Incident Analysis

Harris Federation Ransomware Attack 2021: 50 Schools Offline for Weeks

In April 2021, the Harris Federation — one of England's largest multi-academy trusts, operating 50 primary and secondary schools across London — suffered a devastating ransomware attack carried out by the Vice Society group. The attack took the federation's systems offline across all 50 schools simultaneously, disabling email, remote access, and critical administrative systems. Staff and pupils were locked out of learning platforms. IT recovery took weeks. The incident became a landmark case study in the catastrophic potential of ransomware against interconnected education networks, and directly informed the DfE's decision to publish binding Cyber Security Standards for schools in January 2023.

Harris Federation: Vice Society ransomware took 50 schools offline simultaneously in April 2021 — one of the largest education sector ransomware incidents ever recorded in the UK.

What Happened: The Harris Federation Attack

The attack struck Harris Federation in late April 2021. Vice Society — a prolific ransomware group known for targeting education, healthcare, and public sector organisations — gained access to the federation's network and deployed ransomware across its interconnected infrastructure. Because Harris Federation operated a centralised IT environment serving all 50 schools, a single successful attack had immediate impact across the entire trust. Systems taken offline included email, the federation's learning platform, administrative systems, and staff remote access tools. Teachers and support staff who had been working from home during the COVID-19 period found themselves suddenly unable to access any school systems.

Vice Society: The Threat Actor

Vice Society is a ransomware-as-a-service operation that emerged in mid-2021 and quickly developed a specific focus on education sector targets. Unlike some ransomware groups that avoid healthcare and education as a matter of policy, Vice Society deliberately targeted schools, colleges, and universities — particularly in the UK and US. The group uses double extortion tactics: encrypting systems while also exfiltrating data and threatening publication on a dark web leak site. Vice Society was later attributed to attacks on the Los Angeles Unified School District (2022), multiple NHS trusts (2022), and numerous UK further education colleges. The Harris Federation attack appears to have been an early indicator of the group's education sector focus.

The Impact: Weeks of Disruption Across 50 Schools

The scale of disruption across 50 schools was unprecedented in the UK education sector. Key impacts included: - Email systems offline, forcing staff to use personal phones and accounts for communication - Learning platforms inaccessible during a period when remote and hybrid learning was ongoing - Administrative systems unavailable, disrupting safeguarding records, attendance tracking, and finance functions - Recovery taking weeks rather than days, due to the scale and complexity of rebuilding systems across the federation - Staff and pupil data potentially at risk of exfiltration by Vice Society Harris Federation chose not to pay the ransom — the correct decision — but this extended recovery time as systems had to be rebuilt from backup.

Why the Attack Succeeded: Contributing Factors

While Harris Federation did not publish a full post-incident technical report, the attack shares characteristics common to major education sector ransomware incidents: - Centralised infrastructure: the federation's interconnected network meant ransomware spread rapidly across all 50 schools once it gained a foothold - Flat network architecture: insufficient segmentation to limit lateral movement between schools and administrative systems - The timing: April 2021 was still a period of significant remote working, with VPN and remote access systems heavily in use and more exposed to attack The incident became a primary reference point in the DfE's development of the January 2023 Cyber Security Standards — particularly the requirements for network segmentation, tested incident response plans, and governor accountability.

What MATs Should Learn From Harris Federation

Multi-academy trusts face a specific risk that single schools do not: a successful attack on centralised infrastructure can affect all schools simultaneously. Key lessons for MATs include: - Network segmentation: design networks so a compromise in one school cannot propagate across the trust - Offline and immutable backups: ensure backups cannot be encrypted by ransomware and can support recovery at scale - Incident response at MAT level: the plan must cover coordinated response across all schools, not just the central office - Governor accountability: MAT boards must treat cybersecurity as a governance matter, not just an IT matter - Centralised MFA and identity management: a single compromised account should not provide access across all schools

How Kyanite Blue Helps MATs Avoid This Outcome

Coro provides endpoint protection, email security, and identity management across an entire MAT through a single platform — without requiring per-school IT resources. Hadrian identifies exposed systems across the trust's network before attackers do. For MAT IT teams, a managed service through Collective IP provides 24/7 monitoring across all schools. The controls that would have limited the Harris Federation attack — MFA, network segmentation, immutable backups, and a tested incident response plan — are the foundation of a Kyanite Blue-delivered security programme.

Frequently Asked Questions

Did Harris Federation pay the Vice Society ransom?

Harris Federation confirmed that it did not pay the ransom. This is the recommended position — paying ransoms does not guarantee recovery of data or systems, funds criminal operations, and encourages further attacks. Recovery without paying required rebuilding systems from backup, which took significantly longer but preserved the federation's integrity and avoided directly funding the attackers.

What data did Vice Society steal from Harris Federation?

Vice Society typically uses double extortion — encrypting systems and exfiltrating data to threaten publication. The full extent of data exfiltrated from Harris Federation has not been publicly confirmed. The federation stated that it was investigating what data may have been accessed. Incidents of this nature typically involve some level of data theft given Vice Society's operational model.

How long did Harris Federation take to recover?

Recovery took several weeks. The scale of restoring systems across 50 schools from backup, verifying they were clean before restoration, and rebuilding the federation's IT environment meant that full recovery was a multi-week process. This reflects the general pattern in major education sector ransomware incidents — even with good backups, recovery at scale is measured in weeks.

What changed in UK education cybersecurity after the Harris Federation attack?

The Harris Federation attack was among the incidents that directly informed the DfE's decision to publish binding Cyber Security Standards for schools in January 2023. The attack highlighted the specific risk that multi-academy trusts face from interconnected infrastructure, and reinforced the NCSC's guidance on network segmentation, tested backups, and governor accountability. It remains the primary UK case study cited when discussing ransomware risk in the MAT sector.

Protect your MAT from ransomware — get a free security review

Kyanite Blue specialises in cybersecurity for iGaming operators. MGA-licensed operators across Malta trust our stack.

Get in touch

Featured Product

Coro

Learn more

Ready to secure your iGaming operation?

MGA-licensed operators across Malta trust Kyanite Blue.