British Schools & Universities Suffer Attacks

Schools across Nottinghamshire and Belfast’s Queen’s University (pictured) have had to shut down their IT networks after their systems were hit by cyber attacks last week. At the same time, Fifteen secondary schools across Nottinghamshire have been forced to shut down their IT networks after the central trust that manages them was hit by a “sophisticated” cyber attack.

Queen's University in Belfast (QUB) has had to suspend access to "a number of university systems" as a precaution following an attempted cyber-attack. The university said, though, there was "currently no evidence" that any data had been stolen, but Queen's University also said that investigations into the attack was ongoing. The UK's National Cyber Security Centre (NCSC) said it was "aware" of an incident affecting Queen's University and schools and was working to understand the impacts.

All of the schools in Nottinghamshire are part of the Nova Education Trust have had no access to their “usual modes of communication” since 3 March, including email, phones and their websites. This means that online learning provisions set up in response to the Covid-19 pandemic cannot currently go ahead for pupils learning from home.A spokesperson for the Nova Education Trust said the attack, which resulted in unauthorised access to its infrastructure, caused the trust to temporarily shut down all IT systems as a security precaution while the central IT team investigates its origins and potential impact.

Each school involved with the trust has also been advised to shut their IT systems down while the investigation is conducted, with many warning students to not access material previously sent from the school via channels such email, Dojo, or Microsoft Teams.

The method of attack and the culprits are as yet unknown, but the incident shares lots of similarities with a spate of ransomware attacks that disrupted schools, colleges and universities in 2020.  This was when Newcastle University was held to ransom after cyber criminals hacked into its IT systems. This followed another cyber hack of Northumbria University, which had to cancel exams.

NCSC:     Computer Weekly:      ITPro:       BBC:   

You Might Also Read:

Utah University Pays Half Million Dollar Ransom Demand:

 

« President Biden’s Cyber Dilemma
On International Women’s Day Only 10% Of Top Executives Were Female »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Telos

Telos

Telos offers cybersecurity solutions and services that empower and protect the world’s most security-conscious enterprises.

CSIS Security Group

CSIS Security Group

CSIS provide actionable threat intelligence, prevention, incident response and 24/7 managed security services.

IoT European Research Cluster (IERC)

IoT European Research Cluster (IERC)

IERC brings together EU-funded projects with the aim of defining a common vision for IoT technology and development research challenges.

V-Key

V-Key

V-Key is a global leader in software based digital security, providing solutions for mobile identity, authentication, authorization, and mobile payments for major banks.

Netmarks Indonesia (NMID)

Netmarks Indonesia (NMID)

Netmarks Indonesia is an IT solutions provider offering services related to ICT infrastructure, digital transformation and cyber security.

Accertify

Accertify

Accertify is a leading provider of fraud prevention, chargeback management, and payment gateway solutions.

International Data Sanitization Consortium (IDSC)

International Data Sanitization Consortium (IDSC)

IDSC is a group composed of individuals and companies dedicated to standardizing terminology and practices across the data sanitization industry.

Cyber NYC

Cyber NYC

Cyber NYC is a suite of strategic investments to grow New York City’s cybersecurity workforce, help companies drive innovation, and build networks and community spaces.

Onfido

Onfido

Onfido is building the new identity standard for the internet. We digitally prove people’s real identities using a photo ID and facial biometrics.

Alea Consulting

Alea Consulting

Alea Consulting is a global risk mitigation and investigative consulting firm, which helps organizations reduce reputation and operational concerns.

TatvaSoft

TatvaSoft

TatvaSoft is a custom software development company delivering business IT solutions and related services to customers across the globe.

Xmirror Security

Xmirror Security

Xmirror Security focuses on integrated detection and defense of the continuous threat to the DevSecops software supply-chain with artificial intelligence technology as the core.

Surfshark

Surfshark

Surfshark is a cybersecurity company focused on developing humanized privacy & security protection solutions to secure people's digital lives.

Splashtop

Splashtop

Splashtop’s cloud-based, secure, and easily managed remote access solution is increasingly replacing legacy approaches such as virtual private networks.

Cyberverse Foundation

Cyberverse Foundation

Cyberverse Foundation is an organization dedicated to building a robust cybersecurity ecosystem in India.

ZeroThreat

ZeroThreat

ZeroThreat, a vulnerability scanning and automated pentesting tool, accelerates vulnerability detection 5x faster with unprecedented accuracy and efficiency in real-time.