Cyberattack forces British high school to close

A cyberattack has forced a British high school to remain closed following the Christmas holidays.

Higham Lane School in Nuneaton, a town in central England, has told its roughly 1,500 students they won’t be able to attend classes until at least Wednesday due to the incident.

In an email to parents and carers, the school said the cyberattack “has taken down the school IT system,” leaving staff without access “to any digital services including telephones / emails / servers and the school’s management system.”

Headteacher Michael Gannon said the school aims to reopen on Wednesday, “however until we fully understand the scope of the work required I am unable to confirm this opening date at present.”

It requested students not attempt to log into any school systems until further notice.

A spokesperson for Central England Academy Trust, which runs Higham Lane School as well as five other schools in the town, confirmed they were “managing a cyber security incident that has affected access to parts of the school’s IT systems.”

They said the school has implemented incident response protocols and brought in independent cybersecurity specialists to investigate, as well as notified the relevant authorities such as the Information Commissioner’s Office (ICO).

The nature of the incident hasn’t been confirmed. It follows more than 80 ransomware attacks against the education and childcare sector reported to the ICO in 2024.

A series of schools were forced to close that year, including the Charles Darwin School in London, Wymondham College, the largest state boarding school in the country, and Tanbridge House School in West Sussex, with cyber extortionists threatening to release stolen data unless a ransom fee was paid.

It is not clear if any data has been exfiltrated in the Higham Lane incident. The spokesperson said an update would be provided to families tomorrow and claimed it “would be inappropriate to speculate further at this time.”

“The school takes the privacy and security of its community seriously and is taking all reasonable steps to manage the incident and restore systems safely and as quickly as possible,” they added. “As this matter remains under investigation, no further comment can be made at this time.”

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Alexander Martin

Alexander Martin

is the UK Editor for Recorded Future News. He was previously a technology reporter for Sky News and is also a fellow at the European Cyber Conflict Research Initiative.

 

Total
0
Shares
Previous Post

⚡ Weekly Recap: IoT Exploits, Wallet Breaches, Rogue Extensions, AI Abuse & More

Next Post

Kimwolf Android Botnet Infects Over 2 Million Devices via Exposed ADB and Proxy Networks

Related Posts

Hackers Actively Exploiting 7-Zip Symbolic Link–Based RCE Vulnerability (CVE-2025-11001)

A recently disclosed security flaw impacting 7-Zip has come under active exploitation in the wild, according to an advisory issued by the U.K. NHS England Digital on Tuesday. The vulnerability in question is CVE-2025-11001 (CVSS score: 7.0), which allows remote attackers to execute arbitrary code. It has been addressed in 7-Zip version 25.00 released in July 2025. "The specific flaw exists
Read More

Mustang Panda Uses Signed Kernel-Mode Rootkit to Load TONESHELL Backdoor

The Chinese hacking group known as Mustang Panda has leveraged a previously undocumented kernel-mode rootkit driver to deliver a new variant of backdoor dubbed TONESHELL in a cyber attack detected in mid-2025 targeting an unspecified entity in Asia. The findings come from Kaspersky, which observed the new backdoor variant in cyber espionage campaigns mounted by the hacking group targeting
Read More

How Attackers Bypass Synced Passkeys

TLDR Even if you take nothing else away from this piece, if your organization is evaluating passkey deployments, it is insecure to deploy synced passkeys. Synced passkeys inherit the risk of the cloud accounts and recovery processes that protect them, which creates material enterprise exposure. Adversary-in-the-middle (AiTM) kits can force authentication fallbacks that circumvent strong
Read More