Oxford City Council says a cyberattack earlier this month resulted in 21 years of data being compromised.
It said "some historic data on legacy systems" was accessed by unauthorized attackers, namely the personal information of people who worked on council-administered elections between 2001 and 2022.
The majority of those affected are thought to be either current or former council officers, and the authority assured the public that the incident was limited in scope.
According to a statement posted to the council's website on Thursday, "there is no evidence to suggest that any of the accessed information has been shared with third parties.
"Investigations continue to identify as precisely as we can what was accessed and what, if anything, might have been taken out of our systems. There is no evidence of a mass download or extraction of data.
"We understand that people will be concerned and today we have individually contacted people potentially affected to explain what happened, what support is available, and the steps we're taking to ensure something like this doesn't happen again."
The attack took place over the weekend of June 7-8 and the council's automated security systems picked up on the activity and revoked the attackers' access.
External cybersecurity experts were called in to manage the cleanup, during which key council systems and services were shut down last week, including those related to payment processing.
Oxford City Council assured residents that most of its services are back up and running, and are safe to use. However, a banner remains atop its website warning that some issues remain and technical staff are working to resolve them.
Sylvain Cortes, VP of strategy at Hackuity, said the break-in is the result of local authorities undergoing digital transformations.
"Local authorities remain high-value targets for cybercriminals," he said. "It's a sector that's undergoing rapid digitization to move services online and faces growing risks from attackers aiming to access sensitive data on citizens and employees.
"The digital age creates new points of vulnerability for councils and this incident comes hot on the heels of a spate of retail-sector attacks. It reinforces that organizations across all sectors must have the fundamental building blocks of security in place."
- Scottish council admits ransomware crooks stole school data
- 'Once in a lifetime' IT outage at city council hit datacenter, but no files lost
- Medusa ransomware group claims attack on UK's Gateshead Council
- Leicester streetlights take ransomware attack personally, shine on 24/7
The Oxford attack is the latest of many to affect UK councils. In 2025 alone, Gateshead and West Lothian councils have reported material attacks on their systems, with ransomware groups claiming responsibility for both.
Nottingham City Council also suffered a freak service outage earlier this year, which turned off the lights at the authority's office building, although that was caused by a datacenter electrical fault rather than intruders.
And while some organizations struggled to keep the lights on, so to speak, others had the opposite problem.
Among the additional attacks on local authorities that occurred last year was the ransomware hit on Leicester City Council, which caused it to lose control of the city's streetlights, a number of which would not power down during the day, shining 24/7, much to the discontent of residents.
The pro-Russia DDoS specialists at the group known as NoName057(16) also turned their attentions to UK councils toward the back end of 2024, rendering many authorities' websites inaccessible for days in some cases. ®