Manchester University Hacked

Manchester University has become the latest victim of a wave of cyber attacks directed against British businesses and education institutions. 

The university has said data has probably been copied and they warns staff and students that they have suffered an attack where unknown threat actors have likely stolen data from the university's network.

The University of Manchester is a public research institute and one of the UK's largest and most successful education and research centres, with over 10,000 staff and 45,000 students. It is not yet clear what information has been accessed by the attackers, but staff and students have been advised to watch out for any suspicious emails.

“During the week commencing 6 June, we found out that the University is the victim of a cyber incident. It has been confirmed that some of our systems have been accessed by an unauthorised party and data have likely been copied,” says the University on its website.

In a statement, the university revealed that some of its systems had been accessed by an unauthorised party and data copied. 

Students were told that the university’s IT teams and external cyber support were working to establish what data has been compromised. “Our in-house experts and established expert external support are working around the clock to resolve this incident... We are working to understand what data have been accessed and will update you as more information becomes available,” according to Patrick Hackett the Registrar and Chief Operating Officer.

The National Cyber Security Centre (NCSC) and National Crime Agency are among the authorities working with the university's own experts to resolve the incident.

The university and the NCSC have warned all those potentially impacted should be "vigilant" of phishing emails - a common tactic used by internet fraudsters to scam people. statement said: "We are working to understand what data have been accessed and will update you as more information becomes available." The university has apologised to its community for the breach, which is being investigated. "Our priority is to resolve this issue and provide information to those affected as soon as we are able to, and we are focusing all available resources," it added. 

There is no suggestion about who is responsible for the attack and whether any sensitive research or personal data has been stolen at this stage. 

Manchester Univ:   Manchester Univ;   Sky:     Bleeping Computer:   BBC:   Computer Weekly:     

Proactive Investors:    Computing:  

You Might Also Read: 

Higher Education: Lessons In Cybersecurity:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible




 

« How To Leverage AI For Real-Time User Verification
Two Thirds Of Organizations Suffer Breaches Due To WFH »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Verisec International

Verisec International

Verisec International AB is a Swedish Tech company focused since inception in enabling Trust in Digital Transactions, through the development of proprietary cutting-edge technologies and services.

ISTQB

ISTQB

ISTQB has defined the "ISTQB Certified Tester" scheme that has become the world-wide leader in the certification of competences in software testing.

4N6

4N6

4N6 is a privately-owned firm founded with the goal of providing expert knowledge of computer forensics.

Payatu

Payatu

Payatu Technologies is a security testing and services company specialized in Software, Application and Infrastructure security assessments and deep technical security training.

Repulsa

Repulsa

Repulsa provides state-of-the-art, patented, fast filtering with over 700 million malicious IP addresses and over 30 million categorized site listings updated daily.

Sonda

Sonda

SONDA is the leading systems integrator and IT service provider in Latin America.

Swiss Cyber Think Tank (SCTT)

Swiss Cyber Think Tank (SCTT)

The Swiss Cyber Think Tank is a business network for Cyber Risk & Insurability, providing an industry-wide networking platform for insurers, technology and security firms.

InFyra

InFyra

InFyra is an IoT & Telecoms specialist consultancy, with extensive global and local experience in business and technology strategy, networks and solutions development.

TechDemocracy

TechDemocracy

TechDemocracy are a trusted, global cyber risk assurance solutions provider whose DNA is rooted in cyber advisory, managed and implementation services.

Rostelecom

Rostelecom

Rostelecom is Russia’s largest integrated provider of digital services and solutions, covering all market segments including consumer, governmental and private organizations.

Nassec

Nassec

Nassec is a Cyber Security firm dedicated to providing the best vulnerability management solutions. We offer tailor-made cyber security solutions based upon your requirements and nature of business.

Client Solution Architects (CSA)

Client Solution Architects (CSA)

Client Solution Architects (CSA) is a leading digital transformation consulting firm focused on the U.S. Defense Department and all U.S. Federal enterprise information technology service areas.

TPx Communications

TPx Communications

TPx is a leading managed services provider offering a full suite of managed IT, unified communications, network connectivity and security services.

Netox

Netox

Netox is a comprehensive IT service provider that combines IT support services, IT solutions and specialist services; specializing in cybersecurity solutions.

Bestman Solutions

Bestman Solutions

As a specialist cyber security practice, we believe that people are an organisation’s most valuable asset. Success depends on hiring the right people, and this is where we come in.

iOT365

iOT365

iOT365 is the first-of-its-kind SAAS platform dedicated exclusively to Operational Technology (OT) security.