How Did a Web Glitch Expose Five Million UK Firms to Fraud?

Article Highlights
Off On

Understanding the Companies House Security Breach and Its Implications

The digital integrity of corporate data serves as a fundamental cornerstone of the modern economy, yet a recent technical failure at the UK’s Companies House has called that stability into question. As the government agency responsible for the registration and dissolution of millions of businesses, Companies House maintains a digital infrastructure that must be both accessible and secure. However, a significant vulnerability discovered in its WebFiling dashboard recently forced an emergency shutdown of the service. This timeline explores how a simple navigation error bypassed security protocols, potentially exposing five million firms to identity theft and financial hijacking. Understanding this event is critical because it highlights the fragility of centralized government databases and the sophisticated ways in which basic web glitches can be weaponized by fraudsters to undermine corporate trust.

The Chronological Development of the WebFiling Security Crisis

August 2024: Discovery of the Dashboard Navigation Flaw

The crisis began when John Hewitt of Ghost Mail, a business service provider, identified a repeatable and shockingly simple security bypass within the Companies House WebFiling portal. Unlike high-level hacking attempts involving complex code, this vulnerability relied on “forced browsing” or a logic error in the website’s session management. Hewitt realized that the system failed to re-verify authorization credentials when a user navigated backward through their browser history after attempting to access an unauthorized account. This discovery was promptly shared with Dan Neidle, the founder of Tax Policy Associates, who validated the findings through a controlled demonstration.

August 2024: Testing the Exploit and Confirming the Risk

To understand the severity of the glitch, Neidle and Hewitt conducted a test to see if they could manipulate company records. They found that by logging into a legitimate account and attempting to file for a different company using a known registration number, they were prompted for an authentication code they did not possess. However, by simply pressing the “back” button on the web browser several times, the system erroneously granted them full access to the target company’s dashboard. During this demo, Neidle confirmed that they could view sensitive data and initiate changes. Critically, the system sent confirmation emails to the person exploiting the glitch rather than the actual company owners, meaning victims would have no immediate notification that their corporate identity had been compromised.

August 2024: Immediate Suspension of WebFiling Services

Once Companies House was notified of the vulnerability by Tax Policy Associates, the agency took immediate action to mitigate the threat. On a Friday afternoon, the government body suspended access to the WebFiling dashboard entirely, effectively locking out both legitimate users and potential bad actors while an investigation commenced. This move, while necessary for security, caused immediate disruption for thousands of businesses attempting to meet filing deadlines. The agency acknowledged the flaw and began a forensic audit to determine the depth of the technical failure and whether any malicious actors had already utilized the exploit.

August 2024: The Post-Incident Investigation and Data Audit

In the days following the shutdown, the focus shifted to the retrospective investigation phase. Security experts and the agency began analyzing audit logs to determine how long the portal had been vulnerable and if any unauthorized filings had occurred. The primary goal was to see if logged-in accounts had accessed unrelated company dashboards and if those sessions resulted in modified director details or the changing of registered office addresses. This period was marked by significant anxiety for small business owners, as the agency worked to confirm if the glitch had been exploited at scale before its discovery by Hewitt and Neidle.

Turning Points in Corporate Digital Oversight and Systemic Vulnerability

The most significant turning point in this event was the realization that the vulnerability did not require specialized hacking tools, making it accessible to any opportunistic fraudster. This highlights a shift in industry standards where logic flaws in user interface design are becoming as dangerous as traditional malware. The overarching theme revealed here is the security-usability trade-off, where the desire to make web portals user-friendly resulted in a failure to implement robust session validation. Furthermore, the incident exposed a massive gap in notification protocols; the fact that a fraudster could receive the confirmation of a change they made, rather than the victim, represents a fundamental breakdown in the agency’s defensive architecture.

Examining the Broader Context of Corporate Identity Theft and Future Safeguards

The implications of this glitch extended far beyond a temporary website outage, touching on significant GDPR and regional security concerns. In the UK, corporate identity theft often served as a precursor to large-scale financial fraud, where criminals changed company details to open fraudulent bank accounts or take out loans in a firm’s name. Expert opinions suggested that small companies were the most exposed, as they lacked the internal legal departments to monitor their registry status daily. While Companies House implemented stricter ID checks as part of broader government reforms, this incident highlighted a common misconception that government-run portals are inherently more secure than private ones. Moving forward, the adoption of multi-factor authentication and more rigorous session-state monitoring proved essential to prevent similar glitches from compromising the backbone of the British economy. All directors were encouraged to perform manual audits of their non-public filings to ensure no lingering unauthorized changes remained.

Explore more

Can Hire Now, Pay Later Redefine SMB Recruiting?

Small and midsize employers hit a familiar wall: the best candidate says yes, the offer window is narrow, and a chunky placement fee threatens to slow the decision, so a financing option that spreads cost without slowing hiring becomes less a perk and more a competitive necessity. This analysis unpacks how buy now, pay later (BNPL) principles are migrating into

Omnichannel CRM Orchestration – Review

What Omnichannel CRM Orchestration Means for Hospitality Guests do not think in systems, yet their journeys throw off a blizzard of signals across email, SMS, chat, phone, and web, and omnichannel CRM orchestration promises to catch those signals in one place, interpret intent, and respond with the next right action before momentum fades. In hospitality, that means tying every touch

Can Stigma-Free Money Education Boost Workplace Performance?

Setting the Stage: Why Financial Stress at Work Demands Stigma-Free Education Paychecks stretched thin, phones buzzing with overdue alerts, and minds drifting during shifts point to a simple truth: money stress quietly drains focus long before it sparks a crisis. Recent findings sharpen the picture—PwC’s 2026 survey reported 59% of employees feel financially stressed and nearly half say pay lags

AI for Employee Engagement – Review

Introduction Stalled engagement scores, rising quit intents, and whiplash skill shifts ask a widely debated question: can AI really help people care more about work and change faster without losing trust? That question is no longer theoretical for large employers facing tighter budgets and nonstop transformation, and it frames this review of AI for employee engagement—a class of tools that

High Yield Production Robotics – Review

A New Benchmark for Physical AI in Shipbuilding Backlogged yards racing to deliver complex warships faced a stubborn truth: the hardest hours sat inside welding arcs, blasting booths, and inspection gates where variability punished rigid automation and delays multiplied across billion‑dollar programs. That pressure created space for High‑Yield Production Robotics (HYPR), Huntington Ingalls Industries’ integrated line that fuses adaptive welding