Costs Of The Cyber Attack On Gloucester City Keeps Going Up

The cost of the cyber attack which hit Gloucester City Council has risen to £787,000 so far and civic chiefs cannot rule out it will top £1 million. Benefit payments, planning applications and house sales were delayed after the City’s IT systems were compromised in December.

The Council became aware that its IT systems had been affected on 20 December last year. Since then, the council's online revenue and benefits, planning and customer services have been affected.

The city authority had to rebuild all of its servers after malware infected its systems and officers have been restoring services but costs keep rising. The harmful software was embedded in an email which had been sent to a council officer. Known as sleeper malware, it is understood to have been dormant for some time before it was activated.

  • Liberal Democrat group leader Jeremy Hilton asked councillors on 29 September how much it had cost so far to restore the IT systems and what the estimated final bill would be. "Every time I ask the question about the costs of the cyber attack recovery, the cost rises more and more. It now stands at a whopping £787,000... Can you reassure members of the council that the final bill will not be more than £1m?"
  • The Conservative Deputy leader of the council Hanna Norman said that all parties involved in the recovery were doing it in the most cost effective manner because they were spending Gloucester taxpayers' money. "I can give you the assurance that every penny we spend is scrutinised and we are making decisions based on value for money and what is right operationally for this authority and therefore Gloucester residents." She confirmed the council had spent £787,000 spent to date, of which £142,000 went on capital works.

Following the attack, Gloucester City Council confirmed that its expert sources believe that  the cyber attack was carried out by hackers from Russia.

BBC:     ITV:      Gloucesterbid:    Gloucestershirelive:    Headtopics:

You Might Also Read:

Delaware Pays $500,000 Ransom:

 

« Biden Signs EU / US Data Privacy Framework
British Spy Chief Warns Of The Threat From China »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CIRCL

CIRCL

CIRCL is the national Computer Incident Response Center of Luxembourg

Netresec

Netresec

Netresec is an independent software vendor with focus on the network security field. We specialize in software for network forensics and analysis of network traffic.

RedLock

RedLock

The RedLock Cloud 360TM platform correlates disparate security data sets to provide a unified view of risks across fragmented cloud environments.

Swimlane

Swimlane

Swimlane is a leader in security automation and orchestration (SAO). Our platform empowers organizations to manage, respond and neutralize cyber threats with adaptability, efficiency and speed.

Aujas Cybersecurity

Aujas Cybersecurity

Aujas has deep expertise and capabilities in Identity and Access Management, Risk Advisory, Security Verification, Security Engineering, & Managed Detection and Response services.

Callsign

Callsign

Callsign’s mission is to seamlessly power the identification of every web, mobile and physical interaction.

Quantea

Quantea

Our multi-patented solutions - QP Series Network Analytics Accelerator appliance and PureInsight Analytics Software Suite allows you to capture, analyze, store, replay, network traffic data.

IP Twins

IP Twins

IP Twins offer a wide range of services related to domain names and online brand protection.

Stealth Software Technologies

Stealth Software Technologies

Stealth Software Technologies is focused on the generation of research and software products focused on applied cryptography and cybersecurity.

ITTAS

ITTAS

ITTAS is a multidisciplinary company specializing in information security and software and hardware protection software.

Marlink

Marlink

Marlink smartly integrates hybrid, future-ready network solutions so you can benefit from the best available connectivity and IT to accelerate your digitalisation and empower your remote operations.

CNF Technologies

CNF Technologies

CNF Technologies is an award-winning cyber company providing technology-focused research and development to commercial, federal, and Department of Defense clients.

Vultara

Vultara

Vultara provides web-based product security risk management tools for electronics manufacturers.

VT Group (VTG)

VT Group (VTG)

VTG delivers force modernization and digital transformation solutions that expand America’s competitive advantage in the modern battlespace.

Dialog Enterprise

Dialog Enterprise

Dialog Enterprise is the corporate ICT solutions arm of Dialog Axiata, Sri Lanka’s leading connectivity provider.

International Maritime Cyber Security Organisation (IMCSO)

International Maritime Cyber Security Organisation (IMCSO)

The IMCSO mission is to be the standard in the maritime cyber security industry, a collective voice, working towards alignment and standardisation.