Tuesday, December 17, 2024
HomeRansomwareRansomware Attack Has Infected IT Systems at Schools Across London

Ransomware Attack Has Infected IT Systems at Schools Across London

Published on

SIEM as a Service

One of the largest trust in London schools, The Harris Federation, has been attacked recently by ransomware operators. 

This cyberattack has shut down the IT systems, mail servers and telephone lines at primary and secondary academies everywhere in London.

After knowing about the attack, the UK’s National Cyber ​​Security Center (NCSC) has published an alert about increased computer attacks on schools in the British countryside.

- Advertisement - SIEM as a Service

However, according to the cybersecurity analysts, this attack was a disruptive cyberattack on a “chain” of schools in London and the South East.

This attack has left around 37,000 pupils incapable of accessing email, not only but the threat actors has highlighted the vulnerability of educational institutions with the targeted ransomware attacks.

This attack just occurred the day after the UK’s National Cyber Security Centre (NCSC) informed of a spate of such occurrences.

The Ransomware Attack

This incident has occurred on March 27, 2021, and the reports claim that this attack is one of the largest ransomware attacks acknowledged to trick against UK educational organizations.

However, the school trust’s IT professionals have disabled IT systems, which also includes impairing devices provided to students. The cybersecurity researchers affirmed that doing this will prevent the spread of ransomware and further encryption of data. 

Moreover, the cybersecurity analysts have also preemptively shut down the trust’s mail server and telephone systems, and now they are currently redirecting incoming calls to mobile devices.

The educational charity, Harris Federation has claimed that in this attack, dozens of schools have been attacked and has affected nearly 40,000 students as we told earlier.

On the other side, the British educational NGO, which has nearly 37,000 students in 50 secondary and primary schools that are located in London and Essex, has also suffered from this ransomware cyberattack, and the school has also pronounced that this attack has affected the systems very badly. 

But, currently, it’s not yet clear that what ransomware was used in this attack, as experts are trying their best to know every detail regarding this ransomware and this attack. 

Not only this, but even they are also trying to find out the methods used by the operators of this ransomware to infiltrate the school’s network.

Harris Federation is the most advanced string of schools, colleges and universities which have been interrupted by ransomware attacks. While the organization representatives are examining the whole ransomware incident all together with an information security firm, delegates of the National Crime Agency (NCA) and the National Cyber ​​Security Center of Great Britain.

So, with the help of all the security representatives, soon researchers will find all the essential details and information.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity, and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

CISA Warns of Adobe & Windows Kernel Driver Exploited in Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an important warning after adding...

The Rise of AI-Generated Professional Headshots

It’s clear that a person’s reputation is increasingly influenced by their online presence, which...

Hackers Abuse Google Ads To Attacking Graphic Design Professionals

Researchers identified a threat actor leveraging Google Search ads to target graphic design professionals,...

Hackers Using New IoT/OT Malware IOCONTROL To Control IP Cameras, Routers, PLCs, HMIs And Firewalls

Recent cyberattacks targeting critical infrastructure, including fuel management systems and water treatment facilities in...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

US Charged Chinese Hackers for Exploiting Thousands of Firewall

The US Treasury Department's Office of Foreign Assets Control (OFAC) has sanctioned Sichuan Silence...

Mauri Ransomware Leverages Apache ActiveMQ Vulnerability to Deploy CoinMiners

The Apache ActiveMQ server is vulnerable to remote code execution (CVE-2023-46604), where attackers can...

Black Basta Ransomware Leverages Microsoft Teams To Deliver Malicious Payloads

In a resurgence since May 2024, the Black Basta ransomware campaign has exhibited a...