Ransomware attack hits University College London
University College London has suffered a ransomware attack, leading several NHS hospitals to close their servers
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
A number of UK hospitals have suspended their email servers as a precaution following a substantial ransomware attack on University College London (UCL).
UCL first noticed it had fallen victim to an attack on Wednesday afternoon, and has since been forced to restrict access to both its network and shared drives.
The university believes the malicious software may have infected its systems through a phishing email that was clicked on by a user. The system's virus checkers did not pick up on the malware, which has led UCL to warn that it may be facing a "zero-day" attack exploiting a vulnerability that has not yet been patched or picked up on.
It's unknown how similar the malware is to last month's WannaCry ransomware, which infected around 200,000 computers across 150 countries and led to the partial shutdown of many NHS systems. Regardless, a number of hospital trusts have suspended their email servers as a precaution.
As reported by The Guardian, Barts Health NHS Trust "temporarily shut emails down to make sure nothing spread", while East and North Herts NHS Trust have also shut their mail servers as a preventative measure. There have not yet been any reports of the malware spreading to these institutions, nor to University College London Hospitals.
"If you receive email that is unexpected or in any way suspicious then you must not open any attachment or follow any link in the email," UCL warned staff and students at the university.
As The Guardian notes, the attack started on the same say Microsoft issued a rare security update for older versions of Windows including Windows XP, the operating system targeted by the WannaCry ransomware attack. The patch fixes 16 vulnerabilities in the operating system. "Anyone still using Windows 2003 or XP should install these patches ASAP with the expectation that they will be actively exploited in the near term," Craig Young, security researcher at infosec firm Tripwire, told the paper.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
-
Will a generative engine optimization manager be your next big hire?In-depth Generative AI is transforming online search and companies are recruiting to improve how they appear in chatbot answers
-
European Commission clears Google’s Wiz acquisition, citing 'credible competition' from Amazon and MicrosoftNews Regulators said there are “several credible competitors” to Google regardless of the acquisition
-
Ransomware gangs are sharing virtual machines to wage cyber attacks on the cheap – but it could be their undoingNews Thousands of attacker servers all had the same autogenerated Windows hostnames, according to Sophos
-
Google issues warning over ShinyHunters-branded vishing campaignsNews Related groups are stealing data through voice phishing and fake credential harvesting websites
-
The FBI has seized the RAMP hacking forum, but will the takedown stick? History tells us otherwiseNews Billing itself as the “only place ransomware allowed", RAMP catered mainly for Russian-speaking cyber criminals
-
Everything we know so far about the Nike data breachNews Hackers behind the WorldLeaks ransomware group claim to have accessed sensitive corporate data
-
There’s a dangerous new ransomware variant on the block – and cyber experts warn it’s flying under the radarNews The new DeadLock ransomware family is taking off in the wild, researchers warn
-
Hacker offering US engineering firm data online after alleged breachNews Data relating to Tampa Electric Company, Duke Energy Florida, and American Electric Power was allegedly stolen
-
Cybersecurity experts face 20 years in prison following ransomware campaignTwo men used their tech expertise to carry out ALPHV BlackCat ransomware attacks
-
15-year-old revealed as key player in Scattered LAPSUS$ HuntersNews 'Rey' says he's trying to leave Scattered LAPSUS$ Hunters and is prepared to cooperate with law enforcement