Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

How One Bad Password Ended a 158-Year-Old Business

Posted on September 24, 2025September 24, 2025 By CWS

Most companies do not make it previous their fifth birthday – research present that roughly 50% of small companies fail throughout the first 5 years. So when KNP Logistics Group (previously Knights of Outdated) celebrated greater than a century and a half of operations, it had mastered the artwork of survival. For 158 years, KNP tailored and endured, constructing a transport enterprise that operated 500 vehicles throughout the UK. However in June 2025, one simply guessed password introduced down the corporate in a matter of days.
The Northamptonshire-based agency fell sufferer to the Akira ransomware group after hackers gained entry by guessing an worker’s weak password. Attackers did not want a classy phishing marketing campaign or a zero-day exploit – all they wanted was a password so easy that cybercriminals may guess it accurately.
When primary safety fails, the whole lot falls

It doesn’t matter what superior safety mechanisms your group has in place, the whole lot falls if primary safety measures fail. Within the KNP assault, Akira focused the corporate’s internet-facing techniques, discovered an worker credential with out multi-factor authentication, and guessed the password. As soon as inside, they deployed their ransomware payload throughout the corporate’s complete digital infrastructure.
However the hackers did not cease at encrypting important enterprise knowledge. Additionally they destroyed KNP’s backups and catastrophe restoration techniques, guaranteeing that the corporate had no path to restoration with out paying their ransom. The criminals demanded an estimated £5 million – cash the transport firm did not have.
KNP had industry-standard IT compliance and cyber-attack insurance coverage, however none of those protections have been sufficient to maintain the group going. Operations got here to a standstill. Each truck was sidelined. All enterprise knowledge remained locked away. The cyber disaster group introduced in by insurers described it as “the worst-case state of affairs” for any group. Inside weeks, KNP entered administration, and 700 staff misplaced their jobs.
The password drawback persists
KNP’s story illustrates a weak point that continues to plague organizations throughout the globe. Analysis from Kaspersky analyzing 193 million compromised passwords discovered that 45% might be cracked by hackers inside a minute. And when attackers can merely guess or rapidly crack credentials, even probably the most established companies turn out to be susceptible. Particular person safety lapses can have organization-wide penalties that reach far past the one who selected “Password123” or left their birthday as their login credential.
to know what number of weak passwords are at present being utilized in your Energetic Listing? Run a free, read-only scan with Specops Password Auditor: Obtain right here.

Past monetary injury
KNP’s collapse demonstrates that ransomware assaults create penalties far past a right away monetary loss. Seven hundred households misplaced their major revenue supply. An organization with almost two centuries of historical past disappeared in a single day. And Northamptonshire’s financial system misplaced a big employer and repair supplier.
For firms that survive ransomware assaults, reputational injury typically compounds the preliminary blow. Organizations face ongoing scrutiny from prospects, companions, and regulators who query their safety practices. Stakeholders search accountability for knowledge breaches and operational failures, resulting in authorized liabilities.
The UK’s rising ransomware disaster
KNP joins an estimated 19,000 UK companies that suffered ransomware assaults final 12 months, in response to authorities surveys. Excessive-profile victims have included main retailers like M&S, Co-op, and Harrods, demonstrating that no group is simply too giant or established to be focused.
It is solely getting simpler. Legal gangs have lowered the barrier to entry by providing ransomware-as-a-service platforms and social engineering ways that do not require superior technical abilities. Attackers now routinely name IT helpdesks to trick their method into company techniques, exploiting human psychology somewhat than software program vulnerabilities.
Trade analysis suggests the standard UK ransom demand reaches roughly £4 million, with about one-third of firms selecting to pay somewhat than danger complete enterprise loss. However fee does not assure knowledge restoration or stop future assaults – it merely funds felony operations that concentrate on different organizations.
Constructing resilient defenses
The KNP incident highlights that safety controls are your group’s most important protection in opposition to ransomware. When a single weak credential can destroy many years (or centuries) of enterprise operations, you’ll be able to’t afford to deal with password safety as an afterthought. To construct resilient defenses, you need to:
Implement robust password insurance policies: Your first protection is powerful password insurance policies, backed by breached password detection. You possibly can considerably scale back the chance of profitable credential assaults by blocking weak and generally compromised passwords whereas implementing the creation of lengthy, complicated passphrases.
For the best stage of safety, take into account implementing an automatic resolution like Specops Password Coverage. It repeatedly scans Energetic Listing credentials in opposition to billions of identified breached passwords, serving to your group implement robust password insurance policies whereas stopping simply guessable credentials just like the one which introduced down KNP.

Allow multi-factor authentication: Even when passwords are compromised, further authentication components can stop unauthorized entry to important techniques. KNP’s lack of MFA on internet-facing techniques allowed attackers to stroll by means of an open door as soon as they guessed the preliminary credentials.
To extend your safety, add a second layer of safety to your techniques utilizing a multi-factor authentication resolution like Specops Safe Entry. Not solely does Safe Entry assist higher defend your group in opposition to password assaults, however it may well additionally assist you fulfill compliance and cybersecurity insurance coverage necessities.
Implement zero-trust structure and least privilege entry controls: Past password and authentication protections, you should restrict what attackers can do in the event that they get inside your community. Zero-trust architectures assume compromise and confirm each entry request, whatever the consumer’s location or earlier authentication standing. Least privilege entry controls work hand-in-hand with this method, limiting lateral motion inside networks and guaranteeing {that a} single breached account can not unlock each organizational useful resource.
Carry out common backup testing and restoration: Your group should guarantee its backup techniques stay remoted from major networks and often check restoration procedures. When ransomware strikes, useful backups typically decide whether or not an organization survives or follows KNP into administration.
If the destruction of a 158-year-old firm by a single guessed password provides you an terrible feeling within the pit of your abdomen, it ought to: cybersecurity failures have real-world penalties. Investing in safety controls right this moment prices far lower than rebuilding a enterprise from scratch – if rebuilding is an choice.
Able to strengthen your password safety? Be taught extra about Specops Password Coverage and Specops Safe Entry to guard your group from credential-based assaults. E book a dwell demo right this moment.

Discovered this text fascinating? This text is a contributed piece from considered one of our valued companions. Observe us on Google Information, Twitter and LinkedIn to learn extra unique content material we submit.

The Hacker News Tags:158YearOld, Bad, Business, Ended, Password

Post navigation

Previous Post: Hackers Can Bypass EDR by Downloading Malicious File as In-Memory PE Loader
Next Post: European Airport Cyberattack Linked to Obscure Ransomware, Suspect Arrested

Related Posts

Man-in-the-Middle Attack Prevention Guide The Hacker News
New GodRAT Trojan Targets Trading Firms Using Steganography and Gh0st RAT Code The Hacker News
Why Your AI Security Tools Are Only as Strong as the Data You Feed Them The Hacker News
Cryptojacking Campaign Exploits DevOps APIs Using Off-the-Shelf Tools from GitHub The Hacker News
GhostRedirector Hacks 65 Windows Servers Using Rungan Backdoor and Gamshen IIS Module The Hacker News
LastPass Warns of Fake Repositories Infecting macOS with Atomic Infostealer The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • UNC5221 Uses BRICKSTORM Backdoor to Infiltrate U.S. Legal and Technology Sectors
  • New North Korean IT Worker With Innocent Job Application Get Access to Organization’s Network
  • Hackers Target Casino Operator Boyd Gaming
  • Two Critical Flaws Uncovered in Wondershare RepairIt Exposing User Data and AI Models
  • GeoServer Flaw Exploited in US Federal Agency Hack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • UNC5221 Uses BRICKSTORM Backdoor to Infiltrate U.S. Legal and Technology Sectors
  • New North Korean IT Worker With Innocent Job Application Get Access to Organization’s Network
  • Hackers Target Casino Operator Boyd Gaming
  • Two Critical Flaws Uncovered in Wondershare RepairIt Exposing User Data and AI Models
  • GeoServer Flaw Exploited in US Federal Agency Hack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News