Ransomware cyber attack information

The request was partially successful.

Dear Leeds Beckett University,

Do you have any end point or anti-virus software installed on your network devices?

Has your organisation ever been the victim of a ransomware attack which meant that an external hacker encrypted a PC or device or network within your organisation and demanded payment in order to decrypt the device? Y/N

If Yes

How often have you experienced an attack in the last 12 months?

How much did the attacker demand as a ransom for each attack?

How did you respond:
a) We paid the ransom
b) Threw away the device
c) Used decrypter or other technology to regain the use of the encrypted device
c) Other (Please describe)

Did you notify the police? Y/N

If yes

What was their advice?

Yours faithfully,

Sarah Daniels

FOI, Leeds Beckett University

1 Attachment

Dear Sarah,

 

I acknowledge receipt of your request for information.  It will be
processed in accordance with the requirements of the Freedom of
Information Act 2000 and you should expect to receive a response by 04
August 2016.

 

Kind regards,

 

[1]Description: Description: Saleem Asmat, Administrative
http://www.leedsbeckett.ac.uk/assets/ema... Assistant
Governance & Legal Affairs
  Leeds Beckett University,
G13, Leighton Hall,
Headingley Campus, Leeds, LS6
3QS, United Kingdom

show quoted sections

 

Please use this email address for all replies to this request:

[3][FOI #344544 email]

 

Is [4][Leeds Beckett University request email] the wrong address for Freedom of Information
requests to Leeds Beckett University? If so, please contact us using this
form:

[5]https://www.whatdotheyknow.com/change_re...

 

Disclaimer: This message and any reply that you make will be published on
the internet. Our privacy and copyright policies:

[6]https://www.whatdotheyknow.com/help/offi...

 

For more detailed guidance on safely disclosing information, read the
latest advice from the ICO:

[7]https://www.whatdotheyknow.com/help/ico-...

 

If you find this service useful as an FOI officer, please ask your web
manager to link to us from your organisation's FOI page.

 

 

-------------------------------------------------------------------

 

To view the terms under which this email is distributed, please go to:-
[8]http://disclaimer.leedsbeckett.ac.uk/dis...

References

Visible links
2. mailto:[email address]
3. mailto:[FOI #344544 email]
4. mailto:[Leeds Beckett University request email]
5. https://www.whatdotheyknow.com/change_re...
6. https://www.whatdotheyknow.com/help/offi...
7. https://www.whatdotheyknow.com/help/ico-...
8. http://disclaimer.leedsbeckett.ac.uk/dis...

Bakhat, Rehana, Leeds Beckett University

3 Attachments

 Dear Sarah,

 

This email sets out the University’s response to your request for
information.  It has been processed in accordance with the requirements of
the Freedom of Information Act 2000 (“FOIA”).

 

I can confirm that we hold the information that you requested.  I have
addressed each of your questions in turn:

 

 

1.       Do you have any end point or anti-virus software installed on
your network devices? We use McAfee Anti-Virus software on our PCs and
Servers

 

2.       Has your organisation ever been the victim of a ransomware attack
which meant that an external hacker encrypted a PC or device or network
within your organisation and demanded payment in order to decrypt the
device?  Y/N

 

If Yes

 

How often have you experienced an attack in the last 12 months?

 

How much did the attacker demand as a ransom for each attack?

 

How did you respond:

a) We paid the ransom

b) Threw away the device

c) Used decrypter or other technology to regain the use of the encrypted
device

c) Other (Please describe)

 

Did you notify the police? Y/N

 

If yes

 

What was their advice?

 

 

With regard to the above information, I consider that S.43 FOIA is
engaged. Accordingly, I have withheld disclosure of this information as I
consider that it would prejudice our commercial interests.   Information
relating to  ransomware attacks are confidential and must be maintained to
ensure that the IT security is not compromised and the University is not
exposed to any vulnerability to a cyber-attack. I have considered whether
there is any public interest in this matter and have concluded that the
potential associated with disclosure of this information outweighs any
advantage.

 

I trust that this concludes your request satisfactorily. If you are
dissatisfied with the way that your request has been handled, you may
request a review by emailing the Compliance and Student Casework Manager
on [1][email address].  If you remain dissatisfied following
the conclusion of the internal review, you may apply to the Information
Commissioner whose address is: Wycliffe House, Water Lane, Wilmslow,
Cheshire, SK9 5AF.

 

Regards,

Rehana
Rehana Bakhat Casework Coordinator
Governance and Legal Affairs
Leeds Beckett University, G13 Leighton Hall Headingley Campus, Leeds LS6 3QS
[2]http://www.leedsmet.ac.uk/assets/emails/...
United Kingdom
Tel: +44 (0)113 812 3410 | Email: [3][email address]
[4]http://www.leedsmet.ac.uk/assets/emails/... [5]http://www.leedsmet.ac.uk/assets/emails/... [6]http://www.leedsmet.ac.uk/assets/emails/...
[7]http://www.leedsmet.ac.uk/assets/emails/...

 

 

To view the terms under which this email is distributed, please go to:-
[8]http://disclaimer.leedsbeckett.ac.uk/dis...

References

Visible links
1. mailto:[email address]
2. http://www.leedsbeckett.ac.uk/
3. mailto:[email address]
4. http://www.leedsbeckett.ac.uk/assets/ema...
5. https://twitter.com/leedsbeckett
6. https://www.youtube.com/user/LeedsBeckett
7. http://www.leedsbeckett.ac.uk/
8. http://disclaimer.leedsbeckett.ac.uk/dis...