Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

Legal Aid Agency breach may encompass millions of people | Computer Weekly

By Computer Weekly by By Computer Weekly
May 19, 2025
Home Uncategorized
Share on FacebookShare on Twitter


The Legal Aid Agency (LAA), a Ministry of Justice-backed civil and criminal legal aid and advice service covering England and Wales, has fallen victim to a cyber attack that appears to have led to the compromise of personal data on anybody who applied for legal aid through its digital service in the past 15 years.

The body said it first became aware of a cyber attack on its online digital services – used by legal aid providers to log their work and receive payment from the government – on 23 April 2025.

These services were quickly taken offline. Following this, working alongside the National Crime Agency (NCA) and the National Cyber Security Centre (NCSC), the agency’s IT team took action to reinforce security while the wider LAA reached out to the providers affected.

The LAA’s investigation initially appears to have shown that only legal aid providers were affected. However, on 16 May, it became apparent that the attackers had dug themselves far deeper into its systems than was first thought and accessed data on legal aid applicants dating back to 2010.

This includes not just those facing criminal prosecution, but individuals involved in family law cases, victims of domestic violence, and more.

It said the data includes contact details and addresses, birthdates, national ID numbers, criminal history, employment status and financial data. According to the Guardian, the intruders have stated they have accessed 2.1 million data points, although this is not verified.

“I understand this news will be shocking and upsetting for people, and I am extremely sorry this has happened,” said LAA CEO Jane Harbottle.

Since the discovery of the attack, my team has been working around the clock with the NCSC to bolster the security of our systems so we can safely continue the vital work of the agency
Jane Harbottle, Legal Aid Agency

“Since the discovery of the attack, my team has been working around the clock with the NCSC to bolster the security of our systems so we can safely continue the vital work of the agency.”

She continued: “However, it has become clear that to safeguard the service and its users, we needed to take radical action. That is why we’ve taken the decision to take the online service down.

“We have put in place the necessary contingency plans to ensure those most in need of legal support and advice can continue to access the help they need during this time,” said Harbottle. “I am incredibly grateful to legal aid providers for their patience and cooperation at a deeply challenging time.”

The agency urged anyone who has applied for legal aid since 2010 to take immediate steps to safeguard themselves. As is frequently the case, the breadth of the data breached makes it useful to fraudsters and scammers involved in downstream cyber crime activity. Should the data be leaked, those affected may see an uptick in suspicious activity such as unsolicited text messages or phone calls.

No word yet on ransomware

The agency gave no indication as to whether or not it is dealing with a ransomware incident. Toby Lewis, head of threat analysis at Darktrace, said establishing the full facts of what has gone wrong would be the number one priority for the investigators.

“The Legal Aid Agency breach represents a significant but not unusual cyber incident facing public services today. Without confirmation of ransomware or system outages, we’re likely looking at either pre-ransomware exfiltration caught early or straightforward data theft. If it’s the latter, this could be as simple as misconfigured cloud storage or as complex as a nation-state operation targeting bulk personal data, similar to previous international government breaches,” he said.

“What’s crucial now is determining which scenario we’re dealing with to properly assess the broader implications for government digital security.”



Source link

By Computer Weekly

By Computer Weekly

Next Post
Why CTEM is the Winning Bet for CISOs in 2025

Why CTEM is the Winning Bet for CISOs in 2025

Recommended.

Critical Ingress NGINX Controller Vulnerability Allows RCE Without Authentication

Critical Ingress NGINX Controller Vulnerability Allows RCE Without Authentication

March 24, 2025
Smarter Biofeedback: Thought Technology Ltd Launches the Upgraded eVu-Senz App for Enhanced Self-Regulation

Smarter Biofeedback: Thought Technology Ltd Launches the Upgraded eVu-Senz App for Enhanced Self-Regulation

April 22, 2025

Trending.

Chai AI Announces Upcoming Rollout of Apple and Google Age Verification APIs to Enhance Platform Safety

Chai AI Announces Upcoming Rollout of Apple and Google Age Verification APIs to Enhance Platform Safety

March 10, 2026
Huawei lanceert Next Generation FAN-oplossing

Huawei lanceert Next Generation FAN-oplossing

March 7, 2026
Baidu Announces Fourth Quarter and Fiscal Year 2025 Results

Baidu Announces Fourth Quarter and Fiscal Year 2025 Results

February 26, 2026
Half of Google’s software development now AI-generated | Computer Weekly

Half of Google’s software development now AI-generated | Computer Weekly

February 5, 2026
Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials

Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials

March 24, 2026

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio