As part of its focus on cybersecurity in 2025, the UK Government’s Home Office is consulting on new ransomware incident response rules aimed at reducing payments made by victims of ransomware incidents and increasing the government’s ability to respond to these attacks.
The Government’s proposals are part of wider plans to reform UK cybersecurity rules which were announced last year and are expected to take shape in 2025.
The UK has recently seen high profile ransomware incidents such as the attack against Royal Mail, Capita and the British Library which have led to calls for reform to UK cybersecurity policy.
Cybersecurity obligations apply in the UK such as through UK GDPR and more targeted requirements for certain sectors via the Network and Information Systems Regulations 2018 (“NIS”), but these are in need of an update to reflect the current cybersecurity climate. Sector specific requirements (such as for communication providers under the Telecommunications (Security) Act 2021) have been updated but, in general, the UK has not had significant changes in its approach since Brexit. In contrast, the EU is moving forward with new cyber legislation with the NIS2 Directive and the Cyber Resilience Act (among others).
To update the UK’s cybersecurity rulebook, plans were announced in the King’s Speech to introduce a Cyber Security and Resilience Bill to:
The Home Office’s ransomware consultation appears to be meeting part of this promise and could potentially be separate to the Cyber Security and Resilience Bill. Wider consultations on the Bill are expected in 2025 – the exact direction of the Bill remain unconfirmed, but it is generally expected to update the UK’s NIS framework and may align it more closely with the EU’s NIS2 regime (which has a broader scope and more extensive obligations, including faster reporting of incidents).
The Home Office has put forward three proposals covering a:
According to the Home Office, an estimated $1 billion flowed to ransomware criminals globally in 2023, with millions coming from the UK, whilst the NCSC considers ransomware attacks to be the most disruptive and highest risk cybercrime. The Home Office’s ransomware proposals seek to stem the flow of that money as well as disrupt threats to the UK’s critical national infrastructure. Blocking companies from making these payments may reduce the flow of the money and make it less profitable for the cyber-criminal, but this may be at the expense of the valuable data that is being ransomed.
The Home Office consultation is open until 8 April 2025 and provides an opportunity to feed into discussions before these develop into more concrete policy proposals.
The consultation is part of the GN overnment’s wider work on cybersecurity and should be seen in the context of wider reform – for example the Home Office notes that it will work with the Department for Science, Innovation and Technology (DSIT) so that its proposals are aligned with the upcoming Cyber Security and Resilience Bill.
Key questions that the consultation will need address include any thresholds or exemptions, and whether ransomware reporting could duplicate reporting requirements. The Home Office’s intention is that UK victims of ransomware attacks are required to report an individual ransomware incident once (for example, avoiding dual notification requirements under the UK’s NIS rules). However, the application of this in practice will need careful review.
For more information please contact Matthew Buckwell and Rory Coutts.