158-year-old company forced to close after ransomware attack precipitated by a single guessed password — 700 jobs lost after hackers demand unpayable sum

Knights of Old added two new MAN vehicles to the fleet in 2022
(Image credit: MAN Truck & Bus UK on Facebook)
Recent updates

Update: July 22, 2025, 12:00 pm ET: This story has been updated with additional information, taken from a Panorama documentary that complements the original BBC report, to provide more details about the scope of the cyberattack

A UK-based transportation company with a venerable 158-year history has collapsed in the wake of a ransomware attack. Around 500 Northamptonshire-based Knights of Old (KNP) trucks are now off the road, and 700 people have lost their jobs, due to money-grasping cyberattackers, named as ‘Akira’ in a BBC report.

The internet-connected criminals are said to have gained access to KNP’s internet systems via a weak password that was used by one of the employees at the firm. Actually, the password was so weak it was simply guessed correctly, it is thought. Naturally, KNP doesn't want to name the specific employee whose password was compromised. After breaking this weakest link, the hackers encrypted and locked KNP’s operational data. The cyber villains then told KNP that the only way to get their data unlocked would be to pay.

A ransom note left by the hackers read as follows. “If you're reading this it means the internal infrastructure of your company is fully or partially dead… Let's keep all the tears and resentment to ourselves and try to build a constructive dialogue,” says the BBC report.

While the BBC report doesn't expand, the story is also the subject of a Panorama documentary released this week. According to the program, KNP had taken out insurance against cyberattacks. Its provider, Solace Global, sent a "cybercrisis" team to help, arriving on the scene on the following morning. According to Paul Cashmore of Solace, the team quickly determined that all of KNP's data had been encrypted, and all of their servers, backups, and disaster recovery had been destroyed. Furthermore, all of their endpoints had also been compromised, described as a worst-case scenario.

KNP investigated the ransomware demand with the help of a specialist firm, which estimated that the monetary demands could be as high as £5 million ($6.74 million). This was a sum well beyond the means of KNP, the documentary noting the company "simply didn't have the money."

Calls for improved cybersecurity hygiene

Elsewhere in the source report, we hear from members of the UK government's National Cyber Security Centre (NCSC). A representative of the NCSC told the BBC that they are striving to make the UK one of the safest places for online activity. However, operations like ransomware, where money can potentially be directly extracted by criminals, is a growing problem.

Research quoted by the BBC suggests that a typical ransomware demand for an afflicted UK company will be around £4 million ($5.4 million). Thus, what KNP thought they would have to raise to save their company wasn’t an atypical ransom demand.

While we can agonize about the scale of criminal hacking and these unaffordable ransoms, prevention is better than cure. Thus, proactive measures are being proposed, such as banning public bodies from paying ransoms and enforcing private companies' reporting of ransoms to the government. Moreover, it was mused that companies should have a regular independent cyber-audit to ensure a minimum standard of cybersecurity hygiene.

Follow Tom's Hardware on Google News to get our up-to-date news, analysis, and reviews in your feeds. Make sure to click the Follow button.

Mark Tyson
News Editor

Mark Tyson is a news editor at Tom's Hardware. He enjoys covering the full breadth of PC tech; from business and semiconductor design to products approaching the edge of reason.

  • rluker5
    Would have been nice to have had it backed up.
    Reply
  • vanadiel007
    I feel something is missing from this story.
    I don't see why a Company that employs 700 people and obviously has a large numbers of assets, would not be able to raise $6 million USD and instead choose to collapse.
    Reply
  • BladePocok
    vanadiel007 said:
    I feel something is missing from this story.
    I don't see why a Company that employs 700 people and obviously has a large numbers of assets, would not be able to raise $6 million USD and instead choose to collapse.
    Something like an insurance fraud type of deal? That could be nasty.
    Reply
  • lmcnabney
    All thanks to crypto.

    That is the means that hackers can demand ransom. Without it ransomware wouldn't be a thing.
    Reply
  • logainofhades
    lmcnabney said:
    All thanks to crypto.

    That is the means that hackers can demand ransom. Without it ransomware wouldn't be a thing.

    Ransomware was a thing long before crypto. First known one was in like 1989.
    Reply
  • MrQew
    vanadiel007 said:
    I feel something is missing from this story.
    I don't see why a Company that employs 700 people and obviously has a large numbers of assets, would not be able to raise $6 million USD and instead choose to collapse.
    Ya, it makes no sense as you can hobble along without your data, rebuild. There is absolutely something happening at that company they don't want people to know about. Also the claim that a random employees password was guessed AND he had full access to everything? The biggest issue with ransomware is that they usually install something, it's very rare that they try to hack a password. I hope the authorities investigate as it sounds like some shady stuff
    Reply
  • TerryLaze
    vanadiel007 said:
    I feel something is missing from this story.
    I don't see why a Company that employs 700 people and obviously has a large numbers of assets, would not be able to raise $6 million USD and instead choose to collapse.
    They can also keep the assets and start again without spending the 6mil.
    Unless the name alone is worth 6mil to them.
    Reply
  • DS426
    There's definitely some things missing from this story. For one, was the company already on the brink of collapse? Ransomware gangs research companies' finances and tend to base their ransom demand somewhat accordingly -- often around 3% of annual revenue. Even if it's higher, a trucking company won't have huge legal fees and fines due to a sprawling sensitive data breach like say a financial institution or hospital would. And heck, I know it might be difficult to go to the bank to get a loan to pay a ransomware extortion, but it could/would be frame instead as one to simply cover operational or capital costs?

    No data backups though... yeah, that's a crime in itself.

    I fully appreciate not wanting to reward cybercriminals for an act like this -- I'm a big proponent of not paying unless absolutely necessary (no data backups would be one case). My heart goes out to all those who lost their job literally overnight. Hopefully the company's leadership will both help employees find jobs as well as coordinate with other trucking companies to somewhat transfer contracts and relationships to other logistics companies. In times like this, there's almost always orgs that step up and say "please apply here."

    As for Akira, yeah, they're a nasty one. VMware ESXi environments tend to get targeted as in the past, they couldn't run EDR and many other popular security tools due to how VMware had it locked down and also naturally being a bare-metal hypervisor. I think that's started to change recently by enhancing support for third-party integrations, but too little too late IMO!
    Reply
  • DS426
    MrQew said:
    ...The biggest issue with ransomware is that they usually install something, it's very rare that they try to hack a password. I hope the authorities investigate as it sounds like some shady stuff
    I wouldn't say it's rare that they try to crack a password; they have several different means available besides pure-guessing brute force, such as dictionary attacks, password spraying, and credential stuffing. There's usually an account that's compromised that results in further attempts to move laterally and acquire elevated permissions i.e. admin. Even if malware begins the process of remote access and persistence, higher-privilege accounts need to compromised to provide the most effective result of the attack.

    Passwords are the single biggest drag on computer security. Most data breaches involve at least one compromised account along the way, including whether MFA is enabled (could be MFA bombing, phishing that intercepts MFA credentials, session token theft, etc.).
    Reply
  • King_V
    Just to address this point, there were backups, but:

    According to Paul Cashmore of Solace, the team quickly determined that all of KNP's data had been encrypted, and all of their servers, backups, and disaster recovery had been destroyed.
    Reply