Capita Fined £14 million For Cybersecurity Failures Leading to Breach
Capita, the UK’s largest outsourcing firm, has been fined a record £14 million by the Information Commissioner’s Office (ICO) for cybersecurity failures that led to a massive ransomware attack in 2023. The breach compromised the personal and financial data of 6.6 million individuals, including names, addresses, birth dates, and payment card details. Though Capita initially denied data loss, investigations revealed extensive data exfiltration and delays in responding to the attack.
The incident began when a malicious JavaScript file was downloaded onto an employee’s device on March 22. The compromised system remained online for 58 hours - long enough for threat actors to deploy Qakbot malware and Cobalt Strike tools. Attackers exfiltrated nearly a terabyte of data before executing the ransomware. Capita’s Security Operations Center (SOC) was found to be severely understaffed, with poor threat escalation protocols, weak detection configurations, and slow incident response. The ICO concluded that many of these failures were preventable and criticized Capita for contradictory statements and poor internal cybersecurity hygiene. The breach was ultimately linked to the Black Basta ransomware group. Capita has not confirmed whether it paid a ransom, and it continues to face reputational damage and regulatory scrutiny.
This breach is a powerful reminder of the critical need for end-to-end cybersecurity management with a platform like NIKSUN that is powered by deep packet inspection (DPI) and Layer 2–7 visibility. Traditional endpoint detection alone is insufficient without comprehensive insights into how data moves through the network and where threats may be hiding. DPI enables organizations to inspect all traffic - including DNS, SSL/TLS, and web traffic - to detect malicious behavior, command-and-control channels, data exfiltration, and suspicious payloads in real-time. Had Capita implemented rich, real-time network monitoring across its infrastructure, it could have detected lateral movement, abnormal queries, and malicious payload delivery before the attack escalated. For large organizations handling sensitive data at scale, this kind of full-spectrum network observability isn’t optional - it’s a core requirement for digital trust, resilience, and regulatory compliance. Read more about this story on our LinkedIn page
We use cookies to offer you a better browsing experience and to analyze site traffic. By using our site, you consent to our use of cookies.
Essential Cookies
Site Analytics
Essential Cookies
These cookies are necessary for certain areas of the site to function. They are used for access to secure areas of the website and to help us comply with legal requirements like GDPR.
Site Analytics
These cookies are used to collect information about how users use our site. We use these to improve how our website works.