
the crisis and has since influenced departmental
practices.
The head of Social Service Administration and the
area manager highlighted how the attack fostered a
new level of openness and transparency within the
organization. Due to the attack, most digital com-
munication channels, including internal and external
web pages and email, were disrupted. Extra measures
were taken to ensure everyone had access to the in-
formation they needed, such as holding frequent in-
person meetings and sending information via SMS.
This led to a more transparent communication culture.
Interviewees who had participated in crisis plan-
ning before the attack noted that this preparation
helped them respond more effectively to the new situ-
ation. However, they also emphasized that no formal
crisis planning or exercises specifically for cyber at-
tacks had been previously done. For many employ-
ees, the scale of the attack and the previously unrec-
ognized high reliance on digital systems came as a
surprise, revealing their digital reliance as a vulnera-
bility.
The incident highlighted the need for redundancy
in critical assets, such as paper records and alternative
systems like non-digital locks. In the long term, the
attack prompted changes in working practices and a
stronger focus on security. A key development was
hiring a dedicated information security coordinator to
oversee policies, crisis management plans, and col-
laboration with IT and municipal management on se-
curity issues.
4.3 Municipal Management
Administration
Kalix Municipal Administration plays a central and
guiding role in the municipality’s activities. It is
responsible for leading and coordinating the overall
work of the municipality and ensuring that political
decisions are implemented effectively and by laws
and regulations. The department is responsible for the
municipality’s strategic planning and governance and
controls finances, human resources, and communica-
tions. Here, the municipal director, the highest official
in the municipality, sits and leads the administration.
When news of the incident reached the Munici-
pal Management Administration, they initially con-
sidered it a severe operational disruption. However,
as reports continued to arrive from different parts
of the organization, it became clear that the situa-
tion was more complex than a routine technical is-
sue. The management group swiftly decided to acti-
vate the central crisis management team, which in-
cluded the municipality director, security manager,
and representatives from every administration. The
security manager led the group to conduct a situa-
tional analysis to establish an overview of the disrup-
tion and determine which parts of the organization
were affected, allowing them to allocate resources
where needed. Since the disruption impacted areas
delivering critical societal functions, such as elderly
care and home care, health and safety became the
top priority. Coordinating efforts across administra-
tions was vital, along with maintaining open commu-
nication. Regular meetings with the crisis manage-
ment group and administration leaders ensured infor-
mation flowed steadily, keeping employees informed.
When it became evident that the disruption was a
comprehensive ransomware attack, the management
group was informed that the attack had not only en-
crypted critical parts of the IT infrastructure but also
threatened to steal sensitive data. Despite the attack-
ers’ threats, the management group remained firm
in their decision not to pay the ransom and instead
filed a police report. The IT department had already
taken the entire network offline, affecting significant
parts of the municipality’s operations. To ensure that
residents and employees remained informed and re-
assured, the management team provided continuous
updates through available channels, including press
conferences, announcements on the local TV chan-
nel, and a temporary website continuously updated
with new information. The management group ap-
pointed two key media contacts: the Municipal Di-
rector and the Information Officer. The team also im-
plemented a communication strategy, revising it be-
fore and after each statement as necessary. The group
decided to take ownership of the information early to
prevent rumors and mitigate the spread of false in-
formation. As the IT department worked to restore
operations as quickly as possible, they realized the
need to completely rebuild the existing IT infrastruc-
ture to minimize the risk of future attacks. The man-
agement team decided to proceed with this compre-
hensive rebuild despite the high costs, viewing it as
a reasonable investment given their firsthand experi-
ence of the attack. While managing the immediate
crisis, the management team also began assessing the
financial impact of the attack. The analysis showed
that direct costs amounted to nearly SEK 2.5 million,
with consulting fees accounting for a significant por-
tion. Other costs included investments in security
tools such as Microsoft Defender and overtime ex-
penses for staff involved in incident handling in the
IT department and across the organization. The indi-
rect costs of the incident remain speculative. How-
ever, it is reasonable to assume that long-term ef-
fects include rebuilding trust in the organization and
Managing a Ransomware Attack: The Resilience of a Swedish Municipality – A Case Study
205