Smiling Hacker

Town halls, tin budgets, and the hackers who know it: why English councils are still wide open

English councils are still vulnerable to cyber attacks. Not because nobody’s heard of cyber security, but because local government is where modern digital expectations collide with legacy IT, outsourced complexity, and “do more with less” budgets — a perfect recipe for attackers who want maximum disruption for minimum effort.

And yes: residents are at risk of losing data to cyber criminals. Sometimes through dramatic ransomware incidents; sometimes through quieter, painfully mundane blunders (like a spreadsheet accidentally exposing hidden personal data for months). 


What “a council cyber attack” looks like in real life

It’s not just “the website is down”

When a council gets hit, the fallout is usually boring and brutal: staff locked out of systems, phones and portals disrupted, and whole services slowed to a crawl — council tax, housing benefits, planning, land searches, you name it.

London boroughs have recently had to enact emergency plans after cyber incidents, with shared IT arrangements meaning one problem can ripple across multiple councils. 

The cynical truth: disruption is the point

Attackers don’t need to “hack everything”. They just need to break the bits that keep the organisation functioning — identity systems, backups, core databases, or the supplier link everyone forgot to test.


Why English councils are still vulnerable

1) Legacy systems: the digital equivalent of duct tape

Many councils run sprawling “estates” of old applications, bespoke integrations, and kit that can’t be patched quickly without breaking something else. That slows upgrades, delays fixes, and widens the window for attackers.

The National Audit Office has warned the cyber threat to government is “severe” and moving fast, while resilience improvements struggle to keep pace. 

2) The budget maths never works in cyber’s favour

Cyber spending is easiest to postpone because it doesn’t cut a ribbon. Until it does — in the form of emergency invoices, consultancy fees, and years-long recovery programmes funded by taxpayers.

Hackney’s 2020 ransomware attack is the cautionary tale councils keep re-living: recovery costs exceeding £12m were reported, before you count lost productivity and resident impact. 

3) Shared services and suppliers: one weak link, several victims

Councils increasingly share platforms (or outsource big chunks of IT). That can save money — and concentrate risk. If one shared component is compromised, the blast radius can be several boroughs wide. 

Ransomware
Ransomware

4) Ransomware works because it’s a business model

Ransomware groups operate like grim little startups: affiliate programmes, “support” channels, data-leak sites, and double-extortion tactics (encrypt + steal). The UK has even floated banning public bodies from paying ransoms — a sign of how normalised the problem has become. 

5) Some “breaches” aren’t hacks — they’re own goals

Not every resident-data exposure involves a hoodie-wearing genius. Sometimes it’s an internal process failure.

The ICO reprimanded Hammersmith & Fulham after hidden data in a spreadsheet was disclosed via an FOI response, exposing personal information relating to 6,528 people, including 2,342 children


Are residents actually at risk of losing their data?

Yes — and we have regulator-grade proof

The ICO’s Hackney reprimand is unusually clear: hackers gained access to and encrypted 440,000 files, affecting at least 280,000 residents (plus others, including staff). That is not theoretical risk; that’s a mass-impact incident with real people behind the numbers. 

But “risk” varies by incident

Some attacks are disruption-only. Others involve data theft and extortion. Early on, councils often don’t know whether data was exfiltrated — which is why you’ll see careful wording like “may have been accessed” while forensic work continues. 

What data might be exposed?

Depending on the systems hit, it can include:

  • Names, addresses, dates of birth, contact details
  • Council tax records, payment history
  • Housing files and benefits information
  • Social care case notes (potentially highly sensitive)
  • Staff HR data and internal documents

And once criminals have it, it’s fuel for identity fraud and targeted scams that look frighteningly “official”.


UK Government
UK Government

The expert line (and the uncomfortable subtext)

Government watchdogs: the threat is outrunning the fix

The Public Accounts Committee has warned there’s a “substantial gap between the threat and the government’s ability to respond”, and that attackers are already disrupting public services. 

The NAO’s message is blunter: the cyber threat is severe and advancing quickly. 

Cynical translation: councils are expected to be resilient on a shoestring

Local government is told to “transform digitally”, defend itself like a major enterprise, and keep services running through crises — while juggling procurement rules, supplier sprawl, and tight funding. Attackers know that’s a strained system, and they price their extortion accordingly.


What “good” looks like (and why it’s hard)

There is a playbook — councils just have to implement it consistently
  • NCSC guidance on ransomware/malware mitigation (including MFA, hardening, and response prep). 
  • Local Government Association guidance for directors on building cyber resilient services. 
  • The Cyber Assessment Framework (CAF) adapted for local government in England to assess and improve resilience. 

The cynical catch: paperwork is easier than operational change

Frameworks don’t patch servers. PDFs don’t segment networks. And “we have a policy” is not the same as “we tested recovery under pressure”.


What this means for you

If your council reports an incident, assume scams will follow

Criminals love a second bite: fake council-tax arrears emails, “missed benefit payment” texts, bogus refund forms. The more disruption there is, the more believable the scam.

Do the boring safety steps that actually work
  • Don’t click links in unexpected council messages; go via the council website you already know.
  • Be suspicious of urgent payment demands or bank-detail changes.
  • Lock down your email (new password + MFA) because email is the reset key to everything else.
  • If a council confirms your data was exposed, consider protective registration / extra checks with credit reference agencies.

Sources and further reading (live links)

We have created Professional High Quality Downloadable PDF’s at great prices specifically for Small and Medium UK Businesses our main website. Which include various helpful Cyber related documents and real world scenarios your business might experience, showing what to do and how to protect your business. Find them here.

Share