Two Years After Ransomware Attack, Scottish Council Still Rebuilding Systems

November 28, 2025

A Scottish council remains unable to fully restore critical systems two years after a devastating ransomware attack, highlighting the long-term consequences of inadequate cybersecurity preparation and the challenges facing resource-constrained local authorities.



Comhairle nan Eilean Siar, serving Scotland's Western Isles, suffered a ransomware attack in November 2023 that required extensive system reconstruction. According to a report published by Scotland's Accounts Commission, several systems remain unrestored even now, with large data volumes slowing the digital recovery process.

The Systems Still Down

Systems for housing benefits, council tax, and non-domestic rates remain offline two years after the attack. These revenue-critical functions represent essential services that councils depend upon for both public service delivery and financial sustainability.


The prolonged outage demonstrates how ransomware attacks create lasting operational damage extending far beyond initial incident response. Whilst the council has worked continuously toward recovery, the sheer volume of data requiring reconstruction has made full restoration a multi-year challenge.



Incomplete Security Improvements

Perhaps more concerning than the systems still offline are the cybersecurity improvements that remain unimplemented. The audit notes that as of September 2025, only five of ten recommended security enhancements have been put in place.


The most significant gaps include untested staff training programmes, untested incident response plans, and incomplete compliance with NCSC security principles. These omissions leave the council potentially vulnerable to future attacks even as it struggles to recover from the previous one.


The report states that "weaknesses in IT infrastructure, governance, preparedness, and staff capacity were identified back in 2021/22 and had they been addressed sooner, the impact of the attack might have been reduced."


This observation underscores a common pattern: known vulnerabilities often go unaddressed due to resource constraints, competing priorities, or insufficient urgency—until an attack forces attention on cybersecurity at catastrophic cost.



The Pre-Attack Vulnerabilities

At the time of the attack, multiple factors contributed to the council's vulnerability. Five of seventeen IT positions were vacant, including a senior systems analyst role. Biennial cybersecurity training for staff had lapsed. The IT Health Check was overdue, and Public Sector Network certification had expired for 2022-23 without renewal.


Most critically, the council lacked an incident response and disaster recovery plan—fundamental components of cybersecurity preparedness that should exist before attacks occur, not be developed afterward.


The audit identified that many systems were hosted locally rather than in cloud environments. Beyond cloud-hosted M365, most systems were affected by the attack. Backups were deemed insufficiently robust to minimise impact from potential attacks.


Despite these weaknesses, the council's overall cyber posture was still considered adequate at the time—a judgment that subsequent events proved tragically optimistic.



The Human Cost

Council staff have worked for two years bringing services back online. By April 2025, all services were operational, though departments face significant backlogs of work caused by the attack.


The ransomware locked staff out of data, with some permanently lost. The council couldn't publish 2024 annual accounts on time. Employees pieced together data from disparate sources to file accounts six months late, acknowledging gaps would remain.


Staff workload increased significantly post-attack as manual processes replaced inaccessible digital systems, stretching individuals to capacity. The audit notes this increased workload will affect operations for months or years to come and has damaged staff morale.


Jo Armstrong, Chair of the Accounts Commission, acknowledged the human toll: "Comhairle nan Eilean Siar staff went above and beyond to mitigate the impacts on service users, suppliers, and the local community. This increased pressure on staff as they took on additional work, alongside dealing with day-to-day responsibilities."



The Financial Impact

Direct costs related to the attack stand at an estimated £950,000. Around £250,000 was claimed from the Scottish government, with the council continuing to pursue insurance payouts to cover larger shares of total costs.


These direct costs primarily relate to consultancy fees, cloud setup costs, and ongoing charges for cloud-based systems. However, the audit notes that Comhairle incurred many more indirect costs, such as those related to missed growth opportunities whilst instructing staff to focus on rebuilding databases.


The true financial impact extends far beyond the £950,000 direct cost figure. Lost productivity, delayed projects, staff overtime, reputational damage, and opportunity costs accumulate into total economic harm several times larger than initial incident response expenses.



The Staffing Challenge

Finding appropriate talent to fill vacant cybersecurity roles presents longstanding challenges for all organisations, but proves especially difficult for cash-strapped local authorities located away from mainland population centres.


This staffing challenge isn't unique to Comhairle nan Eilean Siar. Local councils across the UK struggle to compete with private sector salaries for cybersecurity professionals whilst facing growing threat levels and increasingly sophisticated attacks.


The result creates a dangerous gap: the organisations managing critical public services and sensitive citizen data often possess the least mature cybersecurity capabilities and most resource-constrained IT departments.



What the Council Did Right

Despite the dire circumstances and ongoing recovery challenges, the Accounts Commission commended the authority for appropriate response given its resources. The council escalated the case to the Scottish government and NCSC, and followed its business continuity plan even though it hadn't been properly stress-tested for scenarios this severe.


The authority quickly identified its HR/payroll system as the most critical system rendered inaccessible and worked to restore functionality. Payroll was restored by month's end so staff didn't miss paychecks, with partial functionality achieved by mid-December.


The council engaged appropriate regulators and third parties, including UK cybersecurity firm NCC Group, to assist with remediation efforts and has made progress in its recovery plan.



The Broader Implications

Armstrong's statement highlights the systemic challenge: "This cyberattack shows how exposed local government is, and the urgent need to test resilience and recovery arrangements. Councils need to assume that it's a case of when, not if, they are attacked."


She emphasised that collective approaches are needed: "They must collaborate, learn from each other, and work closely with partners, including the Scottish Government."


The Accounts Commission urges that Comhairle must test updated business continuity and incident response plans against scenarios as severe as the 2023 attack. The audit notes that whilst the council's response was largely effective, continuity plans weren't applied consistently across the organisation and hadn't been adequately tested.


As a matter of priority, the audit recommends that realistic and achievable timelines should be set for all agreed recommendations, supporting elected members to monitor delivery more effectively and focus on mitigating risks.



Lessons for All Organisations

Comhairle nan Eilean Siar's experience provides crucial lessons extending beyond local government:


Known vulnerabilities demand urgent attention. Weaknesses identified years before the attack contributed to its severity. Cybersecurity improvements cannot be perpetually deferred.

Recovery takes years, not months. Two years after the attack, critical systems remain offline. Organisations must plan for extended recovery timelines when assessing cyber risk.

Testing matters. Having business continuity and incident response plans that haven't been tested against realistic scenarios provides false confidence. Plans must be validated before attacks occur.

Staffing gaps create vulnerability. Vacant IT positions, lapsed training, and expired certifications all contributed to the council's exposure. Adequate staffing isn't optional for cybersecurity.

Indirect costs dwarf direct costs. The £950,000 direct cost represents only a fraction of total economic impact. Lost productivity, damaged morale, and missed opportunities multiply financial harm.



Don't Let Ransomware Define Your Next Two Years

At Altiatech, we help organisations implement robust cybersecurity defences, comprehensive incident response planning, and disaster recovery strategies before attacks occur. Our approach focuses on practical security measures appropriate to your resources and risk profile.


From security assessments identifying vulnerabilities to tested backup strategies ensuring rapid recovery, we provide the expertise that prevents ransomware attacks from becoming multi-year recovery operations.


Don't wait for an attack to discover your defences are inadequate and your plans untested.


Get in touch today:

📧 Email: innovate@altiatech.com
📞 Phone (UK): +44 (0)330 332 5482

Prepare now. Recover faster. Protect what matters.

November 28, 2025
A threat group known as Scattered Lapsus$ Hunters is targeting Zendesk users through a sophisticated campaign involving fake support sites and weaponised helpdesk tickets, according to security researchers at ReliaQuest. The operation represents an evolution in how cybercriminals exploit trust in enterprise SaaS platforms.
November 28, 2025
Amazon Web Services has launched a new feature allowing customers to make DNS changes within 60 minutes during service disruptions in its US East (N. Virginia) region. The announcement tacitly acknowledges what many have long observed: AWS's largest and most critical region has a reliability problem.
November 25, 2025
The Cybersecurity and Infrastructure Security Agency has issued an alert warning that multiple cyber threat actors are actively leveraging commercial spyware to target users of mobile messaging applications including Signal and WhatsApp. The sophisticated campaigns use advanced social engineering and exploit techniques to compromise victims' devices and gain unauthorized access to their communications.
By fahd.zafar November 24, 2025
Microsoft has introduced experimental AI agent capabilities into Windows through Copilot Actions and agent workspaces, features designed to automate everyday tasks like organising files, scheduling meetings, and sending emails. However, the announcement comes with significant security warnings that business leaders and IT administrators must understand before enabling these capabilities.
November 17, 2025
Anthropic has disclosed the first documented case of a large-scale cyberattack executed with minimal human intervention, marking a significant escalation in AI-enabled cyber threats. The campaign, attributed with high confidence to a Chinese state-sponsored group, demonstrates how rapidly AI capabilities are being weaponised for espionage operations.
November 14, 2025
Microsoft has unveiled its first "AI superfactory" - a revolutionary approach to cloud infrastructure that connects multiple datacentres across vast distances to function as a single, unified AI training system. The innovation marks a significant shift in how hyperscale computing infrastructure can be architected.
By fahd.zafar November 14, 2025
The UK's National Savings & Investments bank has spectacularly exceeded its digital transformation budget by £1.3 billion whilst running four years behind schedule, according to a damning National Audit Office report. The programme's failures illustrate how ambitious technology projects collapse under procurement weaknesses, underestimated complexity, and insufficient expertise.
November 7, 2025
For the first time in UK history, a cyberattack has caused sufficient damage to impact the nation's GDP growth. The Bank of England has cited the Jaguar Land Rover breach as a contributing factor to the country's slower-than-expected economic performance, marking a watershed moment in understanding cyber threats as macroeconomic risks.
November 6, 2025
Marks & Spencer has revealed the full financial impact of its April 2025 cyberattack, with total costs reaching £136 million and profits plummeting by more than half. The incident demonstrates how a single cyber breach can devastate even large retailers' financial performance and operational capabilities. 
November 5, 2025
Police forces in England and Wales spend approximately £2 billion annually on technology, with 97% dedicated solely to maintaining legacy systems. This leaves almost nothing for innovation, artificial intelligence, or the service transformation needed to improve policing productivity.