Labour sticks to ‘basic’ $20 cyber defence after attacks, emails show

Britain's opposition Labour Party was using a $20-a-month "basic security" service to protect its website when hackers attempted to force it offline last week and temporarily slowed down online campaigning, according to internal emails seen by Reuters.
Such entry-level protection is not recommended for large organisations at high risk of cyber-attacks, but the messages show Labour has since decided against upgrading to an increased security package on grounds of cost.
Labour and Britain's governing Conservative Party were hit by back-to-back cyber-attacks last week, just days into an election campaign security officials have warned could be disrupted by foreign hackers.
Labour uses the services of cybersecurity firm Cloudflare to help protect its website from attacks, party emails show, but only the level the company recommends for "professional websites, blogs, and portfolios requiring basic security."
After the attacks, the party considered upgrading to the increased security measures used by large organisations to help ensure their websites stay online, but decided the $60,000 annual cost was unjustifiable, according to the emails.
While the lower-tier security package protected the Labour site from major damage, it may not be enough if the party is hit by more sophisticated attacks, said a person with knowledge of the matter.
In a separate message, Labour's head of technology warned that the party could be at increased risk of cyber-attacks on the days of two televised election debates and its upcoming manifesto launch.
A Labour party spokesman declined to comment. Cloudflare did not respond to a request for comment.
A Conservative Party spokeswoman did not respond directly to questions about the type of website defences used by the party.
"We have the appropriate security measures in place to protect the party's IT and web infrastructure so were not disrupted in the recent incident," she said.
Election
The country's security agencies have warned that Russia and other countries may attempt to disrupt the election with cyber-attacks or divisive political messages on social media, a charge Moscow denies.
Officials say initial investigations have found nothing to link the attacks on Labour and the Conservatives to a foreign state.
The attackers used a common and relatively simple technique to attempt to force the parties' web services offline by flooding them with traffic.
Cloudflare says its services help defend against so-called distributed denial-of-service (DDoS) attacks by filtering out malicious website requests and absorbing the additional traffic.
Both Labour and the Conservatives have provided data to the police and Britain's National Cyber Security Centre (NCSC), part of the GCHQ signals intelligence agency, to help investigate the attacks, according to people with knowledge of the matter.
The NCSC said analysis was ongoing following last week's attacks but declined to comment on specific defences used by individual political parties.
"We are confident that the Labour party took the necessary steps to deal with the attack. The attack was not successful," an NCSC spokeswoman said, adding that major parties have been briefed on how to guard against future DDoS attacks.
source teiss
Industry: Cyber Security

Latest Jobs
-
- Identity Channel Partner Manager | London
- London
- N/A
-
Identity Channel Partner Manager | London Location: South East UK (commutable to London) We are working with a Cyber Security business who are looking for a Channel Partner Manager to drive and grow relationships across their identity ecosystem. Prior experience working within VARs, distributors, vendors or resellers in the identity space is essential. You must have experience working with technologies such as CyberArk, Sailpoint, Okta etc Responsibilities will include, but not be limited to: Build, maintain and develop strong relationships with channel partners. Work closely with partner sales teams to support growth drive sales opportunities. Identify and onboard new partners while strengthening existing partnerships. Act as the key point of contact for all channel-related activity. If you are an experienced channel professional, with experience in the Identity space and are ready for your next challenge, apply today.
-
- Microsoft Security Operations Analyst | Bracknell | SC Clearable | SC-200
- Reading
- N/A
-
Senior SOC Analyst Level 2 / 3. Microsoft Security stack | SC Clearable Location: Hybrid remote | Berkshire SC-200 Senior SOC Analyst Level 2 / 3 to join a specialist Managed Security Services business. You will be responsible for advanced threat hunting / triage, incident response etc with a strong focus on the Microsoft Security Stack. Key Responsibilities: Lead and resolve complex security incidents / escalations Conduct advanced threat hunting using the Microsoft Security Stack. Build, optimise and maintain workbooks, rules, analytics etc. Correlate data across Microsoft 365 Defender, Azure Defender and Sentinel. Perform root cause analysis and post-incident reporting. Aid in mentoring and upskilling Level 1 and 2 SOC analysts. Required Skills & Experience: The ability to achieve UK Security Clearance (SC) - existing clearance ideal. (Sorry no visa applications) Must have current experience working with a SOC environment Key experience must also include, but not be limited to Development and tuning of custom analytic rules. Workbook creation and dashboarding. Automation using Playbooks and SOAR integration. Kusto Query Language (KQL).