Lancaster Uni data breach hits at least 12,500 wannabe students
Lancaster University - which offers a GCHQ-accredited degree in security - has been struck by a "sophisticated and malicious phishing attack" that resulted in the leak of around 12,500 wannabe students' personal data.
In a statement published yesterday evening, the university admitted that undergraduate applicant records for the years 2019 and 2020 had been accessed, along with the data of some current students.
Information accessed by whoever the hackers were - so far Lancaster has said nothing about this - includes names, addresses, phone numbers and email addresses.
The uni also mentioned fraudulent invoices "had been sent to some undergraduate applicants".
Lancaster accepted 3,585 applicants for student places in the educational year 2018, the latest for which data is available. Over the past five years, the number of people accepted onto courses increased by around 100 to 200 people per year, meaning the latest data breach is likely to have affected around 3,700 successful applicants.
Of the 3,585 students accepted by Lancaster last year, 375 were from other EU countries and 575 were from non-EU nations.
Further statistics compiled by UCAS show that 12,545 people applied to Lancaster in 2018 alone, with the number having been roughly stable for the preceding three years. On that basis, the recent data breach may have affected about 12,500 applicants.
No data is available from public sources on the number of non-EU applicants to Lancaster.
UCAS told The Register that these numbers do not include those who applied through Clearing, the process where wannabe students desperate to get on any degree course at all are matched up with empty places on under-subscribed courses.
"We acted as soon as we became aware that Lancaster was the source of the breach on Friday and established an incident team to handle the situation. It was immediately reported to the Information Commissioner's Office," said the university in a prepared statement.
We understand the university's graduation week took place just last week. With A-level final results being published in a few weeks from now, the timing is rather bad. Ironically, Lancaster offers a master's degree in cyber security – accredited by none other than GCHQ. El Reg trusts the intrusion wasn't caused by students putting their newly learned skills to the test.
The university did not answer The Register's questions about how many people were affected by the breach, claiming that a police investigation means it is bound by some sort of code of omerta. This "blame the cops" strategy is a relatively common one for deflecting bad PR and attempting to minimise the impact of a data breach.
In the academic year 2017-18, the most recent year for which official statistics are available, the university had 14,210 enrolled students.
source theregister
Industry: Cyber Security
Latest Jobs
-
- Public Sector Cyber Security Sales | UK
- England
- N/A
-
Public Sector Cyber Security Sales | UK UK | Remote / Hybrid A cyber security provider is seeking a Public Sector Sales professional to drive growth across UK government and public sector organisations. Must have current Cyber Security sales experience. Responsibilities Generate new business selling cyber security solutions into UK public sector Build relationships with CIO, CISO and senior technology stakeholders Manage the full sales cycle from opportunity to contract close Develop pipeline across central government, local government and public sector bodies Support bids, tenders and framework opportunities Experience Proven cyber security sales experience in the UK Track record selling into public sector organisations Familiarity with CCS, G Cloud or other government frameworks Strong stakeholder engagement and deal management skills Location UK based Security Requirements Eligible to obtain UK Security Clearance
-
- Security Architect | MoD - Security Cleared. OUTSIDE IR35 | Hampshire
- N/A
- Outside IR35
-
Security Architect | MOD | Security Cleared | Outside IR35 | Hampshire Commutable The successful candidate must be willing to undergo DV Clearance, ideally already holding active clearance. You will produce high and low level security architecture documentation, guiding and validating designs for systems deployed within sensitive environments. The role requires providing specialist security input into solution design, service transition and change initiatives, working closely with engineering, operations, client and third party stakeholders. You must have current hands on architectural experience, including VMware secure platform design and virtualisation architecture, alongside AWS expertise. This is an outside IR35 contract- 6 month rolling. Part of a longer term MoD project
-
- Active Directory | RBA engineer | UK Remote | SC Clearable
- United Kingdom
- N/A
-
Technical Active Directory (AD) and RBA specialist needed to play a key part in complex, enterprise scale Active Directory and access transformation programmes. You will work alongside senior team, helping reshape access models, modernise legacy directory structures and strengthen security posture across secure environments. This is hands on delivery within high impact projects where your work directly improves access control, compliance and operational resilience. Active UK Security Clearance required. This is a remote role with client travel. Implementation of Role Based Access Control across large AD estates Restructuring complex permission models, security groups and delegated access Supporting domain controller upgrades and core directory improvements Applying security hardening standards and remediating audit findings Enhancing authentication, policy and access governance frameworks Troubleshooting and resolving technical AD challenges within live environments Producing robust technical documentation and identifying project risks You must have the following technical experience Enterprise Active Directory administration Role Based Access and permission remediation OU design and governance Group Policy management Security group delegation models DNS and DHCP services Kerberos authentication / NTLM PowerShell scripting and automation Azure AD | Entra ID Hybrid identity environments Identity Governance PAM
-
- Identity and Access Management Consultant (Saviynt & Microsoft Entra) | UK
- United Kingdom
- N/A
-
Role summary Technical IAM consultant delivering identity governance and cloud identity solutions to enterprise clients. What you will do Implement / Configure / Deploy Saviynt IGA / Microsoft Entra solutions: Lead technical workshops, gather requirements and translate into solution designs. Troubleshoot complex issues, support testing and deployments. Produce technical artefacts and configuration guides. Key skills Hands-on Saviynt IGA experience (workflow, connectors, access governance). Strong practical knowledge of Microsoft Entra ID / Azure AD identity and access controls. Understanding of identity protocols (SAML, OAuth, OpenID Connect) and hybrid identity. Experience with APIs / REST for integrations and automation. What we are looking for Proven delivery experience in IAM / IGA projects, preferably in consulting. Confident communicator with client-facing delivery exposure.