Ransomware attack hits University College London
University College London has suffered a ransomware attack, leading several NHS hospitals to close their servers

A number of UK hospitals have suspended their email servers as a precaution following a substantial ransomware attack on University College London (UCL).
UCL first noticed it had fallen victim to an attack on Wednesday afternoon, and has since been forced to restrict access to both its network and shared drives.
The university believes the malicious software may have infected its systems through a phishing email that was clicked on by a user. The system's virus checkers did not pick up on the malware, which has led UCL to warn that it may be facing a "zero-day" attack exploiting a vulnerability that has not yet been patched or picked up on.
It's unknown how similar the malware is to last month's WannaCry ransomware, which infected around 200,000 computers across 150 countries and led to the partial shutdown of many NHS systems. Regardless, a number of hospital trusts have suspended their email servers as a precaution.
As reported by The Guardian, Barts Health NHS Trust "temporarily shut emails down to make sure nothing spread", while East and North Herts NHS Trust have also shut their mail servers as a preventative measure. There have not yet been any reports of the malware spreading to these institutions, nor to University College London Hospitals.
"If you receive email that is unexpected or in any way suspicious then you must not open any attachment or follow any link in the email," UCL warned staff and students at the university.
As The Guardian notes, the attack started on the same say Microsoft issued a rare security update for older versions of Windows including Windows XP, the operating system targeted by the WannaCry ransomware attack. The patch fixes 16 vulnerabilities in the operating system. "Anyone still using Windows 2003 or XP should install these patches ASAP with the expectation that they will be actively exploited in the near term," Craig Young, security researcher at infosec firm Tripwire, told the paper.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
-
Prolific ransomware operator added to Europe’s Most Wanted list as US dangles $10 million reward
News The US Department of Justice is offering a reward of up to $10 million for information leading to the arrest of Volodymyr Viktorovych Tymoshchuk, an alleged ransomware criminal.
-
Jaguar Land Rover “did the right thing” shutting down systems to thwart cyber attack
News The attack on Jaguar Land Rover highlights the growing attractiveness of the automotive sector
-
Ransomware attack on IT supplier disrupts hundreds of Swedish municipalities
News The attack on IT systems supplier Miljödata has impacted public sector services across the country
-
A notorious hacker group is ramping up cloud-based ransomware attacks
News The Storm-0501 threat group is refining its tactics, according to Microsoft, shifting away from traditional endpoint-based attacks and toward cloud-based ransomware.
-
Security researchers have just identified what could be the first ‘AI-powered’ ransomware strain – and it uses OpenAI’s gpt-oss-20b model
News Using OpenAI's gpt-oss:20b model, ‘PromptLock’ generates malicious Lua scripts via the Ollama API.
-
Data I/O shuts down systems in wake of ransomware attack
News Regulatory filings by Data I/O suggest the costs of dealing with the attack could be significant
-
Average ransom payment doubles in a single quarter
News Targeted social engineering and data exfiltration have become the biggest tactics as three major ransomware groups dominate
-
BlackSuit ransomware gang taken down in latest law enforcement sting – but members have already formed a new group
News The notorious gang has seen its servers taken down and bitcoin seized, but may have morphed into a new group called Chaos