Cybercrime Isn’t Just for Netflix Dramas
When most people think of hacking, they picture some hoodie-wearing genius furiously typing in a dark basement, probably shouting “I’m in!” at some point. But in reality, cyber attacks are way closer to home — and much less glamorous. Regular people, small businesses, councils, schools, even hospitals — they’ve all been hit.
This lesson breaks down a few real-world cyber incidents — what happened, how it happened, and what went wrong (or right) after. Because if it can happen to them, it can happen to you. And that’s not scare tactics — that’s fact.
Case Study 1: The WannaCry NHS Ransomware Attack (UK, 2017)
What Happened:
A ransomware virus called WannaCry swept across the world, locking up systems and demanding payment in Bitcoin to unlock them. Over 200,000 computers were infected across 150 countries. In the UK, the NHS was hit hard — 80+ trusts affected, patient records unavailable, and operations cancelled.
The Action:
The virus exploited a known Windows vulnerability (called EternalBlue) which hadn’t been patched on many older systems. The attack spread like wildfire because many NHS systems were still running on unsupported software like Windows XP.
The Consequence:
Chaos. Patients were turned away from A&E, treatments were delayed, and services were paralysed. The NHS didn’t pay the ransom — but the cleanup cost the UK taxpayer around £92 million.
The Follow-Up:
• Microsoft released emergency patches (even for old systems).
• The UK government faced serious questions about underfunding IT.
• A 22-year-old British researcher, Marcus Hutchins, accidentally found a kill switch in the virus’ code and stopped the spread. (He was later arrested in the US on unrelated hacking charges but is now a cybersecurity consultant. Wild story.)
Case Study 2: Gloucester City Council Hack (UK, 2021–2022)
What Happened:
Gloucester City Council fell victim to a sophisticated ransomware attack that took out all its IT systems. We’re talking planning applications, benefits, council tax — the lot.
The Action:
An attacker gained access through an old vulnerability in a third-party service. Once inside, they locked up the council’s files and systems, demanding a ransom (the exact amount wasn’t made public).
The Consequence:
The council was in digital darkness for months. Staff had to use paper forms, residents couldn’t access basic services, and delays stretched into 2023. It took over a year to fully recover.
The Follow-Up:
• The council refused to pay the ransom (good move).
• They brought in the National Cyber Security Centre (NCSC) for help.
• A huge upgrade to their systems was launched — but at a massive cost, both financially and reputationally.
Case Study 3: British Library Cyber Attack (UK, 2023)
What Happened:
In October 2023, the British Library was hit by a ransomware attack that wiped out their entire online services — including their catalogue, digital archives, and even their Wi-Fi and payment systems. It was a cyber gut punch to one of the UK’s most important institutions.
The Action:
A notorious Russian-linked gang called Rhysida claimed responsibility. They stole staff data and posted it on the dark web after the library refused to pay.
The Consequence:
• Services were offline for months.
• Staff data was leaked.
• Recovery is still ongoing, and the full cost may run into millions.
The Follow-Up:
• The British Library was praised for not paying the ransom.
• They rebuilt from the ground up, improving cyber defences.
• The NCSC issued new guidance to help other cultural institutions avoid the same fate.
What Can We Learn From These?
• Outdated software is like leaving your front door wide open. WannaCry proved that.
• Backups matter. Councils and libraries with no backup plan end up paying in time and reputation.
• Paying the ransom doesn’t guarantee anything. Often, data is still leaked or resold.
• Every organisation is a target — not just banks or tech firms. If you store data or rely on IT, you’re fair game.
• Being transparent helps. The British Library kept the public updated, and it helped maintain trust.
Final Thought
You don’t have to be rich, famous, or a big company to get targeted. Sometimes the only thing separating you from a hacker is one outdated app, one click on a dodgy link, or one “meh, I’ll update it later.”
Cyber attacks are real, happening now, and often start small — but the effects can be massive.
Click “Complete” before moving on.