Ransomware attack hits University College London

University College London has suffered a ransomware attack, leading several NHS hospitals to close their servers

A number of UK hospitals have suspended their email servers as a precaution following a substantial ransomware attack on University College London (UCL).

UCL first noticed it had fallen victim to an attack on Wednesday afternoon, and has since been forced to restrict access to both its network and shared drives.

The university believes the malicious software may have infected its systems through a phishing email that was clicked on by a user. The system's virus checkers did not pick up on the malware, which has led UCL to warn that it may be facing a "zero-day" attack exploiting a vulnerability that has not yet been patched or picked up on.

It's unknown how similar the malware is to last month's WannaCry ransomware, which infected around 200,000 computers across 150 countries and led to the partial shutdown of many NHS systems. Regardless, a number of hospital trusts have suspended their email servers as a precaution.

Advertisement - Article continues below

As reported by The Guardian, Barts Health NHS Trust "temporarily shut emails down to make sure nothing spread", while East and North Herts NHS Trust have also shut their mail servers as a preventative measure. There have not yet been any reports of the malware spreading to these institutions, nor to University College London Hospitals.

"If you receive email that is unexpected or in any way suspicious then you must not open any attachment or follow any link in the email," UCL warned staff and students at the university.

As The Guardian notes, the attack started on the same say Microsoft issued a rare security update for older versions of Windows including Windows XP, the operating system targeted by the WannaCry ransomware attack. The patch fixes 16 vulnerabilities in the operating system. "Anyone still using Windows 2003 or XP should install these patches ASAP with the expectation that they will be actively exploited in the near term," Craig Young, security researcher at infosec firm Tripwire, told the paper.

Featured Resources

The IT Pro guide to Windows 10 migration

Everything you need to know for a successful transition

Download now

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Software-defined storage for dummies

Control storage costs, eliminate storage bottlenecks and solve storage management challenges

Download now

6 best practices for escaping ransomware

A complete guide to tackling ransomware attacks

Download now



How can you protect your business from crypto-ransomware?

4 Nov 2019

Best ransomware removal tools

7 Dec 2018

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

identity and access management (IAM)

44 million Microsoft customers found using compromised passwords

6 Dec 2019
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
wifi & hotspots

Industrial Wi-Fi 6 trial reveals blistering speeds

5 Dec 2019
Policy & legislation

Boris Johnson suggests UK will side with US over Huawei exclusion

5 Dec 2019