In this blog, we explore the UK government’s recent consultation and response on proposals to tighten rules around ransomware attacks and payments, which it has signalled will be introduced through future legislation. The planned measures include extending the ban on ransom payments to public bodies and Critical National Infrastructure (CNI) providers, introducing a duty to consult the Government before paying ransoms, and requiring all organisations to report ransomware incidents within 72 hours.
In January 2025, the UK government issued a consultation on proposals to extend the rules preventing some organisations from paying hackers to remove ransomware that they have installed on their victims’ systems. For some time, central government departments have been prohibited from paying such cyber ransoms. Although the consultation closed only 12 weeks later, in April 2025, the Government received over 200 responses from organisations and individuals. In late July, the Government published its response to the feedback it had received, indicating its intention to proceed with introducing legislation in due course.
The planned law will cover three areas.
Blanket Ban on Making Ransom Payments For Two Types of Organisation
First, the ban on paying ransoms will be extended to all UK public bodies (such as the NHS, local councils and state schools), and private sector organisations operating within the Critical National Infrastructure (CNI) space, such as energy, transport and utility companies. This proposal builds on the Government’s existing position that the UK taxpayer should not be funding ransom payments.
Duty to Consult Before Payment
Second, organisations that intend to pay a ransom will be obliged to consult with the Government first to ensure that there is no block on making payment, such as it being in breach of sanctions or terrorism-financing laws, or simply to offer the organisations guidance and advice before they commit to paying. This requirement, therefore, stops short of an outright ban on ransom payments, but does introduce a new compliance obligation that organisations will need to integrate into their incident response plans.
Duty to Notify All Ransomware Attacks in the UK
Third, all UK organisations that suffer infiltration by ransomware must notify the Government within 72 hours of becoming aware of it, regardless of whether they intend to actually pay a ransom or not. This will improve intelligence gathering on the subject, enhance national awareness of the ransomware threat landscape, and lead to greater alignment with law enforcement and regulatory bodies such as the Information Commissioner’s Office (ICO). As an aside, it is understood that the Government’s proposed Cyber Security and Resilience Bill is also going to include a statutory notification duty for ransomware raids. To learn more about the proposed Bill, read our blog Cyber Security Resilience Bill Policy Statement – What to Expect.
Why Are These Measures Needed?
Because there is currently no mandatory reporting regime for ransomware attacks, it is difficult to quantify the scale of the problem. However, in 2023 the UK Government Cyber Security Breaches Survey reported that 21% of medium businesses in the UK and 37% of large businesses experienced cyber attacks involving ransomware. The survey noted that many of the organisations affected chose not to disclose whether they paid a ransom. In the same year, the Sophos State of Ransomware report estimated that the average ransom payment globally was around £1.2 million. The aim of the new regime is to disincentivise cyber ransomers (who tend to favour easy wins) from targeting UK installations and businesses. The Security Minister, Dan Jarvis, has described the intention of the new rules as follows: ‘By working in partnership with industry to advance these measures, we are sending a clear signal that the UK is united in the fight against ransomware’.
No timescale has yet been set for the legislation. Once a draft bill is published, ABC will provide an update on this important topic. This will include details such as the authorities to whom organisations will be required to report ransomware attacks, as this has also not yet been determined.
How URM Can Help
As a CREST-accredited organisation, URM can offer a wide range of penetration testing services to help your organisation enhance its cyber security and defend against cyber attacks, including ransomware. For example, we can provide network and infrastructure penetration testing to help you identify and remediate vulnerabilities within your organisation’s environment. We can also conduct web and mobile application penetration testing, cloud pen testing, and business-led pen testing, depending on your concerns and requirements. All of URM’s CREST penetration testing is offered with a free retest of any critical or high-risk vulnerabilities we identify within 30 days of the initial test, ensuring the most significant risks to your organisation’s security are mitigated quickly.
URM is pleased to provide a FREE 30 minute consultation on penetration testing for any UK-based organisation.
If you are unsure, URM can perform CREST-accredited internal and external penetration testing against all IP addresses associated with your organisation, location, or service.
Designed to assess the architecture, design and configuration of web applications, our web application pen tests use industry standard methodologies to identify vulnerabilities.

URM’s blog answers key technical questions about Cyber Essentials and Cyber Essentials Plus, what’s in scope, CE compliant use of BYOD, and more.

URM’s blog explains the Government’s new proposed measures around ransomware attacks and payments, which organisations they would affect, & why they are needed.

URM’s blog discusses common issues we see with Cyber Essentials and Cyber Essentials Plus certification projects, and how you can avoid making the same mistakes