Incident Analysis

Tuckers Solicitors Data Breach: £98,000 ICO Fine and the Ransomware Attack That Exposed Criminal Case Files

In October 2020, Tuckers Solicitors — a prominent UK criminal defence firm — suffered a ransomware attack that encrypted its systems and resulted in the publication of over 900 court bundles on the dark web. The files contained some of the most sensitive personal data imaginable: witness statements, prosecution materials, case papers relating to individuals in ongoing criminal proceedings. Two years later, the ICO fined the firm £98,000 — not just for suffering the attack, but for failing to have adequate technical and organisational measures in place to prevent it.

ICO fine: £98,000. Over 900 court bundles — containing witness statements and prosecution materials — published on the dark web after a ransomware attack on Tuckers Solicitors in 2020.

What Happened: The Ransomware Attack

In August 2020, Tuckers Solicitors became aware that ransomware had been deployed across its systems. The attackers encrypted the firm's data and, in a now-common double-extortion tactic, exfiltrated files before encryption — publishing them online when no ransom was paid. The published files included court bundles relating to over 60 clients in criminal proceedings, containing witness identities, prosecution evidence, and highly sensitive case papers. The attack was traced to a compromised remote desktop protocol (RDP) connection — an unsecured remote access vector that remains one of the most common initial access points for ransomware attackers.

The ICO Investigation: What the Regulator Found

The ICO's investigation — which concluded with a £98,000 fine in 2022 — found specific failures at Tuckers that allowed the breach to occur and escalate:

  • Failure to implement multi-factor authentication on remote access systems, including the RDP connection used by the attacker
  • Absence of adequate vulnerability management and patching processes
  • Insufficient monitoring of remote access activity that could have detected the intrusion earlier
  • Inadequate data minimisation — archival data that should have been deleted or separately secured was accessible in the attack
  • No effective encryption of archived case files, meaning data exfiltrated by the attacker was immediately readable

The Nature of the Data: Why This Breach Was Particularly Serious

Criminal defence case files represent some of the most sensitive personal data processed by any organisation. The ICO's aggravated assessment of the breach reflected the extraordinary sensitivity of what was exposed:

  • Witness statements — individuals who gave evidence or were due to give evidence in criminal proceedings, now identifiable
  • Prosecution materials — containing details of alleged offences and the individuals charged
  • Legal professional privilege material — documents created under the protection of privilege, now in the public domain
  • Personal data relating to victims — including in matters involving sexual offences and domestic violence
  • Immigration and custody status of defendants in ongoing proceedings

Lessons for UK Law Firms: The Technical Controls That Could Have Prevented This

The Tuckers breach is a blueprint for what not to do — and equally a roadmap for what every law firm should have in place:

  • MFA on all remote access: the single control most likely to have prevented initial access via the compromised RDP connection
  • RDP hardening or elimination: if remote desktop access is needed, it should be behind a VPN with MFA — not exposed to the internet
  • Endpoint Detection and Response (EDR): would have flagged the lateral movement and ransomware deployment before full encryption
  • Data classification and segregation: highly sensitive archived files should be in cold storage with restricted access, not on the same accessible systems
  • Backup integrity: clean, offline backups would have allowed restoration without paying ransom
  • BlackFog data exfiltration prevention: specifically designed to prevent data from leaving devices even after compromise

The Regulatory Consequences: SRA and ICO Implications

The Tuckers case established important precedent for legal sector enforcement. The ICO's fine reflected both the sensitivity of the data and the firm's failure to implement basic controls expected of any data controller. The SRA was also notified and conducted its own review of the firm's systems and controls. For any firm in criminal defence — or any practice area handling sensitive personal data — the Tuckers case is now the benchmark the regulators apply.

Frequently Asked Questions

Why was Tuckers fined if they were the victim of a ransomware attack?

Under GDPR and the Data Protection Act 2018, organisations that process personal data are required to implement appropriate technical and organisational measures to protect it. The ICO's position — confirmed in the Tuckers decision — is that suffering an attack is not in itself a breach. Failing to have adequate controls to prevent or limit the impact of the attack is. Tuckers did not have MFA on remote access, adequate patching, or monitoring in place. These omissions were the breach.

Are all law firms at risk of this type of attack?

Yes. Ransomware attackers do not specifically target criminal defence firms — they target any organisation with accessible systems and sensitive data worth paying for. Conveyancing firms, commercial firms, immigration practices, and family law firms are equally targeted. The attack vector (exposed RDP, phishing, unpatched systems) is the same across all sectors.

What should a law firm do if it discovers ransomware on its systems?

Isolate affected systems immediately to prevent spread. Do not turn off devices — preserve forensic evidence. Call your incident response provider or cyber insurer. Notify the SRA if client confidentiality or client money is at risk. Begin the ICO 72-hour reporting clock from the moment you become aware of the breach. Do not pay ransom without legal and insurer advice. Engage a specialist forensic firm to understand the full scope of compromise before restoring systems.

Protect your firm from the attack that hit Tuckers — speak to us

Kyanite Blue specialises in cybersecurity for iGaming operators. MGA-licensed operators across Malta trust our stack.

Get in touch

Featured Product

Coro

Learn more

Ready to secure your iGaming operation?

MGA-licensed operators across Malta trust Kyanite Blue.