Saturday, February 22, 2025
HomeRansomwareRansomware Attack Has Infected IT Systems at Schools Across London

Ransomware Attack Has Infected IT Systems at Schools Across London

Published on

SIEM as a Service

Follow Us on Google News

One of the largest trust in London schools, The Harris Federation, has been attacked recently by ransomware operators. 

This cyberattack has shut down the IT systems, mail servers and telephone lines at primary and secondary academies everywhere in London.

After knowing about the attack, the UK’s National Cyber ​​Security Center (NCSC) has published an alert about increased computer attacks on schools in the British countryside.

However, according to the cybersecurity analysts, this attack was a disruptive cyberattack on a “chain” of schools in London and the South East.

This attack has left around 37,000 pupils incapable of accessing email, not only but the threat actors has highlighted the vulnerability of educational institutions with the targeted ransomware attacks.

This attack just occurred the day after the UK’s National Cyber Security Centre (NCSC) informed of a spate of such occurrences.

The Ransomware Attack

This incident has occurred on March 27, 2021, and the reports claim that this attack is one of the largest ransomware attacks acknowledged to trick against UK educational organizations.

However, the school trust’s IT professionals have disabled IT systems, which also includes impairing devices provided to students. The cybersecurity researchers affirmed that doing this will prevent the spread of ransomware and further encryption of data. 

Moreover, the cybersecurity analysts have also preemptively shut down the trust’s mail server and telephone systems, and now they are currently redirecting incoming calls to mobile devices.

The educational charity, Harris Federation has claimed that in this attack, dozens of schools have been attacked and has affected nearly 40,000 students as we told earlier.

On the other side, the British educational NGO, which has nearly 37,000 students in 50 secondary and primary schools that are located in London and Essex, has also suffered from this ransomware cyberattack, and the school has also pronounced that this attack has affected the systems very badly. 

But, currently, it’s not yet clear that what ransomware was used in this attack, as experts are trying their best to know every detail regarding this ransomware and this attack. 

Not only this, but even they are also trying to find out the methods used by the operators of this ransomware to infiltrate the school’s network.

Harris Federation is the most advanced string of schools, colleges and universities which have been interrupted by ransomware attacks. While the organization representatives are examining the whole ransomware incident all together with an information security firm, delegates of the National Crime Agency (NCA) and the National Cyber ​​Security Center of Great Britain.

So, with the help of all the security representatives, soon researchers will find all the essential details and information.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity, and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...

ACRStealer Malware Abuses Google Docs as C2 to Steal Login Credentials

The ACRStealer malware, an infostealer disguised as illegal software such as cracks and keygens,...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

CL0P Ransomware Launches Large-Scale Attacks on Telecom and Healthcare Sectors

The notorious CL0P ransomware group has intensified its operations in early 2025, targeting critical...

Ransomware Trends 2025 – What’s new

As of February 2025, ransomware remains a formidable cyber threat, evolving in complexity and...

ShadowPad Malware Upgraded to Deliver Ransomware in Targeted Attacks

Security researchers have uncovered a significant evolution in the ShadowPad malware family, which is...