Costs Of The Cyber Attack On Gloucester City Keeps Going Up

The cost of the cyber attack which hit Gloucester City Council has risen to £787,000 so far and civic chiefs cannot rule out it will top £1 million. Benefit payments, planning applications and house sales were delayed after the City’s IT systems were compromised in December.

The Council became aware that its IT systems had been affected on 20 December last year. Since then, the council's online revenue and benefits, planning and customer services have been affected.

The city authority had to rebuild all of its servers after malware infected its systems and officers have been restoring services but costs keep rising. The harmful software was embedded in an email which had been sent to a council officer. Known as sleeper malware, it is understood to have been dormant for some time before it was activated.

  • Liberal Democrat group leader Jeremy Hilton asked councillors on 29 September how much it had cost so far to restore the IT systems and what the estimated final bill would be. "Every time I ask the question about the costs of the cyber attack recovery, the cost rises more and more. It now stands at a whopping £787,000... Can you reassure members of the council that the final bill will not be more than £1m?"
  • The Conservative Deputy leader of the council Hanna Norman said that all parties involved in the recovery were doing it in the most cost effective manner because they were spending Gloucester taxpayers' money. "I can give you the assurance that every penny we spend is scrutinised and we are making decisions based on value for money and what is right operationally for this authority and therefore Gloucester residents." She confirmed the council had spent £787,000 spent to date, of which £142,000 went on capital works.

Following the attack, Gloucester City Council confirmed that its expert sources believe that  the cyber attack was carried out by hackers from Russia.

BBC:     ITV:      Gloucesterbid:    Gloucestershirelive:    Headtopics:

You Might Also Read:

Delaware Pays $500,000 Ransom:

 

« Biden Signs EU / US Data Privacy Framework
British Spy Chief Warns Of The Threat From China »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

HANDD Business Solutions

HANDD Business Solutions

HANDD are independent specialists in data protection with expertise at every stage of the Protect, Detect and Respond cycle, from consultancy and design, right through to installation.

Digital Infrastructure Association (DINL)

Digital Infrastructure Association (DINL)

DINL is the leading representative for companies and organisations which are active within the Dutch digital infrastructure sector.

Crossmatch

Crossmatch

Crossmatch is a world leader in risk-based composite authentication and biometric identity management.

XignSYS

XignSYS

XignSys develops innovative password-free and user-friendly Authentication solutions and electronic signature systems for B2B and B2C applications.

The ai Corporation

The ai Corporation

The ai Enterprise Fraud Solution is an on-prem or cloud-based self-service, machine learning fraud detection and prevention tool set.

Enigmatos

Enigmatos

Enigmatos is an Israeli based Automotive Cyber Security company. We provide solutions to the ever growing threat of vehicle hacking.

Indeed

Indeed

Indeed is a worldwide employment-related search engine for job listings covering job types in all industries, including cybersecurity.

AUTOCRYPT

AUTOCRYPT

AUTOCRYPT is a mobility security provider dedicated to the safety of future transportation

ISTC Foundation

ISTC Foundation

ISTC Foundation is one of the leading innovation centers in Armenia, founded by joint initiative of IBM, USAID, Armenian Government and Enterprise Incubator Foundation.

CyNam

CyNam

CyNam is a platform for enabling the growth and development of people and organisations within Cheltenham’s flourishing cyber technology ecosystem.

stackArmor

stackArmor

stackArmor specializes in compliance and security-focused solutions delivered using our Agile Cloud Transformation (ACT) methodology.

ImmuniWeb

ImmuniWeb

We Simplify, Accelerate and Reduce Costs of Security Testing, Protection and Compliance.

Netstar

Netstar

Netstar is an IT Support company based in Central London providing fully managed IT Support, Cyber Security and Technology Consulting services.

HarfangLab

HarfangLab

HarfangLab develops a hunting software to boost detection and neutralization of cyberattacks against companies endpoints.

HackNotice

HackNotice

HackNotice Teams is an all-in-one encompassing tool that monitors threats within your organization, different vendors, and third parties whose services you use.

Alethea

Alethea

Alethea is a technology company helping companies, nonprofits, and democracies protect themselves from harms stemming from disinformation and social media manipulation.