IT Technician Jailed For Revenge Attack After Being Fired

An IT technician has been jailed for revenge cyber attacks on a school and IT firm after his employer sacked him. 

Adam Georgeson's attack on Welland Park Academy in Leicestershire caused some pupils to lose coursework and parents to lose irreplaceable family photos.

Georgeson carried out a "spiteful revenge" attack on a Market Harborough secondary school affecting over 1,000 students and he has now been jailed for 21 months.

The school's network was offline for 10 days and staff worked long overtime hours without payment to rectify the problems, with 14 staff members unable to resume working remotely for nearly four months. It also stopped remote learning for four days, when pupils were reliant on this due to the coronavirus lockdown.

Julie McBrearty, principal of Welland Park Academy, said she believed the sentence was appropriate. "It cost the school £15,000 to repair the damage caused by the cyber attack, although you cannot put a cost on lost learning," she said. "This sentence will make it clear that this criminal activity has significant consequences for both victims and perpetrator."

Leicester Crown Court heard Georgeson, started working at the school in Market Harborough as an apprentice in December 2016, however, he did not tell the school he had two convictions for fraud, and was dismissed in February 2017 after they found out. He later got a job with a local IT and telecoms firm inand was working for that firm when he launched the cyber attack on the school in January 2021, using his home computer. 

Leicestershire Police's cyber crime team, was able to link the attack to Georgeson by his Internet Protocol (IP) address.

Georgeson was able to remotely access the school's servers and wipe data from them, as well as wiping data from the computers of parents and pupils who were accessing the school's system remotely. Georgeson was arrested and told police he started the attack because he was "bored" and "curious". 

Georgeson admitted two counts of unauthorised acts with intent to impair operation of or prevent access to a computer. He pleaded guilty to the offences on the basis he did not know the computers of parents and pupils attached remotely to the school network would also be wiped.

Leicester Mecury:     Flipboard:     Harborough Mail:    BBC:     IBTimes

You Might Also Read: 

Amazon Sacks Employee Over Data Violation:

 

« Apple Updates AirTag To Combat Stalkers
Making Security Seamless - The Common Identity Platform »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Qualitèsoft Technology

Qualitèsoft Technology

Qualitèsoft Technology is a leading Software Development and Quality Assurance organization. We specialize in Custom Development, Mobile Application, Software Testing and Quality Assurance.

Mako Networks

Mako Networks

The Mako System is an award winning networking and security service designed specifically for SMEs and branch offices of larger organisations.

Telecommunications Industry Association (TIA)

Telecommunications Industry Association (TIA)

TIA works to secure trust in networks by advocating public policy positions on the security of ICT equipment and services related to critical infrastructure, supply chain and information sharing.

Redshift Consulting

Redshift Consulting

Redshift is an information management and information security consulting company offering a full range of services from infrastructure design to security assessments and network monitoring.

Digital Security

Digital Security

Digital Security is an Ecuadorian company specialized in providing comprehensive information security solutions.

X-Ways Software Technology

X-Ways Software Technology

X-Ways provide software for computer forensics, electronic discovery, data recovery, low-level data processing, and IT security.

CorkBIC International Security Accelerator

CorkBIC International Security Accelerator

CorkBIC International Security Accelerator invests in early stage disruptive companies in the security industry including, Cybersecurity, Internet of Things (IOT), Blockchain and AI.

SecureNation

SecureNation

SecureNation offers a wide variety of cutting-edge technologies and IT services to address almost any of your information security, network security and information assurance needs.

eCentre@LindenPointe

eCentre@LindenPointe

The eCenter@LindenPointe provides assistance to the development, management and promotion of STEM (Science, Technology, Engineering, Mathematics) related business ventures.

iSTORM

iSTORM

iStorm specialise in supporting organisations who require a range of Privacy, Security and Penetration testing related services.

Resilience Cyber insurance

Resilience Cyber insurance

Resilience helps to improve cyber resilience by connecting cyber insurance coverage with advanced cybersecurity visibility and a shared plan to reinforce great cyber hygiene.

National Coordinator for Security and Counterterrorism (NCTV) - Netherlands

National Coordinator for Security and Counterterrorism (NCTV) - Netherlands

The NCTV serves the Netherlands’ national security. We protect national interests, identify threats and strengthen resilience.

Willyama Services

Willyama Services

Willyama Services is a certified Information Technology and Cybersecurity professional services business providing services to government and private sector clients.

Oak9

Oak9

Oak9's Security as Code platform dynamically secures Infrastructure as Code (IaC) and deployed cloud workloads, automatically.

The Aerospace Corporation

The Aerospace Corporation

The Aerospace Corporation is playing a key role in advancing space cybersecurity through innovative prototypes that can quickly detect and mitigate cyber threats.

Canary Technology Solutions (Canary IT)

Canary Technology Solutions (Canary IT)

A Cloud, Cyber Security, Retail Solutions and Managed IT Services provider for over 25 years, we safeguard and revolutionise business through technology and foresight.