Ransomware attack hits University College London
University College London has suffered a ransomware attack, leading several NHS hospitals to close their servers

A number of UK hospitals have suspended their email servers as a precaution following a substantial ransomware attack on University College London (UCL).
UCL first noticed it had fallen victim to an attack on Wednesday afternoon, and has since been forced to restrict access to both its network and shared drives.
The university believes the malicious software may have infected its systems through a phishing email that was clicked on by a user. The system's virus checkers did not pick up on the malware, which has led UCL to warn that it may be facing a "zero-day" attack exploiting a vulnerability that has not yet been patched or picked up on.
It's unknown how similar the malware is to last month's WannaCry ransomware, which infected around 200,000 computers across 150 countries and led to the partial shutdown of many NHS systems. Regardless, a number of hospital trusts have suspended their email servers as a precaution.
As reported by The Guardian, Barts Health NHS Trust "temporarily shut emails down to make sure nothing spread", while East and North Herts NHS Trust have also shut their mail servers as a preventative measure. There have not yet been any reports of the malware spreading to these institutions, nor to University College London Hospitals.
"If you receive email that is unexpected or in any way suspicious then you must not open any attachment or follow any link in the email," UCL warned staff and students at the university.
As The Guardian notes, the attack started on the same say Microsoft issued a rare security update for older versions of Windows including Windows XP, the operating system targeted by the WannaCry ransomware attack. The patch fixes 16 vulnerabilities in the operating system. "Anyone still using Windows 2003 or XP should install these patches ASAP with the expectation that they will be actively exploited in the near term," Craig Young, security researcher at infosec firm Tripwire, told the paper.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
-
TP-Link hails 'critical milestone' in breakthrough Wi-Fi 8 trials
News Don’t go holding your breath for Wi-Fi 8 capabilities, you could be waiting a while
-
‘I don't think anyone's farther in the enterprise’: Marc Benioff is bullish on Salesforce’s agentic AI lead
News Salesforce is leaning on bringing smart agents to customer data to make its platform the easiest option for enterprises
-
The number of ransomware groups rockets as new, smaller players emerge
News The good news is that the number of victims remains steady
-
Teens arrested over nursery chain Kido hack
news The ransom attack caused widespread shock when the hackers published children's personal data
-
NCA confirms arrest after airport cyber disruption
News Disruption is easing across Europe following the ransomware incident
-
Cyber professionals are losing sleep over late night attacks
News Hackers are biding their time and launching attacks when businesses can’t respond
-
Prolific ransomware operator added to Europe’s Most Wanted list as US dangles $10 million reward
News The US Department of Justice is offering a reward of up to $10 million for information leading to the arrest of Volodymyr Viktorovych Tymoshchuk, an alleged ransomware criminal.
-
Jaguar Land Rover “did the right thing” shutting down systems to thwart cyber attack
News The attack on Jaguar Land Rover highlights the growing attractiveness of the automotive sector
-
Ransomware attack on IT supplier disrupts hundreds of Swedish municipalities
News The attack on IT systems supplier Miljödata has impacted public sector services across the country
-
A notorious hacker group is ramping up cloud-based ransomware attacks
News The Storm-0501 threat group is refining its tactics, according to Microsoft, shifting away from traditional endpoint-based attacks and toward cloud-based ransomware.