How BullWall saved Sir Roger Manwood’s school from four ransomware attacks

600

Computers onsite during early COVID-19 lockdowns

17

Servers + multiple projectors, the telephone system and CCTV

1

User with remote access that bad actors used to bypass security measures
Customer
Sir Roger Manwood School
Industry
Education
Location
United Kingdom

HOW BULLWALL HELPED AN EDUCATION INSTITUTION BUILD RANSOMWARE RESILIENCE

With a team of two looking after over 600 computers onsite, 17 servers, multiple projectors, the telephone system and CCTV, Sir Roger Manwood’s School was a prime target for bad actors launching ransomware attacks. The attack came at 3.00 am during the first national Covid-19 lockdown and had a devastating effect. Bad actors had piggybacked on a user with remote access to launch their attack, bypassing preventative security measures and encrypting all files on the network. By the time IT staff got to the school the next morning, users were unable to log in.

“When the attack occurred, we were fortunate that COVID-19 restrictions had already necessitated a lockdown and that it coincided with the school’s half-term break” recalls Sir Roger Manwood’s School IT manager, Sharn Somerton-Davies. “Google Classroom was already set up for students to work from home, which minimized disruption to their studies. However, our biggest challenge was the email system. With all servers down, users could not access or authenticate email accounts, effectively cutting off our primary means of communication.”

The attack came at 3:00am during the first national Covid-19 lockdown, and had a devastating effect.

“Communications during this time relied entirely on mobile phones, as our phone system had also been compromised. Meanwhile, our backup company meticulously analysed data to trace the origin of the attack, which appeared to stem from a Remote Desktop Protocol (RDP) connection by one of our staff members.”

Sharn Somerton-Davies
IT Manager, Sir Roger Manwood’s School

PREVENTATIVE SECURITY DIDN’T WORK

With communications still down, relying only on an internal phone system and no email, and in the midst of a national lockdown, the race was on to get the school and its students back up and running. The IT team worked side by side to disconnect everything, clean the machines, and use available backups to recover lost files—a painstakingly slow process.

“The entire recovery process took about two weeks, during which time the IT team worked fourteen-hour days to assess, scan, and rebuild each system. Every machine on campus was reimaged to ensure no trace of the attack remained. The initial four days were dedicated to evaluating data integrity, assessing the servers we could operate without, and executing intensive cleaning processes on each machine. Communications during this time relied entirely on mobile phones, as our phone system had also been compromised. Meanwhile, our backup company meticulously analyzed data to trace the origin of the attack, which appeared to stem from a Remote Desktop Protocol (RDP) connection by one of our staff members.”

The rebuild consisted of bringing every system and machine down to absolute minimal operating capacity with no internet connection, and then slowly and methodically working through what had been corrupted, where it had been corrupted, cleaning out any residuals and rebuilding from the ground up.

“As each server was reactivated, it was scanned, cleaned, and then taken offline again for another check. In total, we managed this process for 18 virtual servers. Alongside this, I made visits to staff members’ homes to inspect and clean their laptops, installing new antivirus software to protect remote devices. We decided to ban all RDP access moving forward.”

After ten days, the team was finally ready to reconnect the internet, but even then, email was cautiously held back as they went from workstation to workstation, scanning and monitoring each as it came online.

“Once email went live, the system was fully operational again. Despite Google Classroom allowing students to continue lessons remotely, the lack of reliable communication created immense pressure, and as the days passed, we faced constant questions and concerned looks from staff. Each step of the way was a reminder of just how critical secure, reliable systems are to the school’s operations.”

WORKING FROM HOME

With staff teaching from home because of the lockdown, it meant the IT team had to go on the road to clean and recover these machines. The process involved sitting outside homes and remotely accessing their machines to make sure there were no residuals that could come back and affect the school again.

The detection of residuals was extremely difficult, and knowing what was corrupted was almost impossible, so when the time came to switch everything back on it was a tense moment.

Thankfully, the school was operational once again. However, as soon as this occurred, School Governors wanted to know what had happened and why. Their main question was, ‘Could it happen again?’ The only possible answer was ‘yes.’

Since installing BullWall, the school has been attacked a further four times, and in each instance the attack has been thwarted by BullWall.

I experienced an attack where a cybercriminal used a valid user account to get in remotely. You can’t prevent that. You need a ransomware containment solution like BullWall.

Sharn Somerton-Davies
IT Manager, Sir Roger Manwood’s School

ANOTHER FIREWALL WON’T CUT IT

Within days of being back up and running, the IT team began to look for a solution. Business partners suggested additional firewalls; however, the team knew this wasn’t the way forward. Fortunately, they discovered BullWall Ransomware Containment and knew immediately that they’d found their solution. After an initial demonstration followed by a ransomware assessment to show how the system’s automation responds to attacks in real-time, the product was purchased and installed ready to take on the next attack.

“We’ve had instances of packets being attached to what looked like legitimate HMRC Government emails going to the finance team, BullWall stopped that attack. We also received a PowerPoint file from a trusted source that was expected, but again the ransomware had been embedded and would’ve quickly and easily spread if BullWall hadn’t put an instant stop to it. Of the four attacks, three have been malicious and the fourth was a student who didn’t have malicious intent, but had, through their actions, made us vulnerable. On all four occasions, BullWall protected us.”

Similar customer stories

Manufacturing
Manufacturing Company
After a ransomware attack caused more than a month of downtime in 2022, a Canadian raw material manufacturing company knew it needed a better solution...
Manufacturing
Ricoh
Ricoh faced a growing challenge with increasingly sophisticated ransomware attacks that traditional prevention methods couldn’t fully address.
Manufacturing
Limonta
Founded in 1893 in Costa Masnaga in the Lombardy region of Italy, Limonta is built upon over 130 years of family history, having grown and...