Hackers attempt to extort parents after school refuses to pay ransom fee

Cybercriminals who attacked a high school in Antwerp, Belgium, last month are now attempting to extort the parents of individual students after the school refused to pay a ransom.

The attackers are believed to have gained access to the internal networks of OLV Pulhof, a secondary school in the Berchem district of Antwerp, shortly after the Christmas break. The school has not issued a detailed public statement about the incident.

A spokesperson for the Antwerp public prosecutor’s office confirmed to Recorded Future News that an investigation is underway but declined to provide further details.

According to Flemish public broadcaster VRT News, the perpetrators identified themselves as “Lock-Bit” in an extortion email sent in January. The message claimed the hackers had stolen sensitive information relating to students and staff, including financial records and confidential mental health data.

However, several indicators suggest the email was not sent by the LockBit ransomware group. In addition to the misspelling of the group’s name, LockBit typically does not rely on email as its primary extortion method, instead leaving ransom notes directly on compromised systems and directing victims to dedicated negotiation portals.

The attackers demanded the school pay €15,000 ($17,800) and, when that demand was not met, shifted their focus to parents. In the message, parents were told they could either pressure the school to pay or pay 50 euros per child themselves, with the hackers threatening to publicly leak and sell the children’s data if no payment was made.

In line with general cybersecurity guidance, the school did not engage with the extortion attempt and has advised parents not to pay.

The initial extortion fee of €15,000 is very low by LockBit’s standards. Although the ransomware scheme has tumbled in stature since a British law enforcement-led disruption in 2024, demands associated with the ransomware gang remain much higher.

Targeting individual parents for small payments cuts against the usual business model of the more mature ransomware groups. Chasing hundreds of individuals for small payments creates a huge overhead and delivers far lower returns than a single corporate payout, and signals the attackers are struggling to monetize their access to the victim’s network.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Alexander Martin

Alexander Martin

is the UK Editor for Recorded Future News. He was previously a technology reporter for Sky News and is also a fellow at the European Cyber Conflict Research Initiative.

 

Total
0
Shares
Previous Post

Drone sightings have doubled near UK military bases, warns British government

Next Post

Notepad++ hijacked by suspected state-sponsored hackers

Related Posts

FreePBX Patches Critical SQLi, File-Upload, and AUTHTYPE Bypass Flaws Enabling RCE

Multiple security vulnerabilities have been disclosed in the open-source private branch exchange (PBX) platform FreePBX, including a critical flaw that could result in an authentication bypass under certain configurations. The shortcomings, discovered by Horizon3.ai and reported to the project maintainers on September 15, 2025, are listed below - CVE-2025-61675 (CVSS score: 8.6) - Numerous
Read More

Italy Fines Apple €98.6 Million Over ATT Rules Limiting App Store Competition

Apple has been fined €98.6 million ($116 million) by Italy's antitrust authority after finding that the company's App Tracking Transparency (ATT) privacy framework restricted App Store competition. The Italian Competition Authority (Autorità Garante della Concorrenza e del Mercato, or AGCM) said the company's "absolute dominant position" in app distribution allowed it to "unilaterally impose"
Read More

Cybersecurity Tech Predictions for 2026: Operating in a World of Permanent Instability

In 2025, navigating the digital seas still felt like a matter of direction. Organizations charted routes, watched the horizon, and adjusted course to reach safe harbors of resilience, trust, and compliance. In 2026, the seas are no longer calm between storms. Cybersecurity now unfolds in a state of continuous atmospheric instability: AI-driven threats that adapt in real time, expanding
Read More