Teens arrested over nursery chain Kido hack
The ransom attack caused widespread shock when the hackers published children's personal data
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
The UK's Metropolitan Police have arrested two teenagers for the recent data breach of the Kido chain of children's nurseries.
The two men, both aged 17, were arrested yesterday in Bishop's Stortford, Hertfordshire, as part of a raid on a number of properties. They were taken into custody, where they are being questioned on suspicion of computer misuse and blackmail.
"Since these attacks took place, specialist Met investigators have been working at pace to identify those responsible," said Will Lyne, the Met's head of economic and cybercrime.
"These arrests are a significant step forward in our investigation, but our work continues, alongside our partners, to ensure those responsible are brought to justice."
The attack on the Kido pre-school chain saw the theft of data on around 8,000 children. It appeared to have been carried out through the breach of Kido's billing, staffing, and reporting software system, supplied by Famly.
It was widely condemned when the previously unknown hackers, who called themselves Radiant, published the profiles of 10 children and threatened to publish more if their ransom demands weren't met.
The data included the children's names, dates of birth, and birthplaces, along with the personal details of parents, grandparents, and guardians, including their addresses and phone numbers.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
The hackers were even reported to have contacted the parents of some affected children directly to extort them.
However, the attackers later removed all the stolen data and pictures from their darknet site and said they'd deleted all the data they'd stolen.
"We understand reports of this nature can cause considerable concern, especially to those parents and carers who may be worried about the impact of such an incident on them and their families," said Lyne.
"We want to reassure the community and anyone affected that this matter continues to be taken extremely seriously."
At the time, Palo Alto researchers noted that Radiant appeared to be a brand new group, and unaffiliated with any nation-state actors or other established cybercrime syndicates.
Targeting small children and publishing such a broad range of personal data was also something of a first. And when asked by BBC News whether they felt bad about extorting a nursery using the children's data, the criminals said they 'weren't asking for an enormous amount' and that they 'deserve some compensation for our pentest'.
While this was the first attack of its kind, Palo Alto Networks warns that there may be more, with many educational establishments using similar billing, staffing, and reporting software without understanding the security implications.
Palo Alto advises schools and nurseries that use such platforms to immediately review the security controls they currently have in use. They should rotate passwords, particularly across key operational and administrative accounts, and adopt multi-factor authentication where available.
Make sure to follow ITPro on Google News to keep tabs on all our latest news, analysis, and reviews.
Emma Woollacott is a freelance journalist writing for publications including the BBC, Private Eye, Forbes, Raconteur and specialist technology titles.
-
Sumo Logic expands European footprint with AWS Sovereign Cloud dealNews The vendor is extending its AI-powered security platform to the AWS European Sovereign Cloud and Swiss Data Center
-
Going all-in on digital sovereigntyITPro Podcast Geopolitical uncertainty is intensifying public and private sector focus on true sovereign workloads
-
A single compromised account gave hackers access to 1.2 million French banking recordsNews Ficoba has warned that “numerous” scams are already in circulation following the data breach
-
Ransomware gangs are using employee monitoring software as a springboard for cyber attacksNews Two attempted attacks aimed to exploit Net Monitor for Employees Professional and SimpleHelp
-
Security experts warn Substack users to brace for phishing attacks after breachNews Substack CEO Christ Best confirmed the incident occurred in October 2025
-
Ransomware gangs are sharing virtual machines to wage cyber attacks on the cheap – but it could be their undoingNews Thousands of attacker servers all had the same autogenerated Windows hostnames, according to Sophos
-
Google issues warning over ShinyHunters-branded vishing campaignsNews Related groups are stealing data through voice phishing and fake credential harvesting websites
-
The FBI has seized the RAMP hacking forum, but will the takedown stick? History tells us otherwiseNews Billing itself as the “only place ransomware allowed", RAMP catered mainly for Russian-speaking cyber criminals
-
Everything we know so far about the Nike data breachNews Hackers behind the WorldLeaks ransomware group claim to have accessed sensitive corporate data
-
There’s a dangerous new ransomware variant on the block – and cyber experts warn it’s flying under the radarNews The new DeadLock ransomware family is taking off in the wild, researchers warn
