DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

IT warning after 160-year-old firm goes into administration following a ransomware attack

Posted on May 6, 2025May 6, 2025 by Dissent

Even though the media often mentions the risk of businesses folding due to a cyberattack, attempts to find examples of where a cyberattack  really was the sole explanation/cause are often hard to find. Whether there were any other financial factors in the case reported here that contributed to the firm going into administration is unknown to DataBreaches, but it sounds like the ransomware attack claimed by Akira in June of 2023 may have been the proximal cause. James Grant and Annabel Amos of BBC report:

The director of a 160-year-old haulage firm put out of business by a cyber-attack has urged companies to be on their guard.

Paul Abbott was on the board at Knights of Old, based in Kettering in Northamptonshire, which went into administration in 2023 after critical financial data was corrupted.

He said: “We felt we were in a very good place in terms of our security, our protocols, the measures we’d gone to to protect the business.”

A ransom note from a hacker group was found buried in IT systems at Knights of Old.

Despite efforts to maintain operations manually, the attack damaged key data, making it impossible to meet reporting deadlines set by lenders.

And so the company, which opened in 1865 and was employing 730 people by 2023, was forced into administration.

Read more at BBC.

Related: Ransomware Gangs’ Merciless Attacks Bleed Small Companies Dry

Category: Business SectorCommentaries and AnalysesMalwareNon-U.S.

Post navigation

← Alleged Nomad Bridge Hacker Arrested and Faces US Extradition
GlobalX, Airline for Trump’s Deportations, Hacked →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Bradford Health Systems detected abnormal network activity in December 2023. They first sent out breach notices this week.
  • Websites selling hacking tools to cybercriminals seized
  • ConnectWise suspects cyberattack affecting some ScreenConnect customers was state-sponsored
  • Possible ransomware attack disrupts Maine and New Hampshire Covenant Health locations
  • HHS OCR Settles HIPAA Security Rule Investigation of BayCare Health System for $800k and Corrective Action Plan
  • UK: Two NHS trusts hit by cyberattack that exploited Ivanti flaw
  • Update: ALN Medical Management’s Data Breach Total Soars to More than 1.8 Million Patients Affected
  • Russian-linked hackers target UK Defense Ministry while posing as journalists
  • Banks Want SEC to Rescind Cyberattack Disclosure Requirements
  • MathWorks, Creator of MATLAB, Confirms Ransomware Attack

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • The US Is Storing Migrant Children’s DNA in a Criminal Database
  • Home Pregnancy Test Company Wins Dismissal of Pixel Wiretapping Suit
  • The CCPA emerges as a new legal battleground for web tracking litigation
  • U.S. Spy Agencies Are Getting a One-Stop Shop to Buy Your Most Sensitive Personal Data
  • Period Tracking App Users Win Class Status in Google, Meta Suit
  • AI: the Italian Supervisory Authority fines Luka, the U.S. company behind chatbot “Replika,” 5 Million €
  • D.C. Federal Court Rules Termination of Democrat PCLOB Members Is Unlawful

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.