During the August bank holiday in 2017, Copeland Borough Council was hit by a zero-day ransomware cyber attack.

A zero-day attack means the hacker is deploying a type of virus so new it is not yet recognised by any anti-virus tools – which Copeland did have in place – meaning there is no way Copeland could have prevented the attack, despite their best efforts.

The attack was extremely fast and extremely virulent. Three days later, the majority of Copeland’s files had been encrypted by the ransomware. In simple terms, this meant no-one in Copeland had any access to any files or systems that were saved on shared or personal drives. The only accessible files were those stored on individual devices, and those saved on Microsoft OneDrive.

The hackers demanded a bitcoin ransom from Copeland in order to gain access to the files again. Some of Copeland’s systems were effectively rendered out of action, as networks had to be taken offline to avoid the attack spreading further, and to begin to understand and tackle its impacts. The only systems available were those that were web based such as the system used to run the waste service. The impact was huge. Overall, some parts of the council spent around ten weeks without basic IT functionality such as access to files, printing and scanning. The knock-on impact for the council is hard to quantify in scale. The council had no financial systems, including payroll. Fuel for the council’s fleet could not be paid, and only a basic payroll for staff could be used so no overtime or expenses could be paid. Restricted access in land charges caused some of biggest issues with house sales being halted in the area. For those moving into the area, this meant they were at risk of having sold their home and having to find temporary accommodation whilst the purchase of the property in Copeland was completed, a time-consuming manual workaround was put in place to reduce the risk of this happening.

It took several months for some council systems to be reinstated.  A backlog of more than 8,000 council tax and business rates bills was sent in February the following year as no bills could be issued for anyone who had a change in circumstances post cyber-attack up until this point.

A key problem was the significant loss of data. Some staff teams lost years of work. This impacted on teams with some really crucial information, such as licensing, planning files and environmental health records. Many spent time painstakingly piecing together what they could from email communications. In this environment, it was a real challenge for the leadership team to maintain staff morale. Agile working was encouraged, and additional flexi-arrangements were put in place for staff.

To add to the difficulties of the recovery, Copeland had to manage a by-election during this same period. A case study on how they managed this is available from the Electoral Commission.

Fortunately, however, the use of modern cloud-based systems meant that email access was available, which enabled at least some basic functionality. Likewise, the fact that Revenues and Benefits was handled off-site because of a shared service arrangement meant those services could also continue, as staff were temporarily relocated to neighbouring council offices in the borough. Copeland’s attackers remain unknown.

How the council responded

It took a couple of days to understand the scale and impact of the cyber-attack. However, once understood, the council acted swiftly, and a command structure was set up and the corporate and service business continuity plans were activated.

A specialist IT team was assembled – managed by Copeland’s own IT Manager – including seconding in colleagues from the IT/cyber security sector and neighbouring authorities and partners.

The senior management team dealing with the incident met staff to discuss the issue through face-to-face briefings, allowing staff to ask questions and discuss the issue openly. The council also had to be honest and frank with all stakeholders, who would not only experience the disruption to normal council operations but might also be put at risk from the attack themselves.

The council informed the Police cyber-crime unit and the Information Commissioner’s office (ICO). Although they did not think any data had been lost through the attack, conversations with the ICO continue 12 months after the initial attack.

Key learning points