Security

Cyber-crime

Ransomware attack forces Brit high school to shut doors

Students have work to complete at home in the meantime


A UK high school will have to close for at least two days, today and tomorrow, after becoming the latest public-sector victim of ransomware criminals.

Blacon High School in the historic city of Chester, in north west England, said yesterday the attack hit on January 17, and didn't rule out having to shut its doors to students for additional days this week.

Students have not been given the day off, however. Teachers set work for them to complete on Google Classroom over the two days, although they can still visit the school to collect lunch.

No ransomware crew has claimed responsibility for the attack at the time of writing, and the school is unwilling to comment on whether any data was compromised as a result of the incident.

"We have an independent cybersecurity company working in school to understand exactly what has happened," headteacher Rachel Hudson said in a statement. "Until this is completed, I will not be able to provide any further details on any potential data breach."

Many of the school's IT systems are down, although Hudson said senior staff are working to create systems that will enable operations to continue.

Phone lines are also down, but a temporary number has been established if needed, and additional communication about the incident will be posted to the school's website and social media pages. Parents will also be contacted directly through the Parent Pay platform.

"I will update you as soon as we know more and will aim to open once again to students as soon as we can," Hudson said. "In the meantime, I ask for your support in helping students to complete work at home, especially for Year 11. Thank you for your patience and understanding at this time."

The attack on Blacon High School is the second major ransomware attack on the UK's public sector in a week after the Medusa gang hit Gateshead Council two days earlier on January 15.

Unlike with the school, the criminals behind the council attack wasted no time in plastering their data leak site with stolen data. Medusa posted 31 pages and screenshots of stolen files, revealing personally identifiable information (PII) belonging to council residents and staff.

It also set a $600,000 ransom demand for the "deletion" of the council's data. Although cybercriminals typically make promises such as these, the prevailing belief among experts is that they are rarely honored.

Hudson said: "Unfortunately, cyberattacks like this are happening more frequently despite having the latest security measures in place. This has sadly been experienced by the NHS, National Rail, other public sector departments, and schools."

The NHS was battered by ransomware last year. The attack on pathology services provider Synnovis over summer caused the most disruption, affecting thousands of appointments and procedures at major London hospitals.

Then, in late November, INC Ransom pounced on Liverpool's Alder Hey – northern England's premier children's hospital – days after an unconnected strike on neighboring NHS hospitals in Wirral.

The news in Blacon also came in the same week as the UK government officially considering a total ban on ransom payments made by public sector and critical national infrastructure (CNI) organizations.

It's one of three proposals being explored over the next 11 weeks. Another approach being examined is to take the public sector ban a step further and require the biggest private sector organizations to apply for a payment license from the government.

The details are still being fleshed out but given the UK's close political ties to Australia, which recently adopted a similar rule in its Cyber Security Act, the UK may take after its Oceanic cousin and apply the rule to companies that meet a revenue threshold.

Public sector IT overhaul

While Blacon High School hasn't detailed the root cause of the ransomware attack, UK public sector organizations don't genrally have the same financial muscle as commercial businesses to spend on cyber defenses.

The government plans to release a report on January 21 outlining the impact of archaic technology on the public sector. The report will examine matters such as productivity and public satisfaction with services, but also how outdated tech is contributing to the growing threat of cyberattacks.

The technology used by central government alone was found to be outdated in around 25 percent of cases, on average, while the worst cases saw this rise to 70 percent. The report will also say that a growing number of these antiquated systems are "red-rated" for security risk. For the UK's perpetually underfunded state schools, the position of security is likely to be worse.

Jake Moore, global cybersecurity advisor at ESET, said "Schools and other local government agencies often lack funding and consequently may not have the best protection for their systems which makes them soft targets.

"Schools frequently suffer from a lack in funding which can result in weaker network protection and the use of older systems, inadvertently making them susceptible to multiple cyberattacks.

He added: "There are now endless examples of educational systems and councils being struck in similar attacks and often there can be weeks of disruption which causes a knock-on effect to the wider community."

Following the publication of the government's report on archaic tech tomorrow, sweeping reforms are expected to be announced, with the implementation of these led by the Government Digital Service (GDS), which is set to be given more powers. ®

Send us news
103 Comments

London celebrity talent agency reports itself to ICO following Rhysida attack claims

Showbiz members' passport scans already plastered online

Ransomware criminals love CISA's KEV list – and that's a bug, not a feature

1 in 3 entries are used to extort civilians, says new paper

Ransomware isn't always about the money: Government spies have objectives, too

Analysts tell El Reg why Russia's operators aren't that careful, and why North Korea wants money AND data

Experts race to extract intel from Black Basta internal chat leaks

Researchers say there's dissent in the ranks. Plus: An AI tool lets you have a go yourself at analysing the data

Ghost ransomware crew continues to haunt IT depts with scarily bad infosec

FBI and CISA issue reminder - deep sigh - about the importance of patching and backups

Chinese spies suspected of 'moonlighting' as tawdry ransomware crooks

Some employees steal sticky notes, others 'borrow' malicious code

Medusa ransomware gang demands $2M from UK private health services provider

2.3 TB held to ransom as biz formerly known as Virgin Care tells us it's probing IT 'security incident'

Southern Water takes the fifth over alleged $750K Black Basta ransom offer

Leaked chats and spilled secrets as AI helps decode circa 200K private talks

Triplestrength hits victims with triple trouble: Ransomware, cloud hijacks, crypto-mining

These crooks have no chill

US Cyber Command reportedly pauses cyberattacks on Russia

PLUS: Phishing suspects used fishing gear as alibi; Apple's 'Find My' can track PCs and Androids; and more

US newspaper publisher uses linguistic gymnastics to avoid saying its outage was due to ransomware

Called it an 'incident' in SEC filing, but encrypted apps and data exfiltration suggest Lee just can’t say the R word

Payday from hell as several British banks report major outages

Many can't access online banking although customers can keep tapping away in shops