Over 500,000 residents
On November 26, 2025, three major London councils—the Royal Borough of Kensington and Chelsea (RBKC), Westminster City Council (WCC), and the London Borough of Hammersmith and Fulham (LBHF)—declared a major incident following a severe cyberattack. The attack targeted their shared IT infrastructure, leading to a widespread shutdown of services, including phone systems, impacting over 500,000 residents. The councils are working with the National Cyber Security Centre (NCSC) and third-party specialists to respond to the incident. While officials have not confirmed the specific type of attack, the rapid and widespread shutdown is characteristic of a ransomware incident. The possibility that a managed service provider (MSP) was the primary target underscores the systemic risk of supply chain attacks on government services.
The attack exploited the interconnectedness of the three councils, which utilize a shared IT services arrangement. This model, while efficient, creates a single point of failure. A compromise in one part of the shared environment can rapidly cascade across all participating entities. The immediate shutdown of phone lines and other systems suggests the attackers gained significant control over the network, likely achieving domain administrative privileges. Security experts, such as Kevin Beaumont, have speculated this is a ransomware attack, which would align with the observed impact. If so, the attackers have likely exfiltrated large amounts of sensitive citizen data for double extortion, including social care records, financial details, and identity documents.
The attack likely targeted a vulnerability in an external-facing system or a compromised account within the shared IT environment or a third-party MSP. The TTPs could include:
T1190 - Exploit Public-Facing Application) or a compromised account obtained via phishing (T1566 - Phishing). Targeting an MSP represents a trusted relationship exploit (T1199 - Trusted Relationship).T1068 - Exploitation for Privilege Escalation) to gain control over the entire network.T1210 - Exploitation of Remote Services).T1048 - Exfiltration Over Alternative Protocol). The final step was to encrypt servers and workstations (T1486 - Data Encrypted for Impact), causing the widespread service disruption.T1199 - Trusted Relationship: High likelihood if an MSP was the entry point.T1486 - Data Encrypted for Impact: The service disruption is a clear indicator of this technique.T1021.002 - Remote Services: SMB/Windows Admin Shares: A common method for lateral movement in Windows environments.T1213 - Data from Information Repositories: Attackers would have targeted databases containing citizen data.The immediate impact is the disruption of essential public services for over half a million people, hindering their ability to access support, make payments, or report issues. The long-term impact could be far more severe if sensitive data was stolen. The councils hold vast amounts of PII, including financial data, social care records, and housing information. A breach of this data could lead to widespread identity theft and fraud, causing significant harm to residents. For the councils, the financial cost of recovery, regulatory fines from the Information Commissioner's Office (ICO), and reputational damage will be immense. This incident serves as a stark warning about the concentration of risk in shared service models without commensurate security investments.
To hunt for similar intrusions, security teams should monitor for:
| Type | Value | Description |
|---|---|---|
| log_source | VPN Logs | Monitor for logins from unusual geolocations or multiple failed logins followed by a success, indicating credential compromise. |
| process_name | powershell.exe |
Look for PowerShell execution with encoded commands or downloading remote scripts, common in ransomware intrusions. |
| command_line_pattern | net group "Domain Admins" [username] /add |
Command to add a user to the Domain Admins group, a key privilege escalation step. |
| network_traffic_pattern | RDP traffic from unusual internal sources to domain controllers or critical servers. | Indicator of lateral movement. |
| event_id | Windows Event ID 4720 | A user account was created. Monitor for unexpected account creation, especially with administrative privileges. |
Detecting this type of attack requires comprehensive monitoring of both network and endpoint activity. EDR solutions are critical for spotting malicious processes and scripts. SIEM systems should be configured to correlate events, such as a new account creation followed by remote logins to multiple systems. D3FEND techniques such as D3-DAM: Domain Account Monitoring are essential for detecting privilege escalation and lateral movement. The response must be swift, involving isolating the affected network segments to prevent further spread, preserving forensic evidence, and activating a pre-defined incident response and communication plan. Engaging with national cybersecurity bodies like the NCSC is crucial for accessing expert support.
Implement strict network segmentation between the councils' environments, even within a shared infrastructure, to prevent a compromise in one from spreading to others.
Mapped D3FEND Techniques:
Use PAM solutions to vault, rotate, and monitor privileged credentials, especially for shared administrative accounts used by MSPs.
Mapped D3FEND Techniques:
Ensure robust, tested, and immutable backups are in place to allow for recovery without paying a ransom.
Continuously scan for vulnerabilities on all internet-facing systems and ensure a strict SLA for patching with any MSPs or third-party providers.
To counter the cascading failure seen in the London councils attack, a robust Network Isolation strategy based on zero-trust principles is essential. Even within a shared IT infrastructure, each council's network should be treated as a separate security domain. Implement micro-segmentation to create strict access control policies between the services of RBKC, WCC, and LBHF. This ensures that if an attacker compromises one council's assets or a shared service, they cannot automatically move laterally into the other councils' environments. This 'blast containment' approach is critical for limiting the impact of an intrusion within multi-tenant or shared government service platforms.
The attackers in the London councils incident likely escalated privileges to gain widespread control. Implementing Domain Account Monitoring is key to detecting this activity. Security teams must establish a baseline of normal administrative activity and configure high-fidelity alerts for suspicious actions. This includes monitoring for the creation of new administrative accounts, the addition of users to privileged groups (like 'Domain Admins'), and anomalous login patterns for service accounts or MSP technicians. Correlating these events with other indicators, such as logins from unusual locations or after-hours activity, can provide early warning of a compromise in progress, allowing for intervention before a full-scale ransomware deployment.
As a preventative measure, strict Inbound Traffic Filtering should be applied to all internet-facing services shared by the councils. This goes beyond standard firewall rules. It involves using Web Application Firewalls (WAFs) to inspect traffic for signs of exploitation attempts against web applications and VPN gateways. Geofencing policies should be applied to restrict access from countries where legitimate users are not located. Furthermore, all administrative interfaces for shared infrastructure must be removed from public internet exposure and accessible only via hardened jump boxes or private networks. This significantly reduces the attack surface available to external threat actors, making initial access more difficult.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats