158-year-old company forced to close after ransomware attack precipitated by a single guessed password — 700 jobs lost after hackers demand unpayable sum
An employee’s weak password was the company’s Achilles' heel.

Update: July 22, 2025, 12:00 pm ET: This story has been updated with additional information, taken from a Panorama documentary that complements the original BBC report, to provide more details about the scope of the cyberattack
A UK-based transportation company with a venerable 158-year history has collapsed in the wake of a ransomware attack. Around 500 Northamptonshire-based Knights of Old (KNP) trucks are now off the road, and 700 people have lost their jobs, due to money-grasping cyberattackers, named as ‘Akira’ in a BBC report.
The internet-connected criminals are said to have gained access to KNP’s internet systems via a weak password that was used by one of the employees at the firm. Actually, the password was so weak it was simply guessed correctly, it is thought. Naturally, KNP doesn't want to name the specific employee whose password was compromised. After breaking this weakest link, the hackers encrypted and locked KNP’s operational data. The cyber villains then told KNP that the only way to get their data unlocked would be to pay.
A ransom note left by the hackers read as follows. “If you're reading this it means the internal infrastructure of your company is fully or partially dead… Let's keep all the tears and resentment to ourselves and try to build a constructive dialogue,” says the BBC report.
While the BBC report doesn't expand, the story is also the subject of a Panorama documentary released this week. According to the program, KNP had taken out insurance against cyberattacks. Its provider, Solace Global, sent a "cybercrisis" team to help, arriving on the scene on the following morning. According to Paul Cashmore of Solace, the team quickly determined that all of KNP's data had been encrypted, and all of their servers, backups, and disaster recovery had been destroyed. Furthermore, all of their endpoints had also been compromised, described as a worst-case scenario.
KNP investigated the ransomware demand with the help of a specialist firm, which estimated that the monetary demands could be as high as £5 million ($6.74 million). This was a sum well beyond the means of KNP, the documentary noting the company "simply didn't have the money."
Calls for improved cybersecurity hygiene
Elsewhere in the source report, we hear from members of the UK government's National Cyber Security Centre (NCSC). A representative of the NCSC told the BBC that they are striving to make the UK one of the safest places for online activity. However, operations like ransomware, where money can potentially be directly extracted by criminals, is a growing problem.
Research quoted by the BBC suggests that a typical ransomware demand for an afflicted UK company will be around £4 million ($5.4 million). Thus, what KNP thought they would have to raise to save their company wasn’t an atypical ransom demand.
Get Tom's Hardware's best news and in-depth reviews, straight to your inbox.
While we can agonize about the scale of criminal hacking and these unaffordable ransoms, prevention is better than cure. Thus, proactive measures are being proposed, such as banning public bodies from paying ransoms and enforcing private companies' reporting of ransoms to the government. Moreover, it was mused that companies should have a regular independent cyber-audit to ensure a minimum standard of cybersecurity hygiene.
Follow Tom's Hardware on Google News to get our up-to-date news, analysis, and reviews in your feeds. Make sure to click the Follow button.

Mark Tyson is a news editor at Tom's Hardware. He enjoys covering the full breadth of PC tech; from business and semiconductor design to products approaching the edge of reason.
-
vanadiel007 I feel something is missing from this story.Reply
I don't see why a Company that employs 700 people and obviously has a large numbers of assets, would not be able to raise $6 million USD and instead choose to collapse. -
BladePocok
Something like an insurance fraud type of deal? That could be nasty.vanadiel007 said:I feel something is missing from this story.
I don't see why a Company that employs 700 people and obviously has a large numbers of assets, would not be able to raise $6 million USD and instead choose to collapse. -
lmcnabney All thanks to crypto.Reply
That is the means that hackers can demand ransom. Without it ransomware wouldn't be a thing. -
logainofhades lmcnabney said:All thanks to crypto.
That is the means that hackers can demand ransom. Without it ransomware wouldn't be a thing.
Ransomware was a thing long before crypto. First known one was in like 1989. -
MrQew
Ya, it makes no sense as you can hobble along without your data, rebuild. There is absolutely something happening at that company they don't want people to know about. Also the claim that a random employees password was guessed AND he had full access to everything? The biggest issue with ransomware is that they usually install something, it's very rare that they try to hack a password. I hope the authorities investigate as it sounds like some shady stuffvanadiel007 said:I feel something is missing from this story.
I don't see why a Company that employs 700 people and obviously has a large numbers of assets, would not be able to raise $6 million USD and instead choose to collapse. -
TerryLaze
They can also keep the assets and start again without spending the 6mil.vanadiel007 said:I feel something is missing from this story.
I don't see why a Company that employs 700 people and obviously has a large numbers of assets, would not be able to raise $6 million USD and instead choose to collapse.
Unless the name alone is worth 6mil to them. -
DS426 There's definitely some things missing from this story. For one, was the company already on the brink of collapse? Ransomware gangs research companies' finances and tend to base their ransom demand somewhat accordingly -- often around 3% of annual revenue. Even if it's higher, a trucking company won't have huge legal fees and fines due to a sprawling sensitive data breach like say a financial institution or hospital would. And heck, I know it might be difficult to go to the bank to get a loan to pay a ransomware extortion, but it could/would be frame instead as one to simply cover operational or capital costs?Reply
No data backups though... yeah, that's a crime in itself.
I fully appreciate not wanting to reward cybercriminals for an act like this -- I'm a big proponent of not paying unless absolutely necessary (no data backups would be one case). My heart goes out to all those who lost their job literally overnight. Hopefully the company's leadership will both help employees find jobs as well as coordinate with other trucking companies to somewhat transfer contracts and relationships to other logistics companies. In times like this, there's almost always orgs that step up and say "please apply here."
As for Akira, yeah, they're a nasty one. VMware ESXi environments tend to get targeted as in the past, they couldn't run EDR and many other popular security tools due to how VMware had it locked down and also naturally being a bare-metal hypervisor. I think that's started to change recently by enhancing support for third-party integrations, but too little too late IMO! -
DS426
I wouldn't say it's rare that they try to crack a password; they have several different means available besides pure-guessing brute force, such as dictionary attacks, password spraying, and credential stuffing. There's usually an account that's compromised that results in further attempts to move laterally and acquire elevated permissions i.e. admin. Even if malware begins the process of remote access and persistence, higher-privilege accounts need to compromised to provide the most effective result of the attack.MrQew said:...The biggest issue with ransomware is that they usually install something, it's very rare that they try to hack a password. I hope the authorities investigate as it sounds like some shady stuff
Passwords are the single biggest drag on computer security. Most data breaches involve at least one compromised account along the way, including whether MFA is enabled (could be MFA bombing, phishing that intercepts MFA credentials, session token theft, etc.). -
King_V Just to address this point, there were backups, but:Reply
According to Paul Cashmore of Solace, the team quickly determined that all of KNP's data had been encrypted, and all of their servers, backups, and disaster recovery had been destroyed.