British Universities Shut Down By Cyber Attacks

Britains Northumbria University, which offers a prestigious Cyber Security (MSc)Masters Programme, has been the target of a damaging cyberattack and  had to close its campus, whilst neighbouring Newcastle University has also been hit by a cyber-attack which is expected to take "a number of weeks" to sort out.

The attacks have been reported to the Information Commissioner's Office and police after the IT problem became clear.

Both universities have said that its teams were working with a number of agencies, including police, to find out what happened. "The nature of the problem means this is an ongoing situation which we anticipate will take a number of weeks to address... A number of our IT services are not operating and will remain that way for the duration." said Deputy vice chancellor at Northumbria University, Peter Francis. The incident, caused  significant disruption” and that work was underway to restore IT systems as quickly as possible and that there would be no student access to campus until  work to restore the  network was cpmpleted. 

Newcastle University sent out letters alerting people to the incident and assured them that information involving bank details, financial information or password data was not affected.

Although not officially named, some of the attacks bears all the hallmarks of ransomware. Financially motivated cyber-criminals have been increasingly focusing on the education sector of late as institutions are thought to be more exposed to attacks and under tremendous commercial pressure to ensure uptime for staff and students.

Data has revealed that a third of UK universities have been attacked with ransomware in the past decade.

Most recently, a ransomware outage and data breach at US IT services company Blackbaud affected numerous education centres in the UK and elsewhere. The attack on Blackbaus is the latest following a sequence of attacks on US Universities, including those in Utah and California.

It’s not known if the Northumbria University attack also featured data theft. A spokesperson for Northumbria University said: “Northumbria University can confirm that we have been the victim of a cyber-incident which is causing operational disruption across our network and IT systems.

Infosecurity Magazine:      BBC:    ChroncicleLive:   The Boar:     

You Might Also Read:

Universities That Teach Cyber Security At Risk:

 

 

« Foreign Influence In The American Election Of 2020 Is Declining
Exaggerating Cyber Threats Undermines Policy Making »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Cambray Solutions

Cambray Solutions

Cambray Solutions specializes in locating and securing technical professionals, managers, and executives.

Dark Reading

Dark Reading

Dark Reading is the most trusted online community for security professionals.

Lakeside Software

Lakeside Software

Lakeside Software is how organizations with large, complex IT environments can finally get visibility across their entire digital estates and see how to do more with less.

HackCon Norway

HackCon Norway

HackCon is for the people who are interested in technology, psychology, IT and security, and who wants to improve their knowledge within these areas.

ThreatBook

ThreatBook

ThreatBook is dedicated to providing real-time, accurate and actionable threat intelligence to block, detect and prevent attacks.

iQuila

iQuila

iQuila is a virtual overlay network which runs on top of an existing network. It creates a secure software enabled layer 2 connection across the internet or any public or private cloud.

Cybertonica

Cybertonica

Cybertonica is a FinTech company which detects and prevents fraudulent transactions and reduces risk for financial services organisations.

Identity Defined Security Alliance (IDSA)

Identity Defined Security Alliance (IDSA)

IDSA is a group of identity and security vendors, solution providers and practitioners that acts as an independent source of education and information on identity-centric security strategies.

Applied Magnetics Laboratory (AML)

Applied Magnetics Laboratory (AML)

Applied Magnetics Laboratory is a manufacturer of military security and data destruction equipment for sensitive, classified, and secret information.

Cyberspace Solarium Commission (CSC)

Cyberspace Solarium Commission (CSC)

The Cyberspace Solarium Commission was established to develop a consensus on a strategic approach to defending the United States in cyberspace against cyber attacks of significant consequences.

Samurai Digital Consulting

Samurai Digital Consulting

Samurai Digital Security are a cyber and Information security services provider, specialising in penetration testing, incident response, user awareness and information governance solutions.

Logically.ai

Logically.ai

Logically combines artificial intelligence with expert analysts to tackle harmful and manipulative content at speed and scale.

Akto

Akto

Akto, the plug & play API security platform. Discover your APIs, run tests and find business logic vulnerabilities at ludicrous speed.

The Security Bulldog

The Security Bulldog

The Security Bulldog distills and assimilates open source cyber intelligence to enable security teams to understand threats more quickly, make better decisions, and accelerate detection and response.

TetherView

TetherView

TetherView provides leading virtual desktop and email security technology to help businesses stand up and manage digital workspaces.

Trofi Security

Trofi Security

Trofi Security provides Information Technology and Information Security services to organizations in both the public and private sectors.