Costs Of The Cyber Attack On Gloucester City Keeps Going Up

The cost of the cyber attack which hit Gloucester City Council has risen to £787,000 so far and civic chiefs cannot rule out it will top £1 million. Benefit payments, planning applications and house sales were delayed after the City’s IT systems were compromised in December.

The Council became aware that its IT systems had been affected on 20 December last year. Since then, the council's online revenue and benefits, planning and customer services have been affected.

The city authority had to rebuild all of its servers after malware infected its systems and officers have been restoring services but costs keep rising. The harmful software was embedded in an email which had been sent to a council officer. Known as sleeper malware, it is understood to have been dormant for some time before it was activated.

  • Liberal Democrat group leader Jeremy Hilton asked councillors on 29 September how much it had cost so far to restore the IT systems and what the estimated final bill would be. "Every time I ask the question about the costs of the cyber attack recovery, the cost rises more and more. It now stands at a whopping £787,000... Can you reassure members of the council that the final bill will not be more than £1m?"
  • The Conservative Deputy leader of the council Hanna Norman said that all parties involved in the recovery were doing it in the most cost effective manner because they were spending Gloucester taxpayers' money. "I can give you the assurance that every penny we spend is scrutinised and we are making decisions based on value for money and what is right operationally for this authority and therefore Gloucester residents." She confirmed the council had spent £787,000 spent to date, of which £142,000 went on capital works.

Following the attack, Gloucester City Council confirmed that its expert sources believe that  the cyber attack was carried out by hackers from Russia.

BBC:     ITV:      Gloucesterbid:    Gloucestershirelive:    Headtopics:

You Might Also Read:

Delaware Pays $500,000 Ransom:

 

« Biden Signs EU / US Data Privacy Framework
British Spy Chief Warns Of The Threat From China »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Conscio Technologies

Conscio Technologies

Conscio Technologies is a specialist in IT security awareness. Our solutions allow you to easily manage innovative online IT awareness campaigns.

IoTium

IoTium

Secure Cloud Managed Software Defined IoT Networks. IoTium simplifies establishing and managing secure network infrastructure for Industrial IoT.

SharkGate

SharkGate

SharGate provide a cloud-based website security solution to protect websites from being hacked.

Coro Cybersecurity

Coro Cybersecurity

Coro (formerly Coronet) empowers organizations to protect against malware, ransomware, phishing, and botnets - across devices, users, and cloud applications.

Logz.io

Logz.io

Logz.io is an AI-powered log analysis platform that offers the open source ELK Stack as a enterprise-grade cloud service with machine learning technology.

Inky Technology Corp

Inky Technology Corp

Inky® Phish Fence is an email protection gateway that uses sophisticated AI, machine learning and computer vision algorithms to block deep sea phishing attacks that get through every other system.

Aporeto

Aporeto

The Aporeto platform protects cloud applications from attack by authenticating and authorizing all communications with a cryptographically signed identity assigned to every workload.

Ioetec

Ioetec

Ioetec's mission is to connect users to their IoT devices securely, ensuring these devices remain safe to use in our increasingly connected world.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Iowa Cyber Hub

Iowa Cyber Hub

Iowa Cyber Hub is a cybersecurity education partnership between Iowa State University and Des Moines Area Community College.

Anvilogic

Anvilogic

Anvilogic provides a unifying experience for security professionals aimed at providing improved visibility, enrichment, and context across hundreds of alerting datasets and security tools.

Forta

Forta

Forta is a real-time detection network for security & operational monitoring of blockchain activity.

RB42

RB42

RB42 (formerly Nexa Technologies) provide cyber defense solutions (ComUnity, secure and encrypted messaging, detection of interception tools, etc) and cyber defense consultancy service.

Northern Computer

Northern Computer

Northern Computer provides comprehensive IT solutions that streamline your operations and help you achieve your business goals.

RedArx Cyber Group

RedArx Cyber Group

At RedArx Cyber Group, our vision is to empower businesses with cutting-edge, proactive security solutions that safeguard their digital landscapes.

Planisys

Planisys

Planisys is a cybersecurity leader specializing in cutting-edge DNS security and email security solutions.