EU ransomware and cyber extortion policy

The EU Cyber Solidarity Act: A Pragmatic Bet on Coordination Over Coercion

Europe's new cross-border SOC network and Cybersecurity Reserve treat ransomware as a shared operational problem — not just a compliance failure to punish.

EU Cyber Solidarity Act: Building Capacity, Not Just… People of Internet Research · EU Ransomware Top EU cyber threat ENISA Threat Landscape has ranked … Oct 2024 NIS2 enforcement live NIS2 transposition deadline; the C… 3 Operational pillars Cybersecurity Shield, Emergency Me… No EU ransom payment ban The Act notably does not impose a … peopleofinternet.com

Key Takeaways

The European Union's Cyber Solidarity Act entered into force in early 2025, and on paper it looks like another acronym in the bloc's expanding cyber alphabet — alongside NIS2, the Cyber Resilience Act, DORA, and the AI Act. But read closely, the Cyber Solidarity Act is something genuinely different: it is one of the first major pieces of EU digital legislation in years that leads with capability rather than compliance. For a continent grappling with industrial-scale ransomware against hospitals, municipalities and energy operators, that shift in posture deserves more attention than it has received.

What the Act actually does

The regulation, formally adopted as part of the Commission's 2023 cybersecurity package, has three operational pillars:

According to the Commission's own materials, the Shield and Reserve are explicitly designed to support, complement and strengthen member states' capabilities rather than supplant national authorities — a notable rhetorical choice in a regulatory environment that often defaults to centralisation.

Why ransomware drove this design

The political backdrop is impossible to miss. ENISA's annual Threat Landscape reports have flagged ransomware as the top cyber threat in the EU for several years running, with critical sectors — public administration, health, transport, manufacturing — taking the heaviest blows. High-profile incidents like the 2021 attack on Ireland's Health Service Executive, the multi-week disruption of municipal services in cities such as Antwerp, and the steady drumbeat of attacks on European logistics and energy firms made the political case that NIS2 alone — which is essentially a duty-of-care regime — was not enough.

NIS2 tells essential and important entities what to do: risk management, incident reporting within 24/72 hours, supply chain controls, management accountability. It became enforceable across the bloc following its October 2024 transposition deadline, and national regulators are now ramping up oversight. But when a ransomware crew encrypts a regional hospital network at 3 a.m. on a Sunday, NIS2 obligations do not, by themselves, get qualified responders on the ground. The Cyber Solidarity Act tries to close exactly that operational gap.

The proportionate-regulation case

From a pro-innovation perspective, the Act is one of the better-designed pieces of EU cyber law in recent memory, for three reasons.

First, it builds public capacity rather than expanding private liability. The Shield is funded substantially through the Digital Europe Programme, and the Reserve relies on competitively procured private providers — meaning EU cybersecurity firms, including SMEs, are positioned as part of the solution rather than as a regulated cost centre. That is a healthier industrial-policy signal than yet more disclosure mandates.

Second, it avoids the temptation of a ransom payment ban. Several member states, and voices in the UK and US, have flirted with outright prohibitions on paying ransoms. The Act sensibly does not go there. The empirical record on payment bans is thin, and a unilateral EU ban could simply push payments offshore or into shell-company intermediaries, while leaving hospitals and small municipalities — the entities least able to refuse — to bear the cost of policy theatre.

Third, the Incident Review Mechanism institutionalises learning. One of the chronic failures in cybersecurity policy is that lessons from incidents are locked inside national agencies or NDAs with insurers. A standing review body that publishes structured findings is the kind of soft-power instrument that improves resilience without adding compliance overhead.

The risks worth watching

None of this means the Act is above critique. Three concerns deserve sustained attention as implementation proceeds through 2026 and 2027.

The first is governance overlap. ENISA, the EU-CyCLONe network, the new Shield, national CSIRTs, sectoral regulators under DORA, and Commission services all now have a finger in cyber crisis response. Clear playbooks for who leads when matter more than another structure on the org chart.

The second is the privacy and data-sharing footprint of cross-border SOC telemetry. Civil society groups including European Digital Rights and EFF have rightly pressed the Commission to ensure that bulk telemetry sharing is bounded by purpose limitation and oversight — concerns the Commission should treat as design constraints, not afterthoughts.

The third is vendor lock-in in the Reserve. If a handful of large incident-response firms capture most of the Reserve contracts, the EU will have built a resilience mechanism that quietly entrenches market concentration in a sector where competition is itself a security feature.

The verdict

The Cyber Solidarity Act will not stop ransomware. No regulation can. But it represents a welcome turn in EU digital policy: less interested in penalising victims after the fact, more interested in making sure trained responders, shared telemetry and honest post-mortems arrive when they are most needed. That is the kind of cyber policy a pro-innovation, open-internet Europe should want more of — and the model other jurisdictions, including the US and UK, would do well to study.

Sources & Citations

  1. European Commission — EU Cyber Solidarity Act overview
  2. NIS2 Directive (Directive (EU) 2022/2555) — EUR-Lex
  3. ENISA Threat Landscape report (annual)
  4. European Commission — Cybersecurity policies and Digital Europe Programme