Impending UK Government Cyber Security Legislation on Ransomware Payments

Stuart Skelly
|
Senior Consultant at URM
|
|
PUBLISHED on
18
September
2025
SUMMARY

In this blog, we explore the UK government’s recent consultation and response on proposals to tighten rules around ransomware attacks and payments, which it has signalled will be introduced through future legislation.  The planned measures include extending the ban on ransom payments to public bodies and Critical National Infrastructure (CNI) providers, introducing a duty to consult the Government before paying ransoms, and requiring all organisations to report ransomware incidents within 72 hours.

In January 2025, the UK government issued a consultation on proposals to extend the rules preventing some organisations from paying hackers to remove ransomware that they have installed on their victims’ systems.  For some time, central government departments have been prohibited from paying such cyber ransoms.  Although the consultation closed only 12 weeks later, in April 2025, the Government received over 200 responses from organisations and individuals.  In late July, the Government published its response to the feedback it had received, indicating its intention to proceed with introducing legislation in due course.

The planned law will cover three areas.

Blanket Ban on Making Ransom Payments For Two Types of Organisation

First, the ban on paying ransoms will be extended to all UK public bodies (such as the NHS, local councils and state schools), and private sector organisations operating within the Critical National Infrastructure (CNI) space, such as energy, transport and utility companies.  This proposal builds on the Government’s existing position that the UK taxpayer should not be funding ransom payments.

Duty to Consult Before Payment

Second, organisations that intend to pay a ransom will be obliged to consult with the Government first to ensure that there is no block on making payment, such as it being in breach of sanctions or terrorism-financing laws, or simply to offer the organisations guidance and advice before they commit to paying.  This requirement, therefore, stops short of an outright ban on ransom payments, but does introduce a new compliance obligation that organisations will need to integrate into their incident response plans.

Duty to Notify All Ransomware Attacks in the UK

Third, all UK organisations that suffer infiltration by ransomware must notify the Government within 72 hours of becoming aware of it, regardless of whether they intend to actually pay a ransom or not.  This will improve intelligence gathering on the subject, enhance national awareness of the ransomware threat landscape, and lead to greater alignment with law enforcement and regulatory bodies such as the Information Commissioner’s Office (ICO).  As an aside, it is understood that the Government’s proposed Cyber Security and Resilience Bill is also going to include a statutory notification duty for ransomware raids.  To learn more about the proposed Bill, read our blog Cyber Security Resilience Bill Policy Statement – What to Expect.

Why Are These Measures Needed?

Because there is currently no mandatory reporting regime for ransomware attacks, it is difficult to quantify the scale of the problem.  However, in 2023 the UK Government Cyber Security Breaches Survey reported that 21% of medium businesses in the UK and 37% of large businesses experienced cyber attacks involving ransomware.  The survey noted that many of the organisations affected chose not to disclose whether they paid a ransom.  In the same year, the Sophos State of Ransomware report estimated that the average ransom payment globally was around £1.2 million.  The aim of the new regime is to disincentivise cyber ransomers (who tend to favour easy wins) from targeting UK installations and businesses.  The Security Minister, Dan Jarvis, has described the intention of the new rules as follows: ‘By working in partnership with industry to advance these measures, we are sending a clear signal that the UK is united in the fight against ransomware’.

No timescale has yet been set for the legislation.  Once a draft bill is published, ABC will provide an update on this important topic. This will include details such as the authorities to whom organisations will be required to report ransomware attacks, as this has also not yet been determined.

How URM Can Help

As a CREST-accredited organisation, URM can offer a wide range of penetration testing services to help your organisation enhance its cyber security and defend against cyber attacks, including ransomware.  For example, we can provide network and infrastructure penetration testing to help you identify and remediate vulnerabilities within your organisation’s environment.  We can also conduct web and mobile application penetration testing, cloud pen testing, and business-led pen testing, depending on your concerns and requirements.  All of URM’s CREST penetration testing is offered with a free retest of any critical or high-risk vulnerabilities we identify within 30 days of the initial test, ensuring the most significant risks to your organisation’s security are mitigated quickly.

Stuart Skelly
Senior Consultant at URM
Stuart is a highly experienced and knowledgeable GRC consultant at URM who has specialised in data protection law for 25 years.
Read more

How secure is your organisation’s infrastructure and network?

If you are unsure, URM can perform CREST-accredited internal and external penetration testing against all IP addresses associated with your organisation, location, or service.
Thumbnail of the Blog Illustration
Cyber Security
Published on
5/3/2024
Complying with Cyber Essentials and Cyber Essentials Plus

URM’s blog answers key technical questions about Cyber Essentials and Cyber Essentials Plus, what’s in scope, CE compliant use of BYOD, and more.

Read more
Thumbnail of the Blog Illustration
Cyber Security
Published on
18/9/2025
Impending UK Government Cyber Security Legislation on Ransomware Payments

URM’s blog explains the Government’s new proposed measures around ransomware attacks and payments, which organisations they would affect, & why they are needed.

Read more
Thumbnail of the Blog Illustration
Cyber Security
Published on
15/3/2024
Common Cyber Essentials Challenges and how to Overcome Them

URM’s blog discusses common issues we see with Cyber Essentials and Cyber Essentials Plus certification projects, and how you can avoid making the same mistakes

Read more
We used URM as we had a large amount of information to redact for a Court of Protection case and neither had the time nor the knowledge to be able to complete this appropriately. URM were suggested to us and we made contact. They responded very quickly and were able to explain their role, estimated timescales & costings. During the initial consultation, they were very professional and approachable, and certainly had the skills we required. URM’s consultant provided us with details of the work they had completed before & we felt confident to pursue the work with them. We were on a tight deadline for court and URM were confident that they could provide the services we required in a timely manner. The logistics of sending a large amount of confidential documents were easy to navigate and straightforward. We were unable to very accurately gauge how much work was required, however URM’s Team supported us with this and maintained regular contact regarding their progress and addressed any concerns they had. When we needed to contact them, they were prompt with their responses. The work did take longer that envisaged, however that was due to the amount of work that we, as clients, were unable to accurately identify would be required. We did, however, meet the deadline for court. I would certainly use the services of URM again & if possible would work with same team. The services are not cheap, however redacting sensitive information is a skilled task and, therefore, having a professional complete this work is priceless.
contact US

Let us help you

Let us help you in your compliance journey by completing the form and letting us know how we can best support you.