Lancaster Uni data breach hits at least 12,500 wannabe students
Lancaster University - which offers a GCHQ-accredited degree in security - has been struck by a "sophisticated and malicious phishing attack" that resulted in the leak of around 12,500 wannabe students' personal data.
In a statement published yesterday evening, the university admitted that undergraduate applicant records for the years 2019 and 2020 had been accessed, along with the data of some current students.
Information accessed by whoever the hackers were - so far Lancaster has said nothing about this - includes names, addresses, phone numbers and email addresses.
The uni also mentioned fraudulent invoices "had been sent to some undergraduate applicants".
Lancaster accepted 3,585 applicants for student places in the educational year 2018, the latest for which data is available. Over the past five years, the number of people accepted onto courses increased by around 100 to 200 people per year, meaning the latest data breach is likely to have affected around 3,700 successful applicants.
Of the 3,585 students accepted by Lancaster last year, 375 were from other EU countries and 575 were from non-EU nations.
Further statistics compiled by UCAS show that 12,545 people applied to Lancaster in 2018 alone, with the number having been roughly stable for the preceding three years. On that basis, the recent data breach may have affected about 12,500 applicants.
No data is available from public sources on the number of non-EU applicants to Lancaster.
UCAS told The Register that these numbers do not include those who applied through Clearing, the process where wannabe students desperate to get on any degree course at all are matched up with empty places on under-subscribed courses.
"We acted as soon as we became aware that Lancaster was the source of the breach on Friday and established an incident team to handle the situation. It was immediately reported to the Information Commissioner's Office," said the university in a prepared statement.
We understand the university's graduation week took place just last week. With A-level final results being published in a few weeks from now, the timing is rather bad. Ironically, Lancaster offers a master's degree in cyber security – accredited by none other than GCHQ. El Reg trusts the intrusion wasn't caused by students putting their newly learned skills to the test.
The university did not answer The Register's questions about how many people were affected by the breach, claiming that a police investigation means it is bound by some sort of code of omerta. This "blame the cops" strategy is a relatively common one for deflecting bad PR and attempting to minimise the impact of a data breach.
In the academic year 2017-18, the most recent year for which official statistics are available, the university had 14,210 enrolled students.
Industry: Cyber Security
- CONTRACT SIEM Cyber Security Operations Engineer. REMOTE OUTSIDE IR35
- United Kingdom
REFCH8165 CONTRACT SIEM Cyber Security Operations Engineer. REMOTE UK SIEM Engineer. 6 month Contract. OUTSIDE IR35 Working towards a "SOC 2" environment. CLOUD (AWS) experience essential. Three key functions; Monitor, Escalate and Triage incidents. Vulnerability Management / threat intel. SIEM configuration / management, review, enhancement More specifically; Work with internal teams to identify assets. Identity applicable threat feeds and work with internal teams to remediate. Patch Patch Patch. (Help mature process / identify gaps) Configuration / fine tuning of SIEM alerts. Create dashboards, Compliance reporting. Log ingestion. Experience across ISO27001 / SOC2 / SIEM / End Point Security is essential Contact me today for more information Chris.Holt@dclsearch.com Or 07884666351
- Cyber Security Operations Engineer. REMOTE UK. SOC2
- United Kingdom
REF8164 Cyber Security Operations Engineer. REMOTE UK Internal opportunity. New position. Exclusive to DCL Search. You will be the hands on technical eyes and ears of the Cyber security capability actively working to ensure and enhance the adherence to ISO27001 and "SOC 2" controls. You role will touch on the following · Security Monitoring- SIEM · Vulnerability Management / Testing · Incident Management · Asset management · Disaster Recovery planning · Change Management AWS Cloud experience is essential as is the ability to ensure patch management is prioritised across the business. Any CLOUD SIEM experience highly desirable. Contact me today for more information Chris.Holt@dclsearch.com Or 07884666351
- Lead Security Architect
- United Kingdom
Engage with key clients in an Architectural / technical presales capacity. Including Stakeholders, end users / partners. Working on new and existing Security projects to confirm that proposed solutions are fit for purpose from both a technical and regulatory capacity. Working closely with multiple vendor . Managed security service background ideal CLOUD Security (AZURE OR AWS), IDAM background ideal.
- Threat Vulnerability Management Analyst
- United Kingdom
To monitor, identify and alert internal teams of cyber threats and vulnerabilities. MIRE Att&ck, CIS, OWASP, Vulnerability management tools MUST be able to commute to central London MUST be able to achieve UK SC Clearance. On going support and development.