Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

UK’s Ransomware Payment Ban: Bold Strategy or Dangerous Gamble?

Posted on July 23, 2025July 23, 2025 By CWS

The UK authorities has introduced plans to make ransomware funds unlawful from the general public and important infrastructure sectors.

It’s an outdated and furry chestnut. How will you make ransomware unattractive to criminals with out both making it inconceivable or unprofitable? Each are unlikely with out intervention. Authorities has tried the previous by requiring safety requirements from organizations. That strategy hasn’t labored. Now the UK is making an attempt the latter by making fee unlawful in these areas it may possibly management, specifically the general public sector and the crucial infrastructure.

“Public sector our bodies and operators of crucial nationwide infrastructure, together with the NHS, native councils and faculties, can be banned from paying ransom calls for to criminals underneath the measure,” introduced the UK authorities on July 22, 2025.

This requirement is being supported by expanded rules. Organizations not lined by the ban might be required to inform the federal government “of any intent to pay a ransom”. That is more likely to be expanded into full necessary reporting to “equip legislation enforcement with important intelligence to seek out perpetrators and disrupt their actions.”

Safety Minister Dan Jarvis commented, “We’re decided to smash the cybercriminal enterprise mannequin and shield the companies all of us depend on.” However the safety practitioners’ views vary from ‘an excellent and crucial step’ to ‘it’s not more likely to have a lot impact’.

Scott Walker, CSIRT supervisor at Orange Cyberdefense, is enthusiastic virtually to the purpose of gung ho. “These new measures… are precisely what the trade has been ready for… a brand new ransomware fee prevention scheme, and an enhanced ransomware prompt reporting regime.”

Walker suggests, for the crucial nationwide infrastructure, “We should make them much less enticing targets… As with most unlawful legal exercise, the perpetrators are motivated solely by cash; take away the motive, and also you take away the motivation.”

Nevertheless, Juliette Hudson, CTO at CybaVerse, factors out that not all ransomware assaults are motivated by cash. “Within the present geopolitical panorama, it’s secure to say that not all ransomware assaults are straight motivated by cash. In some circumstances, nation state actors are concentrating on crucial infrastructure motivated purely to collect intelligence or trigger societal hurt. A fee ban will do nothing to thwart these assaults.”Commercial. Scroll to proceed studying.

Equally, if geopolitics doesn’t enhance, it’s simple to see adversarial nations attacking crucial infrastructure with the particular intent to trigger injury, maybe disguised as a ransomware that goes fallacious (successfully a wiper). If the assault is classed as legal ransomware, it could fail the authorized litmus for an act of warfare – despite the fact that it’s an act of warfare. (The UK’s place is that it has the suitable to reply kinetically to an act of cyberwar.)

Ransomware assaults towards the crucial infrastructure wouldn’t be eradicated however may turn out to be extra harmful due to the ban.

Kevin Robertson, CTO at Acumen Cyber, is equally uncertain. “Organizations shouldn’t see this transformation in laws as an enchancment in defenses. It should have little influence. No fee ban will ever cease ransomware,” he says. It may even be counterproductive. “It may create an underground financial system the place organizations pay calls for however don’t report them, or international organizations pay calls for from areas outdoors the UK.”

One of many largest issues in cyber is unintended penalties. Sources are finite. Filling in a single gap could require digging one other to supply the supplies. Most organizations have genuinely tried to resolve the ransomware drawback by means of cybersecurity however have been unable to fill all of the holes. The necessity for a ban on ransom funds is a recognition of this failure.

The issue is a ban is more likely to have its personal unintended penalties. Organizations don’t pay ransoms as a result of they want to give cash to criminals — they accomplish that for very pragmatic causes. These pragmatic causes will proceed no matter authorities necessities. Firms that haven’t paid ransoms earlier than this laws will proceed their apply, not due to the legislation however as a result of that’s what they select to do. 

However firms that may have paid ransoms at the moment are left between a rock and a tough place. “The fact is that many organizations have traditionally chosen to pay ransoms out of a practical need to renew operations rapidly whereas minimizing prices,” feedback James Neilson, SVP Worldwide at OPSWAT. “The brand new measures subsequently danger criminalizing such victims whereas they’re coping with an assault or leaving them compliant however dealing with long-term disruption or denial of operations at vital value. That’s an uncomfortable place for organizations to be in.”

The necessity to pay the ransom will not be affected by the illegality of doing so. Some organizations will double down on discovering loopholes within the legislation or hidden methods of paying off criminals to guard their enterprise — morally if not really themselves turning into criminals within the course of.

Even when the legislation’s intention is profitable, the seemingly impact would merely divert legal consideration towards the much less regulated areas of enterprise whereas not stopping assaults on CNI from nation state (and possibly extra elite) assault teams. “Ransomware attackers usually are not going away, however they could redirect their focus,” warns Neilson.

The ransomware menace is sort of a pack of playing cards comprising many particular person influences. Authorized regulation of the response to those playing cards could shuffle the pack, however it doesn’t eradicate any of the playing cards. The one technique to change the pack is so as to add new playing cards reasonably than shuffle the prevailing pack.

That is laborious. “If the federal government desires to speak the discuss, it should additionally stroll the stroll,” suggests Trevor Dearing, “It subsequently wants to make sure that organizations are prepared for when an assault strikes. Meaning having crucial backups and making certain all organizations have stable restoration plans and danger assessments that are saved updated.”

That is nonetheless simply shuffling the pack. Cybersecurity options have by no means labored. Safety is sort of a sieve. There are at all times gaps someplace. Attackers are fluid and can at all times discover a gap.

One choice can be to supply extra monetary assets to victims that don’t pay – it could be like insurance coverage with out the insurance coverage trade however with the federal government backstop that insurers have requested for however did not get. That’s virtually actually politically inconceivable.

The sum whole of all transferring components within the ransomware drawback means that in the end companies ought to be left to do the perfect they’ll with out the federal government interference that successfully simply muddies the waters. A ban is simply political flag waving.

“Whereas banning organizations from offering ransomware payouts sounds good in principle, it’s a catastrophe in apply,” says Forrester’s principal analyst Allie Mellen.“If an organisation is paying a ransom, it’s as a result of they don’t have any different choice, not as a result of they need to… To ban it outright is unrealistic and detrimental to the organizations they appear to guard.”

Associated: Marks & Spencer Expects Ransomware Assault to Price $400 Million

Associated: Armenian Man Extradited to US Over Ryuk Ransomware Assaults

Associated: Compumedics Ransomware Assault Led to Knowledge Breach Impacting 318,000

Associated: Ransomware Group Claims Assault on Belk

Security Week News Tags:Ban, Bold, Dangerous, Gamble, Payment, Ransomware, Strategy, UKs

Post navigation

Previous Post: Coyote Banking Trojan First to Abuse Microsoft UIA
Next Post: France Says Administrator of Cybercrime Forum XSS Arrested in Ukraine

Related Posts

Krispy Kreme Confirms Data Breach After Ransomware Attack Security Week News
Airoha Chip Vulnerabilities Expose Headphones to Takeover Security Week News
Ahold Delhaize Data Breach Impacts 2.2 Million People Security Week News
Cisco Patches Critical ISE Vulnerability With Public PoC Security Week News
263,000 Impacted by Esse Health Data Breach Security Week News
Zyxel Firewall Vulnerability Again in Attacker Crosshairs Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Remove Your Data From Data Broker Sites
  • TP-Link Network Video Recorder Vulnerability Let Attackers Execute Arbitrary Commands
  • SharePoint 0-day Vulnerability Exploited in Wild by All Sorts of Hacker Groups
  • Critical Mitel Flaw Lets Hackers Bypass Login, Gain Full Access to MiVoice MX-ONE Systems
  • Fire Ant Exploits VMware Flaws to Compromise ESXi Hosts and vCenter Environments

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Remove Your Data From Data Broker Sites
  • TP-Link Network Video Recorder Vulnerability Let Attackers Execute Arbitrary Commands
  • SharePoint 0-day Vulnerability Exploited in Wild by All Sorts of Hacker Groups
  • Critical Mitel Flaw Lets Hackers Bypass Login, Gain Full Access to MiVoice MX-ONE Systems
  • Fire Ant Exploits VMware Flaws to Compromise ESXi Hosts and vCenter Environments

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News