ICO fines Cl0p sufferer South Staffs Water over information breach
Utility operator South Staffordshire Plc and its subsidiary South Staffordshire Water Plc have been fined a lowered fee of £964,900 by the Data Commissioner’s Workplace (ICO), following enhancements made after a Cl0p ransomware assault that led to the non-public information of over 600,000 folks being leaked onto the darkish internet.
The cyber assault itself got here to gentle in August 2022, and was at first the supply of some confusion when the Cl0p gang misidentified its sufferer and claimed it was attacking and extorting Thames Water. The cyber criminals even revealed a prolonged rant in opposition to Thames Water and accused it of ignoring them, and never caring about its clients. The hapless cyber crooks’ faulty claims have been extensively repeated throughout the UK media on the time.
The uncovered information included private particulars of South Staffordshire clients, corresponding to full names, birthdates and gender info, account info together with credentials for on-line providers, monetary information together with checking account numbers and kind codes, and call particulars together with e mail and postal addresses, and cellphone numbers.
A small proportion of consumers listed on the Precedence Service Register had info uncovered from which medical info might have been inferred, and a small variety of workers have been additionally affected by a leak of human sources information together with Nationwide Insurance coverage numbers.
The ICO mentioned the incident uncovered “vital failures” in its approaches to information safety, and left each its clients and workers susceptible for years.
“Prospects do not need the selection over which water firm serves them – they’re required to share their private info and place their belief in that supplier,” mentioned Ian Hulme, ICO interim govt director for regulatory supervision.
“It’s subsequently important that water corporations honour that belief by taking their information safety tasks severely.”
Mendacity low
Though the cyber assault itself occurred in 2022, the incident actually dates again to 2020, when a person at South Staffordshire fell for a phishing e mail that enabled the menace actors to put in malware on its techniques undetected.
Although it’s unclear whether or not or not Cl0p first hacked South Staffordshire’s techniques itself or obtained the keys via an preliminary entry dealer (IAB), by Might of 2022 – 20 months later – the gang began to maneuver laterally via South Staffordshire’s community and was in a position to compromise area administrator privileges. Nonetheless, Cl0p’s presence was not detected till the center of July, when IT efficiency points prompted an inner investigation.
On 26 July 2022, South Staffordshire’s IT groups reported a private information breach to the ICO – then, two days later, found a ransom observe that Cl0p had tried to distribute to employees members – apparently with out success.
Nonetheless, the extent of the info leak didn’t turn into obvious for an additional 4 months, when South Staffordshire found that over 4.1 terabytes of information had been revealed.
In the midst of its probe, the ICO mentioned it had discovered South Staffordshire had not applied acceptable safety controls required of it in UK regulation. Failings included restricted controls that enabled Cl0p to raise its privileges, insufficient monitoring and logging that didn’t detect its exercise, the usage of out of date software program – together with Home windows Server 2003, and insufficient vulnerability administration, with techniques left unpatched, and inner and exterior safety scanning not undertaken.
“The steps that South Staffordshire didn’t take are established, extensively understood and efficient controls to guard pc networks,” mentioned Hulme. “The ICO expects all organisations – and significantly these dealing with giant volumes of non-public info as a part of vital nationwide infrastructure – to have these in place.
“Ready for efficiency points or a ransom observe to find a breach is just not acceptable,” he added. “Proactive safety is a authorized requirement, not an non-obligatory further.”
Cyber enhancements
The ICO mentioned the entire nice of slightly below one million kilos – which is a 40% discount on the preliminary quantity proposed – was a voluntary settlement that mirrored South Staffordshire’s representations and accounted for numerous enhancements made within the wake of the incident, in addition to the proactive assist the organisation supplied to these affected, and its engagement with regulators and the Nationwide Cyber Safety Settlement.
It added that South Staffordshire had made an early admission of legal responsibility, and in accepting its findings, agreed to pay the penalty with out additional attraction.
“We welcome South Staffordshire’s early admission and cooperation on this case, permitting us to succeed in a voluntary settlement and save sources,” famous Hulme.
South Staffordshire has been contacted for remark however had not responded to our inquiries on the time of publication.

