This financial crime guide includes practical information and key indicators to help your business understand, identify and report suspicious activity where someone could be the target of a ransomware payment, or trying to profit from a ransomware payment.

Cybercriminals try to infect a computer or network, and then demand a ransom payment to unlock or decrypt the victim’s computer system. These attacks can disrupt businesses and critical services, and cost significant time and resources to recover from.

Your business can play a crucial role in detecting possible ransomware payments by recognising and reporting suspicious activity to AUSTRAC.

Download the Financial crime guide – Detecting and stopping ransomware (PDF, 1.77MB)

This guidance sets out how we interpret the Act, along with associated Rules and regulations. Australian courts are ultimately responsible for interpreting these laws and determining if any provisions of these laws are contravened. 

The examples and scenarios in this guidance are meant to help explain our interpretation of these laws. They’re not exhaustive or meant to cover every possible scenario.

This guidance provides general information and isn't a substitute for legal advice. This guidance avoids legal language wherever possible and it might include generalisations about the application of the law. Some provisions of the law referred to have exceptions or important qualifications. In most cases your particular circumstances must be taken into account when determining how the law applies to you.

Last updated: 5 Apr 2023
Page ID: 775

Was this page helpful?

Was this page helpful?
Please note that feedback you provide here will be used only for the purpose of improving our website. If you have a specific question about your AML/CTF obligations, please contact us.