Hackers attempt to extort parents after school refuses to pay ransom fee

Cybercriminals who attacked a high school in Antwerp, Belgium, last month are now attempting to extort the parents of individual students after the school refused to pay a ransom.

The attackers are believed to have gained access to the internal networks of OLV Pulhof, a secondary school in the Berchem district of Antwerp, shortly after the Christmas break. The school has not issued a detailed public statement about the incident.

A spokesperson for the Antwerp public prosecutor’s office confirmed to Recorded Future News that an investigation is underway but declined to provide further details.

According to Flemish public broadcaster VRT News, the perpetrators identified themselves as “Lock-Bit” in an extortion email sent in January. The message claimed the hackers had stolen sensitive information relating to students and staff, including financial records and confidential mental health data.

However, several indicators suggest the email was not sent by the LockBit ransomware group. In addition to the misspelling of the group’s name, LockBit typically does not rely on email as its primary extortion method, instead leaving ransom notes directly on compromised systems and directing victims to dedicated negotiation portals.

The attackers demanded the school pay €15,000 ($17,800) and, when that demand was not met, shifted their focus to parents. In the message, parents were told they could either pressure the school to pay or pay 50 euros per child themselves, with the hackers threatening to publicly leak and sell the children’s data if no payment was made.

In line with general cybersecurity guidance, the school did not engage with the extortion attempt and has advised parents not to pay.

The initial extortion fee of €15,000 is very low by LockBit’s standards. Although the ransomware scheme has tumbled in stature since a British law enforcement-led disruption in 2024, demands associated with the ransomware gang remain much higher.

Targeting individual parents for small payments cuts against the usual business model of the more mature ransomware groups. Chasing hundreds of individuals for small payments creates a huge overhead and delivers far lower returns than a single corporate payout, and signals the attackers are struggling to monetize their access to the victim’s network.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Alexander Martin

Alexander Martin

is the UK Editor for Recorded Future News. He was previously a technology reporter for Sky News and is also a fellow at the European Cyber Conflict Research Initiative.

 

Total
0
Shares
Previous Post

Drone sightings have doubled near UK military bases, warns British government

Next Post

Notepad++ hijacked by suspected state-sponsored hackers

Related Posts

China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns

Threat actors affiliated with China have been attributed to a fresh set of cyber espionage campaigns targeting government and law enforcement agencies across Southeast Asia throughout 2025. Check Point Research is tracking the previously undocumented activity cluster under the moniker Amaranth-Dragon, which it said shares links to the APT 41 ecosystem. Targeted countries include Cambodia,
Read More

Italy Fines Apple €98.6 Million Over ATT Rules Limiting App Store Competition

Apple has been fined €98.6 million ($116 million) by Italy's antitrust authority after finding that the company's App Tracking Transparency (ATT) privacy framework restricted App Store competition. The Italian Competition Authority (Autorità Garante della Concorrenza e del Mercato, or AGCM) said the company's "absolute dominant position" in app distribution allowed it to "unilaterally impose"
Read More