Major Cyberattack Hits Three London Councils, Crippling Public Services

Shared IT Systems for Three London Boroughs Taken Offline by Coordinated Cyberattack, Affecting Over 500,000 Residents

HIGH
November 27, 2025
6m read
CyberattackRansomwareSupply Chain Attack

Impact Scope

People Affected

Over 500,000 residents

Industries Affected

Government

Geographic Impact

United Kingdom (local)

Related Entities

Organizations

Royal Borough of Kensington and ChelseaWestminster City CouncilLondon Borough of Hammersmith and FulhamNational Cyber Security Centre (NCSC) Information Commissioner's Office (ICO)

Full Report

Executive Summary

On November 26, 2025, three major London councils—the Royal Borough of Kensington and Chelsea (RBKC), Westminster City Council (WCC), and the London Borough of Hammersmith and Fulham (LBHF)—declared a major incident following a severe cyberattack. The attack targeted their shared IT infrastructure, leading to a widespread shutdown of services, including phone systems, impacting over 500,000 residents. The councils are working with the National Cyber Security Centre (NCSC) and third-party specialists to respond to the incident. While officials have not confirmed the specific type of attack, the rapid and widespread shutdown is characteristic of a ransomware incident. The possibility that a managed service provider (MSP) was the primary target underscores the systemic risk of supply chain attacks on government services.

Threat Overview

The attack exploited the interconnectedness of the three councils, which utilize a shared IT services arrangement. This model, while efficient, creates a single point of failure. A compromise in one part of the shared environment can rapidly cascade across all participating entities. The immediate shutdown of phone lines and other systems suggests the attackers gained significant control over the network, likely achieving domain administrative privileges. Security experts, such as Kevin Beaumont, have speculated this is a ransomware attack, which would align with the observed impact. If so, the attackers have likely exfiltrated large amounts of sensitive citizen data for double extortion, including social care records, financial details, and identity documents.

Technical Analysis

The attack likely targeted a vulnerability in an external-facing system or a compromised account within the shared IT environment or a third-party MSP. The TTPs could include:

  1. Initial Access: Exploitation of a vulnerability in a shared service (T1190 - Exploit Public-Facing Application) or a compromised account obtained via phishing (T1566 - Phishing). Targeting an MSP represents a trusted relationship exploit (T1199 - Trusted Relationship).
  2. Privilege Escalation & Discovery: After gaining a foothold, attackers would escalate privileges to a domain administrator level (T1068 - Exploitation for Privilege Escalation) to gain control over the entire network.
  3. Lateral Movement: The attackers moved across the networks of all three councils, leveraging the shared infrastructure to spread their access (T1210 - Exploitation of Remote Services).
  4. Data Exfiltration & Impact: Before deploying ransomware, the attackers would have exfiltrated sensitive data (T1048 - Exfiltration Over Alternative Protocol). The final step was to encrypt servers and workstations (T1486 - Data Encrypted for Impact), causing the widespread service disruption.

MITRE ATT&CK Techniques Observed:

Impact Assessment

The immediate impact is the disruption of essential public services for over half a million people, hindering their ability to access support, make payments, or report issues. The long-term impact could be far more severe if sensitive data was stolen. The councils hold vast amounts of PII, including financial data, social care records, and housing information. A breach of this data could lead to widespread identity theft and fraud, causing significant harm to residents. For the councils, the financial cost of recovery, regulatory fines from the Information Commissioner's Office (ICO), and reputational damage will be immense. This incident serves as a stark warning about the concentration of risk in shared service models without commensurate security investments.

Cyber Observables for Detection

To hunt for similar intrusions, security teams should monitor for:

Type Value Description
log_source VPN Logs Monitor for logins from unusual geolocations or multiple failed logins followed by a success, indicating credential compromise.
process_name powershell.exe Look for PowerShell execution with encoded commands or downloading remote scripts, common in ransomware intrusions.
command_line_pattern net group "Domain Admins" [username] /add Command to add a user to the Domain Admins group, a key privilege escalation step.
network_traffic_pattern RDP traffic from unusual internal sources to domain controllers or critical servers. Indicator of lateral movement.
event_id Windows Event ID 4720 A user account was created. Monitor for unexpected account creation, especially with administrative privileges.

Detection & Response

Detecting this type of attack requires comprehensive monitoring of both network and endpoint activity. EDR solutions are critical for spotting malicious processes and scripts. SIEM systems should be configured to correlate events, such as a new account creation followed by remote logins to multiple systems. D3FEND techniques such as D3-DAM: Domain Account Monitoring are essential for detecting privilege escalation and lateral movement. The response must be swift, involving isolating the affected network segments to prevent further spread, preserving forensic evidence, and activating a pre-defined incident response and communication plan. Engaging with national cybersecurity bodies like the NCSC is crucial for accessing expert support.

Mitigation

  1. Supply Chain Security: For organizations using MSPs or shared services, it is vital to conduct thorough due diligence on the provider's security posture. Contracts must include right-to-audit clauses and strict security SLAs.
  2. Network Segmentation: Implement robust network segmentation between the participating councils and between critical and non-critical systems. A zero-trust architecture would significantly limit an attacker's ability to move laterally.
  3. Immutable Backups: Maintain offline, immutable backups for all critical systems and data. This is the most effective defense against ransomware, enabling restoration without paying a ransom.
  4. Privileged Access Management (PAM): Strictly control and monitor the use of privileged accounts. Implement just-in-time (JIT) access and require MFA for all administrative actions.
  5. Incident Response Plan: Develop and regularly test a comprehensive incident response plan that specifically addresses scenarios involving shared infrastructure and third-party providers.

Timeline of Events

1
November 26, 2025
A cyberattack begins disrupting shared IT systems for three London councils, leading to a declaration of a major incident.
2
November 27, 2025
This article was published

MITRE ATT&CK Mitigations

Implement strict network segmentation between the councils' environments, even within a shared infrastructure, to prevent a compromise in one from spreading to others.

Mapped D3FEND Techniques:

Use PAM solutions to vault, rotate, and monitor privileged credentials, especially for shared administrative accounts used by MSPs.

Mapped D3FEND Techniques:

Ensure robust, tested, and immutable backups are in place to allow for recovery without paying a ransom.

Continuously scan for vulnerabilities on all internet-facing systems and ensure a strict SLA for patching with any MSPs or third-party providers.

D3FEND Defensive Countermeasures

To counter the cascading failure seen in the London councils attack, a robust Network Isolation strategy based on zero-trust principles is essential. Even within a shared IT infrastructure, each council's network should be treated as a separate security domain. Implement micro-segmentation to create strict access control policies between the services of RBKC, WCC, and LBHF. This ensures that if an attacker compromises one council's assets or a shared service, they cannot automatically move laterally into the other councils' environments. This 'blast containment' approach is critical for limiting the impact of an intrusion within multi-tenant or shared government service platforms.

The attackers in the London councils incident likely escalated privileges to gain widespread control. Implementing Domain Account Monitoring is key to detecting this activity. Security teams must establish a baseline of normal administrative activity and configure high-fidelity alerts for suspicious actions. This includes monitoring for the creation of new administrative accounts, the addition of users to privileged groups (like 'Domain Admins'), and anomalous login patterns for service accounts or MSP technicians. Correlating these events with other indicators, such as logins from unusual locations or after-hours activity, can provide early warning of a compromise in progress, allowing for intervention before a full-scale ransomware deployment.

As a preventative measure, strict Inbound Traffic Filtering should be applied to all internet-facing services shared by the councils. This goes beyond standard firewall rules. It involves using Web Application Firewalls (WAFs) to inspect traffic for signs of exploitation attempts against web applications and VPN gateways. Geofencing policies should be applied to restrict access from countries where legitimate users are not located. Furthermore, all administrative interfaces for shared infrastructure must be removed from public internet exposure and accessible only via hardened jump boxes or private networks. This significantly reduces the attack surface available to external threat actors, making initial access more difficult.

Sources & References

Multiple London councils' IT systems disrupted by cyberattack
BleepingComputer (bleepingcomputer.com) November 26, 2025
Multiple London councils faced a cyberattack
Security Affairs (securityaffairs.com) November 26, 2025
Multiple London Councils Responding to Cyberattack
BankInfoSecurity (bankinfosecurity.com) November 26, 2025
NEWS ROUNDUP – 26th November 2025
Digital Forensics Magazine (digitalforensicsmagazine.com) November 26, 2025

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

LondonCouncilGovernmentRansomwareMSPSupply Chain AttackNCSC

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading