IT Technician Jailed For Revenge Attack After Being Fired

An IT technician has been jailed for revenge cyber attacks on a school and IT firm after his employer sacked him. 

Adam Georgeson's attack on Welland Park Academy in Leicestershire caused some pupils to lose coursework and parents to lose irreplaceable family photos.

Georgeson carried out a "spiteful revenge" attack on a Market Harborough secondary school affecting over 1,000 students and he has now been jailed for 21 months.

The school's network was offline for 10 days and staff worked long overtime hours without payment to rectify the problems, with 14 staff members unable to resume working remotely for nearly four months. It also stopped remote learning for four days, when pupils were reliant on this due to the coronavirus lockdown.

Julie McBrearty, principal of Welland Park Academy, said she believed the sentence was appropriate. "It cost the school £15,000 to repair the damage caused by the cyber attack, although you cannot put a cost on lost learning," she said. "This sentence will make it clear that this criminal activity has significant consequences for both victims and perpetrator."

Leicester Crown Court heard Georgeson, started working at the school in Market Harborough as an apprentice in December 2016, however, he did not tell the school he had two convictions for fraud, and was dismissed in February 2017 after they found out. He later got a job with a local IT and telecoms firm inand was working for that firm when he launched the cyber attack on the school in January 2021, using his home computer. 

Leicestershire Police's cyber crime team, was able to link the attack to Georgeson by his Internet Protocol (IP) address.

Georgeson was able to remotely access the school's servers and wipe data from them, as well as wiping data from the computers of parents and pupils who were accessing the school's system remotely. Georgeson was arrested and told police he started the attack because he was "bored" and "curious". 

Georgeson admitted two counts of unauthorised acts with intent to impair operation of or prevent access to a computer. He pleaded guilty to the offences on the basis he did not know the computers of parents and pupils attached remotely to the school network would also be wiped.

Leicester Mecury:     Flipboard:     Harborough Mail:    BBC:     IBTimes

You Might Also Read: 

Amazon Sacks Employee Over Data Violation:

 

« Apple Updates AirTag To Combat Stalkers
Making Security Seamless - The Common Identity Platform »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Rohde & Schwarz Cybersecurity

Rohde & Schwarz Cybersecurity

Rohde & Schwarz Cybersecurity provide solutions for Secure Networks, Secure Communications, Network Analysis, and Endpoint Security.

OASIS Open

OASIS Open

OASIS Open is where individuals, organizations, and governments come together to solve some of the world’s biggest technical challenges through the development of open code and open standards.

KeyXentic

KeyXentic

KeyXentic Inc. is a professional mobile and data security service provider. We are devoted to design convenient and strong security for user’s data protection and privacy without any compromise.

Elpha Secure

Elpha Secure

Elpha Secure provides a comprehensive cybersecurity solution, combining technology and insurance to protect against cyber threats.

Elemental Cyber Security

Elemental Cyber Security

Elemental is a game changing cyber security compliance automation and enforcement technology provider.

Active Countermeasures

Active Countermeasures

Active Countermeasures believe in giving back to the security community. We do this through free training, thought leadership, and both open source and affordable commercial tools.

Hyperproof

Hyperproof

Hyperproof is a cloud-based compliance operations software. Launch new programs immediately, collect evidence automatically, and manage a compliance program intelligently.

Scholarly Networks Security Initiative (SNSI)

Scholarly Networks Security Initiative (SNSI)

SNSI brings together publishers and institutions to solve cyber-challenges threatening the integrity of the scientific record, scholarly systems and the safety of personal data.

RMRF Tech

RMRF Tech

RMRF is a team of cybersecurity engineers and penetration testers which specializes in the development of solutions for early cyber threat detection and prevention.

Aite-Novarica Group

Aite-Novarica Group

Aite-Novarica's Cybersecurity practice provides ongoing research and advisory services to chief information security officers focused on protecting their companies’ assets.

Zenity

Zenity

Zenity is the first and only security governance platform for low-code/no-code applications.

Logically.ai

Logically.ai

Logically combines artificial intelligence with expert analysts to tackle harmful and manipulative content at speed and scale.

QA Consultants

QA Consultants

QA Consultants is North America’s largest software quality engineering services firm, an award-winning onshore provider of software testing and quality assurance solutions.

Prophaze Technologies

Prophaze Technologies

Prophaze enable organizations and SaaS providers to improve their web application cybersecurity and reduce costs through AI automation.

Astran

Astran

At Astran, we revolutionize data security by introducing a groundbreaking solution for data confidentiality headaches.

Scribe Security

Scribe Security

Scribe security provides end-to-end software supply chain security solutions.