Calendar An icon of a desk calendar. Cancel An icon of a circle with a diagonal line across. Caret An icon of a block arrow pointing to the right. Email An icon of a paper envelope. Facebook An icon of the Facebook "f" mark. Google An icon of the Google "G" mark. Linked In An icon of the Linked In "in" mark. Logout An icon representing logout. Profile An icon that resembles human head and shoulders. Telephone An icon of a traditional telephone receiver. Tick An icon of a tick mark. Is Public An icon of a human eye and eyelashes. Is Not Public An icon of a human eye and eyelashes with a diagonal line through it. Pause Icon A two-lined pause icon for stopping interactions. Quote Mark A opening quote mark. Quote Mark A closing quote mark. Arrow An icon of an arrow. Folder An icon of a paper folder. Breaking An icon of an exclamation mark on a circular background. Camera An icon of a digital camera. Caret An icon of a caret arrow. Clock An icon of a clock face. Close An icon of the an X shape. Close Icon An icon used to represent where to interact to collapse or dismiss a component Comment An icon of a speech bubble. Comments An icon of a speech bubble, denoting user comments. Comments An icon of a speech bubble, denoting user comments. Ellipsis An icon of 3 horizontal dots. Envelope An icon of a paper envelope. Facebook An icon of a facebook f logo. Camera An icon of a digital camera. Home An icon of a house. Instagram An icon of the Instagram logo. LinkedIn An icon of the LinkedIn logo. Magnifying Glass An icon of a magnifying glass. Search Icon A magnifying glass icon that is used to represent the function of searching. Menu An icon of 3 horizontal lines. Hamburger Menu Icon An icon used to represent a collapsed menu. Next An icon of an arrow pointing to the right. Notice An explanation mark centred inside a circle. Previous An icon of an arrow pointing to the left. Rating An icon of a star. Tag An icon of a tag. Twitter An icon of the Twitter logo. Video Camera An icon of a video camera shape. Speech Bubble Icon A icon displaying a speech bubble WhatsApp An icon of the WhatsApp logo. Information An icon of an information logo. Plus A mathematical 'plus' symbol. Duration An icon indicating Time. Success Tick An icon of a green tick. Success Tick Timeout An icon of a greyed out success tick. Loading Spinner An icon of a loading spinner. Facebook Messenger An icon of the facebook messenger app logo. Facebook An icon of a facebook f logo. Facebook Messenger An icon of the Twitter app logo. LinkedIn An icon of the LinkedIn logo. WhatsApp Messenger An icon of the Whatsapp messenger app logo. Email An icon of an mail envelope. Copy link A decentered black square over a white square.

City council says confidential documents shared online after cyber attack

Leicester City Council has said confidential documents stolen from its servers in a cyber attack have been published online by hackers (Dominic Lipinski/PA)
Leicester City Council has said confidential documents stolen from its servers in a cyber attack have been published online by hackers (Dominic Lipinski/PA)

Leicester City Council has said confidential documents stolen from its servers in a cyber attack have been published online by hackers.

The unitary authority was targeted last month in an attack which forced it to close down its IT systems.

In an update on the incident, the council said it had been made aware that a ransomware group had posted “around 25” confidential documents online, including rent statements, applications to purchase council housing, and ID documents such as passport information.

It said it was “not able to say with certainty” whether other documents had been stolen during the cyber attack, but said it was “very possible that they have”.

It has been reported that the ransomware gang known as INC Ransom has claimed responsibility for the cyber attack and published the documents online – the same group which admitted carrying out a cyber attack on NHS Dumfries and Galloway last month.

Leicester City Council’s strategic director of city developments and neighbourhoods, Richard Sword, said: “We have today been made aware that a small number of documents held on our servers have been published by a known ransomware group.

“This group is known to have attacked a number of government, education and healthcare organisations.

“This relates to the cyber incident identified by the council on 7 March, which led to us closing down our IT systems.

“At the moment we are aware of around 25 or so confidential documents that have been published online. They include rent statements, applications to purchase council housing, and identification documents such as passport information.

“The breach of confidential information is a very serious matter and its publication is a criminal act. We are in the process of trying to contact all of those affected by this breach, and have also notified the Information Commissioner.

“We realise this will cause anxiety for those affected, and want to apologise for any distress caused.

“At this stage we are not able to say with certainty whether other documents have been extracted from our systems, however we believe it is very possible that they have.

“We are continuing to work with the cyber crime team at Leicestershire Police and the National Cyber Security Centre as part of this ongoing criminal investigation.

“As this is a live investigation we are not able to comment in further detail, but will continue to give updates when we have news to share.”

The council said most of its systems and phone lines are now back online following the attack, and there is no reason for concern about conducting business as usual.

Cyber security experts have urged other organisations to be vigilant in the wake of the attack.

Oliver Spence, chief executive of cybersecurity firm Cybaverse, said: “Given the UK Government has very publicly voiced its commitment to never do business with ransomware actors, it’s hard to imagine INC would be expecting a payout from these attacks.

“This could suggest the gang is motivated by damage, rather than money, which means more public bodies could be on its target list.

“Ransomware is today’s most damaging attack vector, so all organisations must work hard to improve their defences. Organisations must test their systems to identify vulnerabilities, so they can be patched and mitigated before they cause harm.

“They must train employees so they can spot malicious activity before they open emails or click on links. This includes phishing emails generated via AI. Employees must be taught to use caution consistently online, even when sites or emails look realistic.

“Furthermore, organisations need to manage their security more efficiently, so weaknesses can be more easily spotted.

“This can be achieved using tools which provide a unified view on their security posture, allowing teams to more easily spot weaknesses or vulnerabilities and then remediate them before they cause harm.”