
- Employee awareness
- 3 min read
At the start of the year (14th January 2025), the Home Office opened a public consultation on proposals seeking to address the growing threat and impact of ransomware in the UK.
With recent high profile ransomware attacks within the UK retail sector highlighting vulnerability, it is increasingly apparent that security awareness and training are sorely lacking in organisations and amongst employee bases. This is increasingly driving cyber criminals to pursue these financially lucrative ransom attacks. The move to ban ransomware payments in Critical National Infrastructure will drive these criminals to focus their efforts elsewhere, where ransoms can still be demanded, thus shifting the ransomware threat to the commercial sector.
These latest proposals follow a global crackdown in 2023 after a coalition of 40 nations signed an agreement designed to stop digital extortionists.
Before we dive into the proposals listed in the consultation further, it is important to understand what the UK government considers as ransomware, why this consultation is taking place and the current risk level of ransomware attacks in the UK.
The UK Government’s latest ransomware proposals target public sector bodies and Critical National Infrastructure (CNI) organisations. If you work in healthcare, energy, transport, finance, emergency services, or in any organisation essential to national security or public welfare, this proposal could drastically change how you prepare for and respond to ransomware incidents.
The measures could also impact business leaders, cyber security professionals, IT teams, and legal advisors, particularly those supporting infrastructure, regulatory compliance, or cyber resilience.
The Home Office defines ransomware as: "A type of malicious software ("malware") that infects a victim's computer system(s). It can prevent the victim from accessing system(s) or data, impair the use of system(s) or data and/or facilitate theft of data held on the victim's networked systems or devices. A ransom is demanded (normally payment of cryptocurrency) from the victim to regain access to the system(s); for data to be restored; or for data not to be published on criminal-operated data leak websites."
Ransomware has evolved from isolated digital extortion into a coordinated, international cybercrime operation. The UK is not immune, far from it:
According to Bloomberg, the attack on Synnovis in June 2024, which led to months of NHS disruption, resulted in harm to dozens of patients. The UK government wants to avoid situations like this in the future.
In December 2024, Richard Horne, head of the U.K.’s National Cyber Security Centre, said that hostile activity had “increased in frequency, sophistication, and intensity.”
The National Cyber Security Centre (NCSC) published a ransomware white paper in 2023 where it identified ransomware as the most significant and organised cyber-crime threat facing the UK.
The UK National Crime Agency also identified ransomware as the greatest cybercrime threat to the UK, particularly highlighting the threat to Critical National Infrastructure (CNI).
The Home Office also says: "In 2023, incidents of ransomware attacks reported to the Information Commissioner's Office reached their highest level since 2019, and private sector reporting to the National Crime Agency indicates that the number of UK victims appearing on ransomware data leak sites has doubled since 2022".
According to the NCSC’s Annual Review 2024, the agency handled 430 incidents this year compared to 371 in 2023. Of these, 13 were “nationally significant” ransomware incidents threatening essential services or the wider economy. Morgan Lewis notes the cost of ransomware attacks has been increasing nearly 20% year-on-year.
Also, according to GOV.UK’s 2025 survey, “over four in 10 businesses (43%) and three in 10 charities (30%) reported having experienced any kind of cyber security breach or attack in the last 12 months.”
Furthermore, the NCSC also states that the pervasion of generative AI has been found to increase the risk of ransomware by providing “capability uplift” to attackers. This means that even amateur attackers can use generative AI to craft powerful social engineering materials and ransomware code, lowering the skill level required to launch a ransomware attack.
In its January 2025 consultation, the Home Office put forward three major proposals aimed at curbing ransomware’s grip on UK organisations:
1. Ban on Ransom Payments by Public Sector and CNI
The proposed ban would legally prevent public sector bodies and CNI organisations from making ransom payments under any circumstances. This measure targets criminal profitability, aiming to “cut off the financial pipeline” fuelling global ransomware networks.
Scope caveat: The full legal definitions and boundaries of which organisations fall within this proposal are still under consultation. For example, not all organisations in the 14 CNI sectors (e.g., food or space industries) are automatically included. Only those whose disruption could cause a major detrimental impact on national security or essential services will be in scope.
2. Ransomware Payment Prevention Regime
While details are limited at this stage, this regime would establish a structured framework of rules, controls, and guidance to prevent ransomware payments. This could include:
The goal is to create systemic deterrents within high-risk organisations—reducing both the likelihood and ability to pay a ransom.
3. Mandatory 72-Hour Reporting for Ransomware Attacks
Organisations in scope would be legally required to report ransomware incidents within 72 hours of discovery. This echoes global cyber standards like GDPR and aims to:
Security minister Dan Jarvis said in a press release: “These proposals help us meet the scale of the ransomware threat, hitting these criminal networks in their wallets and cutting off the key financial pipeline they rely upon to operate.” Jarvis continues: “With an estimated $1 billion flowing to ransomware criminals globally in 2023, it is vital we act to protect national security as a key foundation upon which this government’s Plan for Change is built.”
Although details are sparse, the "Plan for Change" is part of the UK’s wider strategy to modernise its cyber defences and digital resilience capabilities across national infrastructure. It aligns with:
This ban is intended as a deterrent and disruptor, not a standalone solution. It forms part of a broader effort to push organisations toward better prevention, detection, and recovery.
The proposal intends to:
The proposal also maintains the possibility of imposing criminal and/or civil penalties for non-compliance. There is sure to be resistance to this, as it could result in a scenario where the only party involved in a ransomware attack that faces sanctions is the victim as it is usually very difficult to identify and apprehend ransomware attackers.
The UK Government defines CNI as sectors where service loss would have significant security, economic, or public health consequences. The 14 sectors include:
Not all organisations within these sectors will be affected. For example, not every food distributor or health clinic qualifies. Only those designated by the Government as critical based on service dependencies and risk profiles will fall under the ban.
As of now, the Government has not yet outlined specific support measures for organisations unable to recover without ransom payments. Stakeholders have called for:
The final policy may evolve following consultation.
Whether or not the ban proceeds as planned, this is a wake-up call for UK organisations—especially those in the public sector or critical services. Here’s what you should be doing:
CNI organisations must take this new proposal seriously
If the UK Government proceeds with its proposed ransomware payment ban, it would be a stark change from its previously more hands-off approach to cyber risk. Public sector bodies and CNI operators will need to be proactive in reassessing their cyber security strategies and even more proactive in identifying and plugging gaps in their security posture, employee awareness levels and incident response plans. According to the government’s own figures, just 22% of UK businesses and 19% of charities have a formal incident response plan. This proposal will compel organisations to bolster their cyber defences with new approaches.
© The Security Company (International) Limited 2025
Office One, 1 Coldbath Square, London, EC1R 5HL, UK
Company registration No: 3703393
VAT No: 385 8337 51