Security

Cyber-crime

UK floats ransomware payout ban for public sector

Stronger proposals may also see private sector applying for a payment 'license'


A total ban on ransomware payments across the public sector might actually happen after the UK government opened a consultation on how to combat the trend of criminals locking up whole systems and taxpayers footing the bill.

The consultation will consider views on extending the ransom payment ban from central government departments to all public services including hospitals, schools, local authorities, and state-operated transport networks.

Announced today, the 12-week consultation will run from January 14 to April 8 and explore three proposals, the first of which is the total payment ban for the public sector and critical national infrastructure (CNI) organizations.

The overarching notion is to make the prospect of targeting these sectors undesirable for financially motivated criminals. It would also involve mandatory reporting of incidents to support law enforcement and intelligence agencies.

Secondly, "a ransomware payment prevention regime," as the Home Office is calling it, would take the first proposal even further. This idea assumes that a public sector payment ban would be implemented, and then additionally require that any organizations and businesses not covered by an existing ban seek the government's approval before they pay the ransom. It would be something of a ransomware payment "license," which may or may not be issued depending on the nature of the incident.

A pan-industry approach would also see the nation's crime-fighting forces empowered with additional data to inform ongoing investigations and operations, although the consultation will also consider whether the rules would only apply to attacks that meet a certain threshold.

The third and much weaker approach proposes to implement a mandatory reporting law for ransomware incidents. (So no ban.) This would provide the UK's cyber-crime fighters with as much data as possible to better inform their investigations, (and potentially their disruption efforts à la LockBit,) but is certainly not as powerful as the other ideas on the table.

Like the second proposal, the consultation will consider whether the rule will be for all organizations and individuals or be based on an attack meeting a specific threshold.

"Driving down cybercrime is central to this government's missions to reduce crime, deliver growth, and keep the British people safe," security minister Dan Jarvis said in a statement.

"With an estimated $1 billion flowing to ransomware criminals globally in 2023, it is vital we act to protect national security as a key foundation upon which this Government's Plan for Change is built.

"These proposals help us meet the scale of the ransomware threat, hitting these criminal networks in their wallets and cutting off the key financial pipeline they rely upon to operate.

"Today marks the beginning of a vital step forward to protect the UK economy and keep businesses and jobs safe."

As part of its first Cyber Security Act, Australia introduced mandatory incident reporting rules in November 2024 requiring organizations to report ransomware attacks, provided they meet the revenue threshold. This was set at AU$3 million ($1.845 million), which captures approximately 6.56 percent of Australian businesses, according to the country's Cyber and Infrastructure Security Centre.

Given the UK's close political and economic ties to Australia, a similar threshold or percentage of British organizations may be considered if the rule were to be mirrored.

No major economy has taken steps toward banning ransom payments on quite the scale as that being described in some of the UK's proposals today. It would be a monumental moment for cyber policy should they be passed and implemented.

The UK's NCSC appears to be onside with the consultation too, with new CEO Richard Horne saying: "This consultation marks a vital step in our efforts to protect the UK from the crippling effects of ransomware attacks and the associated economic and societal costs.

"Organizations of all sizes need to build their defenses against cyber attacks such as ransomware, and our website contains a wealth of advice tailored to different organizations. In addition, using proven frameworks like Cyber Essentials, and free services like NCSC's Early Warning, will help to strengthen their overall security posture.

"And organizations across the country need to strengthen their ability to continue operations in the face of the disruption caused by successful ransomware attacks. This isn't just about having backups in place: Organizations need to make sure they have tested plans to continue their operations in the extended absence of IT should an attack be successful, and have a tested plan to rebuild their systems from backups."

Time to debate… again

So, for 12 weeks, UK policymakers and cybersecurity experts will once again debate the effectiveness of potential approaches to disrupting ransomware.

The pros and cons of both sides of the ransomware payment ban debate have been well told by now. Both camps have fierce proponents fighting their corner, although most agree some sort of middle ground will likely be best. The issue is largely driven by what compromises are and aren't acceptable.

Ciaran Martin, the founding CEO of the UK's NCSC, famously opined last year in national news that ransom payments should be banned, with the resulting debate quickly reaching fever pitch.

He argued that many of the arguments against the ban were "terrible," closing the short piece by saying simply: "We have to find a way of making a ransom payments ban work."

Opponents argue that a ban would bring various unintended negative consequences that would worsen the way ransomware is handled. Arguments include victims possibly pursuing other illicit means to compensate ransomware operators or recover their data, which in turn may discourage their engagement with law enforcement. 

The standpoint is one that's adopted even at the highest levels, such as the Institute for Security and Technology's Ransomware Task Force. 

One of the co-chairs on that task force, security expert Jen Ellis, said in an online debate on the matter, hosted by the Royal United Services Institute (RUSI) last year, that the idea that policymakers can simply force organizations to become resilient to ransomware is "great" but "completely disconnected from reality."

She said it's not a case of organizations being too lazy to meet resilience standards, but instead there are "a million and one incentives that operate in the wrong direction." Examples of these include affordability, technical awareness, and maturity.

Another related factor is that criticism has been leveled at the cyber insurance industry for making ransom payments easier, providing organizations with access to liquidity for doing so.

Ellis and Jamie McColl, research fellow at RUSI, both also pointed out that, at the time, a small number of US states had banned government departments from paying ransoms with little to no impact on attack frequency.

Although banning ransom payments may seem like the easy, one-click solution to ransomware – cutting the crims off where it hurts – ushering in that change won't be an easy feat for the UK government should it choose to go ahead with this.

Nevertheless, the UK's cyber situation worsens with each year. The NCSC's most recent annual review revealed the number of security threats that reached the agency's maximum severity threshold tripled compared to 2023.

The number of nationally significant incidents and cases of ransomware also rose year on year, suggesting the current approaches to combating the crime aren't cutting it. ®

Send us news
25 Comments

Ransomware attack forces Brit high school to shut doors

Students have work to complete at home in the meantime

Ransomware crew abuses AWS native encryption, sets data-destruct timer for 7 days

'Codefinger' crims on the hunt for compromised keys

Medusa ransomware group claims attack on UK's Gateshead Council

Pastes allegedly stolen documents on leak site with £600K demand

Europe coughs up €400 to punter after breaking its own GDPR data protection rules

PLUS: Data broker leak reveals extent of info trading; Hot new ransomware gang might be all AI, no bark; and more

Enzo Biochem settles lawsuit over 2023 ransomware attack for $7.5M

That's in addition to the $4.5M fine paid to three state AGs last year

IBM swoops in to rescue UK Emergency Services Network after Motorola shown the door

With a near half-billion-pound price hike bringing contract value to £1.4B

Brits must prove their age on adult sites by July, says watchdog

Regulator asks people to link their credit cards, mobile accounts, or face scans for smut use to protect kids

UK government tech procurement lacks understanding, says watchdog

NAO report highlights £3B cost overruns and 29 years of cumulative delays in IT projects

UK unveils plans to mainline AI into the veins of the nation

Government adopts all 50 venture capitalist recommendations but leaves datacenter energy puzzle unsolved

UK prepared to throw planning rules out the window for massive datacenters

Nationally Significant Infrastructure Project designation could tear down more restrictions

Telemetry data from 800K VW Group EVs exposed online

PLUS: DoJ bans data sale to enemy nations; Do Kwon extradited to US; Tenable CEO passes away; and more

£3.8B later, old tech supplier flames still burning for HMRC

Deal supposed to end in 2017 continues to haunt tax collector procurement