Wednesday, January 1, 2025
HomeCyber Security NewsComputer Malfunction Leads to Death of Over 27,000 Chickens

Computer Malfunction Leads to Death of Over 27,000 Chickens

Published on

SIEM as a Service

At Hose Lodge Farm in Colston Bassett, Nottinghamshire, England, due to the “Computer Malfunction” in the broiler shed ventilation system caused the death of over 27,000 chickens, and the firm is accountable for the incident has been fined over £44,000.

Leicestershire County Council says “The chickens were in a shed on a warm day when a ventilation system failed”.

“About 50,000 chickens were being kept in the shed when “the systems that regulated airflow, vital for the welfare of the chickens, failed”, the authorities added.

- Advertisement - SIEM as a Service

Hudson & Sanders Limited was fined at Leicester Magistrates’ Court. The firm admitted four charges under the Animal Welfare Act.

The Cause of the Death

Over 50,000 chickens were in a large shed, the systems that regulated the airflow which is very essential for the welfare of the chickens, failed.

The report says the inlets on the building’s side were closed. But, a fault in the system responsible for regulating airflow to the shed prevented the substitute tunnel ventilation system from doing its job. Since the shed got completely sealed, causing the inside temperature to rise rapidly. Therefore, this caused heat stress, suffering, and death.

An alarm sounded when the temperature in the shed rose to 37C (99F) and the staff was alerted, but council investigators said that should have been set to go off at 27C (81F).

The company had “failed to ensure there was enough staff to look after the chickens and they were not trained to the level they needed to be”, the council added.

Previously in November 2019, the Animal and Plant Health Agency vet had visited the farm and raised concerns about “there not being sufficient staff or a ventilation plan”.

The Company Pleaded Guilty

The district Judge Nick Watson fined the firm £44,000 and ordered it to pay the county council’s costs of £12,634.83 and a victim surcharge of £190.

According to the county council’s head of regulatory services, Gary Connors, “This was an awful but thankfully rare incident in terms of the scale of unnecessary suffering”.

“However, we hope the level of fine prompts businesses operating in this sector to review their operations to ensure they have adequate staffing and procedures in place to avoid such a distressing incident happening again.”

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

DrayTek Devices Vulnerability Let Attackers Arbitrary Commands Remotely

The DrayTek Gateway devices, more specifically the Vigor2960 and Vigor300B models, are susceptible to...

New Stealthy Malware Leveraging SSH Over TOR Attacking Ukrainian Military

Researchers recently discovered a malicious campaign targeting Ukrainian military personnel through fake "Army+" application...

CISA Warns of Palo Alto Networks PAN-OS Vulnerability Exploited in Wild

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a high-priority alert on...

US Treasury Department Breach, Hackers Accessed Workstations

The Biden administration confirmed that a Chinese state-sponsored hacking group breached the U.S. Treasury...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

DrayTek Devices Vulnerability Let Attackers Arbitrary Commands Remotely

The DrayTek Gateway devices, more specifically the Vigor2960 and Vigor300B models, are susceptible to...

New Stealthy Malware Leveraging SSH Over TOR Attacking Ukrainian Military

Researchers recently discovered a malicious campaign targeting Ukrainian military personnel through fake "Army+" application...

CISA Warns of Palo Alto Networks PAN-OS Vulnerability Exploited in Wild

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a high-priority alert on...