who pay demands arising from such acts.

The more concerning provisions for a paying organisation sit in the Indian Penal Code (now Bharatiya Nyaya Sanhita 2023). Section 216 of the IPC (corresponding to BNS provisions on harbouring offenders) and the provisions relating to criminal conspiracy under Section 120B could theoretically be invoked if a prosecutor argued that the payment constituted material support to a criminal enterprise. While no Indian court has prosecuted a ransomware victim for paying a ransom to date, the legal theory is not frivolous, particularly where the threat actor is a designated terrorist organisation or a group linked to state-sponsored cyber operations.

The Prevention of Money Laundering Act 2002 (PMLA) adds another layer of risk. Ransomware payments, typically made in cryptocurrency, pass through channels that are inherently difficult to trace and are frequently associated with money laundering. If the payment is later traced to a designated entity under the PMLA schedules or the UAPA (Unlawful Activities Prevention Act), the paying organisation could face scrutiny from the Enforcement Directorate.

The practical guidance for Indian organisations is clear even if the law is not: before authorising any ransom payment, obtain a formal legal opinion from qualified counsel addressing the IT Act, BNS, PMLA, and UAPA implications specific to the threat actor and payment mechanism involved. This legal opinion becomes part of the contemporaneous record demonstrating that the organisation acted with due diligence, not recklessness.

CERT-In Mandatory Reporting, DPDP Act Obligations, and Regulatory Timelines

CERT-In's April 2022 directive (effective from June 2022) fundamentally changed the reporting obligations for Indian organisations hit by ransomware. The directive mandates that all service providers, intermediaries, data centres, body corporates, and government organisations must report cyber security incidents, including ransomware attacks, to CERT-In within six hours of becoming aware of the incident. This is among the shortest mandatory reporting windows anywhere in the world.

The six-hour clock starts when any person in the organisation becomes aware of the incident, not when the forensic investigation is complete or when the full scope of the breach is understood. For a ransomware event, the clock typically starts when the ransom note is discovered or when systems are found to be encrypted. The report must include details of the affected systems, the nature of the attack, the ransom demand if any, and the initial actions taken. Failure to report within the prescribed timeline can result in penalties under the IT Act and, for certain regulated entities, additional penalties from their sectoral regulator.

The Digital Personal Data Protection Act 2023 (DPDP Act), which received Presidential assent in August 2023, introduces a parallel notification obligation for personal data breaches. If the ransomware attack involves the compromise or exfiltration of personal data (which is the case in the majority of modern double-extortion attacks), the Data Fiduciary must notify the Data Protection Board of India and affected Data Principals without delay. The DPDP Act prescribes penalties of up to INR 250 crore for significant data breaches, and the Board has the authority to investigate whether the Data Fiduciary's security practices were adequate, effectively second-guessing the organisation's pre-incident cybersecurity posture.

For insured organisations, these reporting obligations interact directly with the cyber insurance policy. Most policies require the insured to notify the insurer 'as soon as practicable' or 'within 72 hours' of becoming aware of a covered event. The CERT-In six-hour reporting window means that the insured must have a pre-planned notification protocol that triggers both the CERT-In report and the insurer notification in parallel, within hours rather than days. Any delay in insurer notification, even if caused by the urgency of dealing with CERT-In reporting, could be used as a basis for coverage disputes.

RBI-regulated entities (banks, NBFCs, payment aggregators) face additional reporting obligations under the RBI's cybersecurity framework, including mandatory reporting to the RBI's CSITE cell. The overlapping and sometimes conflicting timelines between CERT-In, RBI, DPDP Act, and insurance policy notification requirements make it essential that Indian organisations maintain a pre-drafted incident response playbook with specific notification templates and escalation protocols for each stakeholder.

OFAC Sanctions Screening: The Hidden Trap That Voids Indian Cyber Insurance Claims

Perhaps the most underappreciated risk in the entire ransom payment process for Indian organisations is the extraterritorial reach of US Office of Foreign Assets Control (OFAC) sanctions. Indian businesses may assume that OFAC, a US Treasury department, has no jurisdiction over an Indian company paying a ransom to a threat actor. This assumption is dangerously wrong.

OFAC sanctions apply to any transaction that touches the US financial system, involves US persons, or uses US-origin technology. Given that the US dollar remains the dominant settlement currency for international transactions, that most major cryptocurrency exchanges have US nexus, and that the underlying technology infrastructure of many Indian companies relies on US-origin software and cloud services, the practical reach of OFAC sanctions extends well into Indian corporate activity. Several prolific ransomware groups, including those linked to North Korean state operations (Lazarus Group), Russian intelligence services, and Iranian threat actors, are designated on OFAC's Specially Designated Nationals (SDN) list. A payment to any of these groups, even if the paying organisation is Indian and the payment is in cryptocurrency, can trigger OFAC enforcement action.

The consequences of an OFAC violation are severe and not limited to the US entity. OFAC can impose civil penalties of up to USD 20 million per violation and criminal penalties including imprisonment. More relevant for Indian organisations, OFAC can impose secondary sanctions that effectively cut the violating entity off from the US financial system, a commercial death sentence for any company with international trade relationships.

Indian cyber insurance policies now almost universally include a sanctions exclusion clause. The typical wording excludes coverage for any loss, claim, or expense 'to the extent that the provision of such coverage or payment of such claim would expose the insurer to any sanction, prohibition or restriction under United Nations resolutions or the trade or economic sanctions, laws or regulations of the European Union, United Kingdom, or United States of America.' This means if the insured pays a ransom to a sanctioned entity, not only is the payment itself at legal risk, but the insurance recovery for all costs associated with that ransomware event, including forensic investigation, business interruption, and notification costs, may be voided.

The practical implication is that sanctions screening must occur before any payment is authorised. This requires engaging a specialist sanctions screening service (several global firms provide this capability) to assess the threat actor's identity against OFAC SDN, EU, and UN sanctions lists. The screening process adds 24-48 hours to the payment timeline, which creates tension with the operational urgency of restoring systems. However, skipping this step exposes the organisation to regulatory penalties and insurance coverage forfeiture that dwarf the cost of the additional downtime.

Structuring the Incident Response: Insurer Consent, Legal Privilege, and the Payment Mechanics

The sequence of actions in the first 48 hours after a ransomware demand determines whether the organisation will have insurance coverage, legal protection, and regulatory compliance or will face all three as additional adversaries alongside the threat actor. A well-structured incident response protocol follows a specific order of operations.

Step one is containment and evidence preservation. Before any discussion of payment, the IT and security team must isolate affected systems to prevent lateral spread, preserve forensic evidence (disk images, memory dumps, network logs), and activate the backup recovery assessment. The forensic evidence is critical both for the insurance claim and for any subsequent law enforcement investigation. Destroying or overwriting evidence in the rush to restore systems can undermine both.

Step two is simultaneous notification. Within the first six hours, the organisation must file the CERT-In incident report, notify the cyber insurer's claims team (using the specific claims notification contact in the policy, not the general customer service line), and brief external legal counsel. The legal counsel engagement should be structured to establish legal privilege over the incident response communications. In India, communications between a client and their advocate are privileged under Section 126 of the Indian Evidence Act 1872 (Bharatiya Sakshya Adhiniyam 2023). Routing the forensic investigation through legal counsel can help protect sensitive findings from disclosure in subsequent regulatory proceedings or litigation.

Step three is ransom assessment. The insurer's approved incident response panel, typically a combination of forensic investigators, ransom negotiators, and sanctions screening specialists, assesses the feasibility of technical recovery (from backups or decryption tools), identifies the threat actor to the extent possible, conducts sanctions screening against OFAC, EU, and UN lists, and provides a recommendation on whether to engage in ransom negotiation. This assessment informs the insurer's decision on whether to grant consent to payment.

Step four, if payment is approved, involves the mechanics of the transaction itself. Most ransomware payments are demanded in cryptocurrency, typically Bitcoin or Monero. The insurer's panel will use a specialist cryptocurrency firm to conduct the transaction, which provides chain-of-custody documentation, blockchain analytics to support any subsequent law enforcement tracing, and compliance documentation for sanctions purposes. The paying entity should never attempt to purchase cryptocurrency and make the payment independently, both for compliance reasons and because the insurer will not reimburse a payment made outside the approved process.

Step five is post-payment recovery and documentation. After payment (or after the decision not to pay), the organisation proceeds with system restoration, conducts a root cause analysis, implements remediation measures, and compiles the complete claims documentation package for the insurer.

Policy Conditions, Warranties, and Coverage Pitfalls That Indian Policyholders Miss

Indian cyber insurance policies contain conditions and warranties that can void coverage entirely if breached, and many of these conditions are directly relevant to ransomware events. Policyholders who have not read their policy carefully before an incident frequently discover these provisions at the worst possible time.

Minimum security standards are the most common coverage pitfall. Many Indian cyber policies include a condition precedent (or a warranty, which has the same contractual effect) requiring the insured to maintain specified minimum security controls. These typically include multi-factor authentication (MFA) on all remote access and privileged accounts, endpoint detection and response (EDR) on all endpoints and servers, regular patching of critical vulnerabilities within a specified window (commonly 30 days for critical CVEs), encrypted and air-gapped backups tested at least quarterly, and a documented incident response plan. If the forensic investigation reveals that the ransomware entry vector exploited a gap in any of these warranted controls, for instance, a VPN gateway without MFA or an unpatched Exchange server with a known critical vulnerability, the insurer has contractual grounds to decline the entire claim, not just the extortion payment but all first-party and third-party costs.

The retroactive date is another provision that catches policyholders. Cyber policies typically cover incidents that are both discovered and first occur during the policy period, or after a specified retroactive date. Sophisticated threat actors often maintain persistent access to a network for weeks or months before deploying ransomware. If the initial intrusion occurred before the policy's retroactive date, the insurer may argue that the 'occurrence' predates the coverage, even though the ransomware deployment and the ransom demand fell within the policy period. The forensic timeline becomes the determining factor in these disputes.

The prior knowledge exclusion operates similarly. If anyone in the organisation's senior management or IT leadership was aware of a security vulnerability, a prior breach, or indicators of compromise before the policy inception and failed to disclose this information in the proposal form, the insurer can void coverage under the duty of utmost good faith. This exclusion has become increasingly contentious as organisations conduct more frequent vulnerability assessments and penetration tests: awareness of vulnerabilities is an inevitable byproduct of good security practice, yet that awareness can be weaponised against the policyholder in a coverage dispute.

IRDAI has not yet issued specific guidance on the interpretation of cyber insurance warranties and conditions precedent, unlike the UK where the Insurance Act 2015 reformed warranty law. Indian cyber insurance disputes are therefore resolved under the general principles of the Indian Contract Act 1872, where a breach of warranty traditionally allows the insurer to void the policy regardless of whether the breach is connected to the loss. Policyholders should negotiate the conversion of warranties into suspensory conditions (where coverage is suspended during the breach but revives once the breach is remedied) at the placement stage, rather than discovering the warranty's full force during a claim.

Building a Defensible Ransomware Response Posture: Recommendations for Indian Enterprises

The organisations that manage ransomware events successfully are not the ones that improvise after the ransom note appears. They are the ones that built their response posture before the attack, integrating insurance, legal, technical, and regulatory preparedness into a single operational framework.

First, conduct a tabletop ransomware exercise at least annually, involving the CISO, CFO, General Counsel, the insurance broker, and the cyber insurer's incident response team. The exercise should simulate a realistic scenario including a ransom demand, a sanctions screening complication, CERT-In's six-hour reporting deadline, and the insurer's consent process. The objective is to identify procedural gaps and conflicting priorities before a real event forces their discovery. Every participant should know their specific role, the notification sequence, and the decision authority chain.

Second, review the cyber insurance policy at renewal with a specific focus on ransomware coverage. Confirm the extortion sub-limit, the co-insurance percentage on ransom payments, the consent mechanism and its practical timeline, the sanctions exclusion wording, the minimum security standard warranties, the retroactive date, and the prior knowledge exclusion. If the policy contains warranties that the organisation cannot currently satisfy (for example, MFA on all remote access points when a legacy system does not support MFA), disclose this to the insurer at renewal and negotiate an endorsement rather than hoping the gap will not be discovered during a claim.

Third, maintain a pre-approved panel of incident response service providers. The insurer's policy will typically specify a panel of approved forensic firms, legal counsel, and ransom negotiation specialists. Confirm these appointments in advance, execute engagement letters, and store the contact details in an accessible location outside the primary network (since that network will be encrypted during an attack). A printed incident response card stored in the CFO's office and the CISO's home is not excessive.

Fourth, implement and document the minimum security controls that the policy warrants. Maintain evidence of MFA deployment, EDR coverage, patching cadence, backup testing, and incident response plan reviews. This evidence is your first line of defence against a warranty-based coverage denial.

Fifth, establish a relationship with local law enforcement cyber cells and understand the process for filing an FIR under the IT Act. While law enforcement involvement may not lead to the recovery of paid ransoms or the prosecution of offshore threat actors, a filed FIR strengthens the organisation's position in any subsequent regulatory inquiry and demonstrates good faith cooperation with authorities. The Indian Cyber Crime Coordination Centre (I4C) under the Ministry of Home Affairs provides a centralised reporting portal that supplements the CERT-In notification.

Sixth, allocate a specific budget line for ransomware response costs that are not covered by insurance, including the retention or deductible, any co-insurance on the ransom payment, and the management time and productivity loss during the incident. Insurance covers a substantial portion of the financial exposure, but it never covers 100% of the real cost of a ransomware event.

About the Author

Tarun Kumar Singh

Tarun Kumar Singh

Strategic Risk & Compliance Specialist

  • AIII
  • CRICP
  • CIAFP
  • Board Advisor, Finexure Consulting
  • Developer of the Behavioural Underinsurance Risk Index (BURI)

Tarun Kumar Singh is a seasoned risk management and insurance professional based in Bengaluru. He serves as Board Advisor at Finexure Consulting, where he advises insurance, fintech, and regulated firms on governance, growth, and trust. His work spans insurance broker regulatory frameworks across India, UAE, and ASEAN, IRDAI compliance and Corporate Agency model reform, VC governance in insurtech, and MSME insurance gap analysis. He is the developer of the Behavioural Underinsurance Risk Index (BURI), a framework applying behavioural economics to underinsurance and insurance fraud risk.

Frequently Asked Questions

Is it legal to pay a ransomware demand in India?
India does not have a specific statute that prohibits ransomware payments. However, legality depends on who receives the payment. If the threat actor is linked to a designated terrorist organisation under the UAPA, or if the payment triggers PMLA scrutiny because it flows through cryptocurrency channels associated with money laundering, the paying organisation faces potential criminal exposure. The BNS 2023 provisions on criminal conspiracy and harbouring offenders could also apply in theory. The safest approach is to obtain a formal legal opinion addressing IT Act, BNS, PMLA, and UAPA implications before authorising any payment, and to conduct sanctions screening against OFAC, EU, and UN lists.
Will my cyber insurance policy cover a ransomware payment if I pay before getting the insurer's consent?
Almost certainly not. Every Indian cyber insurance policy that includes extortion coverage requires the insured to obtain the insurer's prior written consent before paying a ransom. This condition exists so the insurer can verify the threat, assess technical alternatives to payment, screen the threat actor against sanctions lists, and engage approved negotiation specialists. Paying without consent breaches a fundamental policy condition and gives the insurer contractual grounds to deny the extortion claim. In some policy wordings, this breach can extend to denial of related first-party costs such as forensic investigation and business interruption.
How does CERT-In's six-hour reporting requirement affect ransomware incident response for insured organisations?
CERT-In's directive requires all covered entities to report ransomware incidents within six hours of first awareness. This is among the shortest mandatory windows globally and runs in parallel with the insurance policy's own notification requirement. Organisations must maintain a pre-drafted notification protocol that triggers CERT-In reporting, insurer notification, and legal counsel engagement simultaneously within the first few hours. Failing to meet CERT-In's deadline can result in penalties under the IT Act, while delaying insurer notification could prejudice the insurance claim. A tabletop exercise that rehearses both timelines is the most effective preparation.

Sarvada

Ready to see Sarvada in action?

Explore the platform workflow or start a product conversation with our underwriting automation team.

Explore the platform