Costs Of The Cyber Attack On Gloucester City Keeps Going Up

The cost of the cyber attack which hit Gloucester City Council has risen to £787,000 so far and civic chiefs cannot rule out it will top £1 million. Benefit payments, planning applications and house sales were delayed after the City’s IT systems were compromised in December.

The Council became aware that its IT systems had been affected on 20 December last year. Since then, the council's online revenue and benefits, planning and customer services have been affected.

The city authority had to rebuild all of its servers after malware infected its systems and officers have been restoring services but costs keep rising. The harmful software was embedded in an email which had been sent to a council officer. Known as sleeper malware, it is understood to have been dormant for some time before it was activated.

  • Liberal Democrat group leader Jeremy Hilton asked councillors on 29 September how much it had cost so far to restore the IT systems and what the estimated final bill would be. "Every time I ask the question about the costs of the cyber attack recovery, the cost rises more and more. It now stands at a whopping £787,000... Can you reassure members of the council that the final bill will not be more than £1m?"
  • The Conservative Deputy leader of the council Hanna Norman said that all parties involved in the recovery were doing it in the most cost effective manner because they were spending Gloucester taxpayers' money. "I can give you the assurance that every penny we spend is scrutinised and we are making decisions based on value for money and what is right operationally for this authority and therefore Gloucester residents." She confirmed the council had spent £787,000 spent to date, of which £142,000 went on capital works.

Following the attack, Gloucester City Council confirmed that its expert sources believe that  the cyber attack was carried out by hackers from Russia.

BBC:     ITV:      Gloucesterbid:    Gloucestershirelive:    Headtopics:

You Might Also Read:

Delaware Pays $500,000 Ransom:

 

« Biden Signs EU / US Data Privacy Framework
British Spy Chief Warns Of The Threat From China »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Q-CERT

Q-CERT

Q-CERT is the National Computer Security Emergency Team of Qatar.

Security Industry Association (SIA)

Security Industry Association (SIA)

The SIA's mission is to be a catalyst for success​ within the global security industry through information, insight and influence.

CSIS Security Group

CSIS Security Group

CSIS provide actionable threat intelligence, prevention, incident response and 24/7 managed security services.

BPC Banking Technologies

BPC Banking Technologies

BPC’s advanced fraud prevention solution helps card issuers and acquirers combat the growing threat by monitoring 100% of transactions, online, in real-time across all channels.

Open Systems International (OSI)

Open Systems International (OSI)

Our innovative Operations Technology (OT) solutions are highly scalable and can be deployed by various utility companies to monitor, control and optimize their real-time operations.

Swimlane

Swimlane

Swimlane is a leader in security automation and orchestration (SAO). Our platform empowers organizations to manage, respond and neutralize cyber threats with adaptability, efficiency and speed.

Safetica

Safetica

Safetica Technologies is a Czech software company that delivers data protection solutions for businesses of all types and sizes.

VXRL

VXRL

VXRL is a Hong Kong-based cybersecurity company. We provide consulting services, penetration testing, and corporate training.

Jump Capital

Jump Capital

Jump provides series A and B capital to data-driven tech companies within the FinTech, IT & Data Infrastructure, B2B SaaS and Media sectors.

CICRA Consultancies

CICRA Consultancies

Cicra Consultancies is a company that specializes in cyber security. Our major activities are guided by three main principles: Prevent, Investigate, Prosecute.

NANDoff Data Recovery

NANDoff Data Recovery

NANDoff is a flat rate data recovery service. We serve the electronics industry around the globe 24/7.

Charles IT

Charles IT

Charles IT is your friendly, no-nonsense IT team focused on helping companies make their technology work for them. We focus on building relationships that deliver results.

META-Cyber

META-Cyber

META-cyber was founded by engineers with experience in process and control-protection to provide cyber security for industrial infrastructure.

Infisign

Infisign

Infisign addresses the challenges of traditional IAM systems and offers a comprehensive solution for modern identity management.

Nortal

Nortal

Nortal is a strategic digital transformation partner for leading companies and governments around the world.

SECQAI

SECQAI

At SECQAI we create dual-use hardware and software to enable the future of computing.