DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

IT warning after 160-year-old firm goes into administration following a ransomware attack

Posted on May 6, 2025May 6, 2025 by Dissent

Even though the media often mentions the risk of businesses folding due to a cyberattack, attempts to find examples of where a cyberattack  really was the sole explanation/cause are often hard to find. Whether there were any other financial factors in the case reported here that contributed to the firm going into administration is unknown to DataBreaches, but it sounds like the ransomware attack claimed by Akira in June of 2023 may have been the proximal cause. James Grant and Annabel Amos of BBC report:

The director of a 160-year-old haulage firm put out of business by a cyber-attack has urged companies to be on their guard.

Paul Abbott was on the board at Knights of Old, based in Kettering in Northamptonshire, which went into administration in 2023 after critical financial data was corrupted.

He said: “We felt we were in a very good place in terms of our security, our protocols, the measures we’d gone to to protect the business.”

A ransom note from a hacker group was found buried in IT systems at Knights of Old.

Despite efforts to maintain operations manually, the attack damaged key data, making it impossible to meet reporting deadlines set by lenders.

And so the company, which opened in 1865 and was employing 730 people by 2023, was forced into administration.

Read more at BBC.

Related: Ransomware Gangs’ Merciless Attacks Bleed Small Companies Dry

Category: Business SectorCommentaries and AnalysesMalwareNon-U.S.

Post navigation

← Alleged Nomad Bridge Hacker Arrested and Faces US Extradition
GlobalX, Airline for Trump’s Deportations, Hacked →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Ireland’s Data Protection Commission publishes 2024 Annual Report
  • The headlines suggested Freedman Healthcare suffered a ransomware attack that affected patient data. The reality was quite different.
  • Runsafe report: Medical device cyberattacks threaten patient care, strain budgets, top concern for healthcare sector
  • Ryuk ransomware’s initial access expert extradited to the U.S. from Ukraine
  • Alleged Geisinger hacker will defend himself pro se.
  • Tallahassee Memorial Healthcare reveals it was also impacted by Cerner/Legacy Oracle cyberattack
  • Hospital cyberattack investigation complete, no formal review needed (1)
  • Largest Ever Seizure of Funds Related to Crypto Confidence Scams
  • IMPACT: 170 patients harmed as a result of Qilin’s ransomware attack on NHS vendor Synnovis
  • DOJ’s Data Security Program: Key Compliance Considerations for Impacted Entities

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • US Judge Invalidates Biden Rule Protecting Privacy for Abortions
  • DOJ’s Data Security Program: Key Compliance Considerations for Impacted Entities
  • 23andMe fined £2.31 million for failing to protect UK users’ genetic data
  • DOJ Seeks More Time on Tower Dumps
  • Your household smart products must respect your privacy – including your air fryer
  • Vermont signs Kids Code into law, faces legal challenges
  • Data Categories and Surveillance Pricing: Ferguson’s Nuanced Approach to Privacy Innovation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.