Capita given record £14 million fine over ransomware attack security failings

Capita, the United Kingdom’s largest outsourcing company, was on Wednesday fined £14 million ($18.7 million) over security failings that saw attackers compromise the personal information of 6.6 million people in a ransomware attack in 2023.

The voluntary settlement is for less than a third of the £45 million ($60 million) Britain’s data protection regulator had initially intended to impose, but remains the largest fine the Information Commissioner’s Office (ICO) has ever issued in a ransomware case.

Despite Capita initially stating there was “no evidence of customer, supplier or colleague data having been compromised,” the company and its pensions subsidiary were found to have exposed data about the  pensions it handles, Capita’s own staff and customers from other organizations Capita supports.

The compromised data included names, addresses and dates of birth, as well as financial information such as credit and debit card numbers and CVVs. The ICO said it received complaints from people who were concerned money had been stolen from their accounts as the result of the data breach.

“Capita failed in its duty to protect the data entrusted to it by millions of people. The scale of this breach and its impact could have been prevented had sufficient security measures been in place,” stated John Edwards, the Information Commissioner.

Following media reports that staff were locked out of their accounts, Capita confirmed a cyberattack had taken place on April 3, 2023. It issued a statement to the governmental Regulatory News Service stating that “immediate steps were taken to successfully isolate and contain the issue.” 

This claim appears to contrast with the ICO’s findings. According to the regulator’s monetary penalty notice, after a malicious JavaScript file was downloaded onto an employee device on March 22, 2023 the compromised device was not quarantined for 58 hours, ultimately allowing the attackers to further access the company’s network and deploy ransomware.

The ICO said Capita had provided contradictory information about how quickly it had responded to the initial access. It is a crime under British financial laws, in particular Section 89 of the Financial Services and Markets Act, to publish misleading statements to the market. No regulators have made such a finding in Capita’s case.

A spokesperson for Capita told Recorded Future News: “We did take some immediate steps to contain the issue, as has been acknowledged by the ICO. We do not believe we are in breach of Section 89 of the Financial Services and Markets Act 2000.”

After the initial compromise, the threat actor downloaded the Qakbot malware and the Cobalt Strike intrusion tool onto Capita’s systems. Around 29 hours after the initial access, Capita’s security platform McAfee/Trellix identified Qakbot recovering and decrypting usernames and passwords from compromised devices’ browsers. 

The malicious JavaScript file had generated a “Priority 2” alert in Capita’s endpoint detection and response (EDR) software. The ICO found that a properly configured EDR tool should have upgraded the threat to “Priority 1” after detecting the Qakbot and Cobalt Strike infection.

Capita then manually took three separate devices offline on March 28 after noticing suspicious activity. The ICO listed a range of security failings, including an understaffed Security Operations Centre (SOC), which usually only had only one analyst on per shift; and the lack of automated response and decent escalation protocols.

Over the next two days, the attackers exfiltrated nearly a terabyte of data before deploying ransomware onto Capita’s systems and resetting all user passwords in the early hours of March 31.

The ICO noted that Capita claimed both that the exfiltrated data was “an in an unstructured and unusable format,” meaning the attacker would not have been able to exploit it, and that the company had been “the target of a state sponsored attack” which the ICO noted would, if correct, have meant the perpetrator had “significant resources at their disposal to examine and extract usable data.”

The attack was ultimately claimed by the Black Basta ransomware group, which posted what it alleged were documents stolen from Capita’s internal systems. The listing subsequently disappeared from Black Basta’s extortion site, a move that often indicates an extortion fee has been paid or is being negotiated. Capita has not commented on whether it made such a payment.

“When a company of Capita’s size falls short, the consequences can be significant,” said Edwards. “Not only for those whose data is compromised — many of whom have told us of the anxiety and stress they have suffered — but for wider trust amongst the public and for our future prosperity. As our fine shows, no organisation is too big to ignore its responsibilities.”

In a statement on Wednesday, Capita’s chief executive said: “Following an extended period of dialogue with the ICO over the last two years, we are pleased to have concluded this matter and reach today’s settlement.”

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Alexander Martin

Alexander Martin

is the UK Editor for Recorded Future News. He was previously a technology reporter for Sky News and is also a fellow at the European Cyber Conflict Research Initiative.

 

Total
0
Shares
Previous Post

New York secures $14 million in fines from 8 car insurance companies after data breaches

Next Post

Over 100 VS Code Extensions Exposed Developers to Hidden Supply Chain Risks

Related Posts

Microsoft Mitigates Record 15.72 Tbps DDoS Attack Driven by AISURU Botnet

Microsoft on Monday disclosed that it automatically detected and neutralized a distributed denial-of-service (DDoS) attack targeting a single endpoint in Australia that measured 15.72 terabits per second (Tbps) and nearly 3.64 billion packets per second (pps). The tech giant said it was the largest DDoS attack ever observed in the cloud, and that it originated from a TurboMirai-class Internet of
Read More

Preparing for the Digital Battlefield of 2026: Ghost Identities, Poisoned Accounts, & AI Agent Havoc

BeyondTrust’s annual cybersecurity predictions point to a year where old defenses will fail quietly, and new attack vectors will surge. Introduction The next major breach won’t be a phished password. It will be the result of a massive, unmanaged identity debt. This debt takes many forms: it’s the “ghost” identity from a 2015 breach lurking in your IAM, the privilege sprawl from thousands of new
Read More

Russian Hackers Create 4,300 Fake Travel Sites to Steal Hotel Guests’ Payment Data

A Russian-speaking threat behind an ongoing, mass phishing campaign has registered more than 4,300 domain names since the start of the year. The activity, per Netcraft security researcher Andrew Brandt, is designed to target customers of the hospitality industry, specifically hotel guests who may have travel reservations with spam emails. The campaign is said to have begun in earnest around
Read More