IT Technician Jailed For Revenge Attack After Being Fired

An IT technician has been jailed for revenge cyber attacks on a school and IT firm after his employer sacked him. 

Adam Georgeson's attack on Welland Park Academy in Leicestershire caused some pupils to lose coursework and parents to lose irreplaceable family photos.

Georgeson carried out a "spiteful revenge" attack on a Market Harborough secondary school affecting over 1,000 students and he has now been jailed for 21 months.

The school's network was offline for 10 days and staff worked long overtime hours without payment to rectify the problems, with 14 staff members unable to resume working remotely for nearly four months. It also stopped remote learning for four days, when pupils were reliant on this due to the coronavirus lockdown.

Julie McBrearty, principal of Welland Park Academy, said she believed the sentence was appropriate. "It cost the school £15,000 to repair the damage caused by the cyber attack, although you cannot put a cost on lost learning," she said. "This sentence will make it clear that this criminal activity has significant consequences for both victims and perpetrator."

Leicester Crown Court heard Georgeson, started working at the school in Market Harborough as an apprentice in December 2016, however, he did not tell the school he had two convictions for fraud, and was dismissed in February 2017 after they found out. He later got a job with a local IT and telecoms firm inand was working for that firm when he launched the cyber attack on the school in January 2021, using his home computer. 

Leicestershire Police's cyber crime team, was able to link the attack to Georgeson by his Internet Protocol (IP) address.

Georgeson was able to remotely access the school's servers and wipe data from them, as well as wiping data from the computers of parents and pupils who were accessing the school's system remotely. Georgeson was arrested and told police he started the attack because he was "bored" and "curious". 

Georgeson admitted two counts of unauthorised acts with intent to impair operation of or prevent access to a computer. He pleaded guilty to the offences on the basis he did not know the computers of parents and pupils attached remotely to the school network would also be wiped.

Leicester Mecury:     Flipboard:     Harborough Mail:    BBC:     IBTimes

You Might Also Read: 

Amazon Sacks Employee Over Data Violation:

 

« Apple Updates AirTag To Combat Stalkers
Making Security Seamless - The Common Identity Platform »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Global Secure Solutions (GSS)

Global Secure Solutions (GSS)

Global Secure Solutions is an IT security and risk consulting firm and authorised ISO training partner for the PECB.

Research Institute in Trustworthy Industrial Control Systems (RITICS)

Research Institute in Trustworthy Industrial Control Systems (RITICS)

RITICS is one of three Research Institutes formed as part of the UK National Cyber Security Strategy.

CipherPoint Software

CipherPoint Software

CipherPoint Software provides data-centric auditing and protection solutions for securing unstructured information

HDI Global SE

HDI Global SE

HDI Global SE provides customised insurance solutions for industrial and commercial clients worldwide including Cyber Liability insurance.

Canadian Security Intelligence Service (CSIS)

Canadian Security Intelligence Service (CSIS)

CSIS collects and analyzes threat-related information concerning the security of Canada in areas including terrorism, espionage, WMD, cybersecurity and critical infrastructure protection.

KayHut

KayHut

KayHut is a young, innovative company engaged in cyber research and security solutions.

Nozomi Networks

Nozomi Networks

Nozomi Networks is a leader in Industrial Control System (ICS) cybersecurity, with a comprehensive platform to deliver real-time cybersecurity and operational visibility.

BrainChip

BrainChip

BrainChip is the leading provider of neuromorphic computing solutions, a type of artificial intelligence that is inspired by the biology of the human neuron - spiking neural networks.

DarkLight

DarkLight

DarkLight is a cybersecurity platform that mimics human thinking at scale to build resiliency to Advanced Persistent Threats.

SecSign Technologies

SecSign Technologies

SecSign Technologies delivers user authentication, messaging, file sharing, and file storage with next generation security for company networks, websites, platforms, and devices.

Shevirah

Shevirah

Shevirah specializes in products for automated mobile and IoT device vulnerability assessment, penetration testing, and mobile security awareness training.

apiiro

apiiro

apiiro invented the industry-first Code Risk Platform™ that uses developers and code behavior analysis to accelerate delivery and automatically remediate product risk.

In Fidem

In Fidem

In Fidem specializes in information security management, with a bold approach that views cybersecurity as a springboard to organizational transformation rather than a barrier to innovation.

iSPIRAL IT Solutions

iSPIRAL IT Solutions

iSPIRAL is a leading regulatory technology software provider delivering state-of-art AML, KYC, Risk and Compliance solutions.

Radiance Technologies

Radiance Technologies

Radiance solutions provide technological advantage and operational superiority for our nation in the areas of intelligence, cyber and advanced weapon systems.

ITRM

ITRM

ITRM are one of the UK’s top managed service providers and offer a range of award-winning IT solutions, from ad-hoc consultancy to cyber security.