Hackers attempt to extort parents after school refuses to pay ransom fee

Cybercriminals who attacked a high school in Antwerp, Belgium, last month are now attempting to extort the parents of individual students after the school refused to pay a ransom.

The attackers are believed to have gained access to the internal networks of OLV Pulhof, a secondary school in the Berchem district of Antwerp, shortly after the Christmas break. The school has not issued a detailed public statement about the incident.

A spokesperson for the Antwerp public prosecutor’s office confirmed to Recorded Future News that an investigation is underway but declined to provide further details.

According to Flemish public broadcaster VRT News, the perpetrators identified themselves as “Lock-Bit” in an extortion email sent in January. The message claimed the hackers had stolen sensitive information relating to students and staff, including financial records and confidential mental health data.

However, several indicators suggest the email was not sent by the LockBit ransomware group. In addition to the misspelling of the group’s name, LockBit typically does not rely on email as its primary extortion method, instead leaving ransom notes directly on compromised systems and directing victims to dedicated negotiation portals.

The attackers demanded the school pay €15,000 ($17,800) and, when that demand was not met, shifted their focus to parents. In the message, parents were told they could either pressure the school to pay or pay 50 euros per child themselves, with the hackers threatening to publicly leak and sell the children’s data if no payment was made.

In line with general cybersecurity guidance, the school did not engage with the extortion attempt and has advised parents not to pay.

The initial extortion fee of €15,000 is very low by LockBit’s standards. Although the ransomware scheme has tumbled in stature since a British law enforcement-led disruption in 2024, demands associated with the ransomware gang remain much higher.

Targeting individual parents for small payments cuts against the usual business model of the more mature ransomware groups. Chasing hundreds of individuals for small payments creates a huge overhead and delivers far lower returns than a single corporate payout, and signals the attackers are struggling to monetize their access to the victim’s network.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Alexander Martin

Alexander Martin

is the UK Editor for Recorded Future News. He was previously a technology reporter for Sky News and is also a fellow at the European Cyber Conflict Research Initiative.

 

Total
0
Shares
Previous Post

Drone sightings have doubled near UK military bases, warns British government

Next Post

Notepad++ hijacked by suspected state-sponsored hackers

Related Posts

LOTUSLITE Backdoor Targets U.S. Policy Entities Using Venezuela-Themed Spear Phishing

Security experts have disclosed details of a new campaign that has targeted U.S. government and policy entities using politically themed lures to deliver a backdoor known as LOTUSLITE. The targeted malware campaign leverages decoys related to the recent geopolitical developments between the U.S. and Venezuela to distribute a ZIP archive ("US now deciding what's next for Venezuela.zip")
Read More

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS SSL VPN in the wild under certain configurations. The vulnerability in question is CVE-2020-12812 (CVSS score: 5.2), an improper authentication vulnerability in SSL VPN in FortiOS that could allow a user to log in successfully without being prompted for the second factor of authentication if the
Read More