Why Resilience Must Replace Ransom
The UK government’s proposal to ban ransom payments by public sector bodies marks a new era in how organisations are expected to confront ransomware. While the ban currently applies to the NHS, councils and critical infrastructure, the direction of travel is unmistakable.
Regulation is tightening, enforcement is rising and the space for quietly settling an incident behind closed doors is disappearing.
This is happening against a backdrop of escalating attacks by groups like Scattered Spider, a cybercriminal collective whose recent campaigns have shown just how vulnerable even sophisticated organisations can be. Over the past three months, Scattered Spider has successfully breached UK retailers, insurers and global airlines, relying not on exotic malware, but on social engineering and speed. They impersonate employees, bypass MFA with clever phishing, and once inside, move quickly to exfiltrate data or trigger extortion.
Social Engineering Is Outsmarting Traditional Defenses
In many of these cases, the point of failure wasn’t a firewall or a zero-day exploit, it was a person. The criminals don’t even need to deploy ransomware to be effective. The threat of leaking sensitive data is pressure enough.
That’s why the UK’s proposed ban is so significant: it removes the ransom payment option from the table, forcing organisations to rethink how they plan for, respond to and recover from cyber incidents. Even for commercial entities that are not (yet) covered by the ban, the bar is still rising.
Any intent to pay a ransom must now be reported to the government in a similar way to how certain cyber attacks and data breaches must be reported to the Information Commissioner's Office (ICO). Businesses may be told outright that paying could breach sanctions depending on the attacker’s origin.
The Identity Kayer Is Now The Attack Surface
Identity has quietly become the most exploited layer in the security stack, with attackers increasingly targeting the people behind the systems to bypass external security controls and move across the network undetected. As organisations move more services to the cloud and expand their user base to include contractors, suppliers and third parties, the number of identities to protect has drastically expanded and attackers are using that sprawl to their advantage.
Understanding who is doing what on the network is critical to combat this risk. When security teams can’t trace activity back to a user, legitimate or malicious, it becomes nearly impossible to respond effectively. This is especially true once attackers are inside the perimeter, where they often blend in using real credentials and legitimate tools.
Visibility Is No Longer Optional
Resilience is existential. Organisations must be prepared to continue operations even if systems are offline. They need the ability to detect and respond before attackers escalate. Most crucially, they must be able to demonstrate exactly what happened, not just to regulators, but to customers, partners and insurers.
This is where visibility into networks and identities shows value. Modern attackers, especially groups like Scattered Spider, move laterally with incredible speed once inside a network. Traditional endpoint controls are often bypassed or disabled early in the attack chain.
But deep, real-time visibility across the network can reveal the subtle cues attackers depend on such as the misuse of credentials, unusual access to sensitive areas or the stealthy shifting of data from one system to another.
More than just enabling detection and response, strong visibility supports accurate, timely reporting, which is becoming a legal necessity. With new rules expanding disclosure requirements and enforcement powers, being able to show what happened, when, and how is now seen as essential by regulators and insurers. It's a key part of proving accountability and can mean the difference between regulatory cooperation and punitive action.
From Passive Defense To Active Resilience
Resilience in this case means having eyes on everything - especially the activity attackers don’t want you to see. It’s about knowing not just where your defenses are, but what’s happening behind them. Organisations need to be able to act before damage spreads, before trust is broken and before a ransom is even demanded.
What the government is mandating for public services now will almost certainly influence private-sector expectations tomorrow. Legislation may compel some sectors to act, but the rationale is clear regardless. When paying a ransom is off the table, the only viable path forward demands readiness, transparency, and operational strength.
Jamie Moles is Senior Technical Manager at ExtraHop
Image: Joshua Koblin
You Might Also Read:
What Businesses Should Be Doing Instead Of Buying More Tech:
If you like this website and use the comprehensive 8,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.
- Individual £5 per month or £50 per year. Sign Up
- Multi-User, Corporate & Library Accounts Available on Request
- Inquiries: Contact Cyber Security Intelligence
Cyber Security Intelligence: Captured Organised & Accessible