South Staffordshire Water Breach Leaks 633,887 Records, Draws £963,900 ICO Fine
Details of the 2020 South Staffordshire Water phishing breach, the 633,887 records exposed, the ICO fine, and steps defenders can take.

Chris Durham, a man with a grey beard, glasses and a dog are stood outside next to a brown wooden garden fence
TL;DR
South Staffordshire Water’s 2020 breach exposed 633,887 records and drew a £963,900 ICO fine after attackers used a phishing email to linger undetected for 20 months.
In September 2020 a phishing email slipped past South Staffordshire Water’s defenses, giving attackers a foothold that went unnoticed for nearly two years.
Between August and November 2022 the firm uncovered more than 4.1 terabytes of customer and employee data posted on the dark web, including bank details and National Insurance numbers.
Victims reported scam emails, cloned identities, and fraudulent phone contracts; Chris Durham of Halesowen said he felt robbed after two unauthorized iPhone contracts were taken out in his name.
The breach compromised personal data of 633,887 individuals.
The Information Commissioner’s Office ordered South Staffordshire to pay £963,900, a penalty the company accepted without appeal as part of a voluntary settlement.
The attackers used a spear‑phishing attachment (MITRE ATT&CK T1566.001) to deploy malware, then maintained persistence via legitimate credentials (T1078) and exfiltrated data over encrypted channels (T1041).
The fine highlights regulatory expectations for timely detection and response; customers face ongoing fraud risk while the firm must rebuild trust and invest in controls.
Defenders should enforce multi‑factor authentication, deploy advanced email security that blocks malicious attachments, and monitor for anomalous outbound traffic matching T1041 signatures. Patching known vulnerabilities and applying the principle of least privilege limit lateral movement (T1021). Regular dark‑web monitoring and incident‑response drills reduce dwell time.
Watch for updates on the firm’s promised security upgrades and any further ICO guidance on critical‑infrastructure data protection.
Continue reading
More in this thread
Alera Group Settles 2024 Data Breach Suit for $2 Million, Offers Up to $3,500 per Victim
Peter Olaleru
Connecticut Medicaid Portal Breach Exposes 22,500 Patients After Credential Theft
Peter Olaleru
Station Casinos Confirms March 2026 Data Breach Exposing Names and Potential SSN Leak
Peter Olaleru
Conversation
Reader notes
Loading comments...