Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    AI models may be accidentally (and secretly) learning each other’s bad behaviors

    vivo X Fold 5 launches in Malaysia for RM6999

    Microsoft finally fixes the worst thing about Excel’s pivot tables

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      AI models may be accidentally (and secretly) learning each other’s bad behaviors

      July 30, 2025

      Another Chinese AI model is turning heads

      July 15, 2025

      AI chatbot Grok issues apology for antisemitic posts

      July 13, 2025

      Apple sued by shareholders for allegedly overstating AI progress

      June 22, 2025

      How far will AI go to defend its own survival?

      June 2, 2025
    • Business

      Cloudflare open-sources Orange Meets with End-to-End encryption

      June 29, 2025

      Google links massive cloud outage to API management issue

      June 13, 2025

      The EU challenges Google and Cloudflare with its very own DNS resolver that can filter dangerous traffic

      June 11, 2025

      These two Ivanti bugs are allowing hackers to target cloud instances

      May 21, 2025

      How cloud and AI transform and improve customer experiences

      May 10, 2025
    • Crypto

      A Once-Rumored Trump Target Is Now Betting Big on Bitcoin

      July 29, 2025

      XLM Downturn Looms: MACD Crossover and Negative Sentiment Raise Red Flags

      July 29, 2025

      Ten Years of Ethereum: How a Blockchain Dream Grew Up

      July 29, 2025

      Bitcoin Is Becoming the Credit Default Swap on a Collapsing Fiat System | US Crypto News

      July 29, 2025

      HTX Introduces Custom Invitation Code Feature with Referral Campaign Offering 1 BTC Grand Prize

      July 29, 2025
    • Technology

      Microsoft finally fixes the worst thing about Excel’s pivot tables

      July 30, 2025

      Logitech’s newest MX Master mouse is on sale for $40 off right now

      July 30, 2025

      Adobe adds one of its most-requested updates to Photoshop

      July 30, 2025

      This AOC 1440p OLED gaming monitor is super cheap today: $485

      July 30, 2025

      Sharethrough, Contentful and Yahoo are among this year’s Digiday Technology Awards finalists

      July 30, 2025
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»Dutch university’s rapid response saved it from ransomware devastation
    Technology

    Dutch university’s rapid response saved it from ransomware devastation

    TechAiVerseBy TechAiVerseJune 9, 2025No Comments7 Mins Read2 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Dutch university’s rapid response saved it from ransomware devastation
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    BMI Calculator – Check your Body Mass Index for free!

    Dutch university’s rapid response saved it from ransomware devastation

    Eindhoven University of Technology has planned multi-factor authentication and regularly practised cyber crisis drills – yet it still fell victim to attackers who exploited gaps in its defences

    By

    • Kim Loohuis

    Published: 04 Jun 2025

    Earlier this year, Eindhoven University of Technology (TU/e), one of the Netherlands’ leading technical universities, demonstrated the uncomfortable truth that even organisations that tick all the cyber security boxes can fall victim to sophisticated attacks, when attackers gained enterprise-level access to its network and began preparing what forensic investigators later concluded would have been a devastating ransomware attack. 

    The university’s response was dramatic: it disconnected all 14,000 students and 4,700 staff from the internet for an entire week. That decision, taken within hours of detecting the breach, prevented what could have been months of crippled operations and millions in ransom demands. 

    The incident began on 6 January, when attackers used legitimate credentials found on the dark web to access TU/e’s virtual private network (VPN) system. Five days later, they launched an assault, and within hours, they gained the highest administrative privileges on the domain controllers – effectively having complete control over the network – and started installing persistence tools typical of ransomware preparation. This triggered the security monitoring.  

    The paradox facing Martin de Vries, TU/e’s chief information security officer (CISO), illustrates an uncomfortable truth about modern cyber security: perfect prevention remains elusive, even for well-prepared organisations. However, when the crisis call came that Saturday evening, his team’s rapid response would prove the difference between a week of disruption and potential devastation. 

    The situation De Vries encountered was a cyber security nightmare: attackers with enterprise privileges fighting his team for network control.

    “It was a cat-and-mouse game,” he recalls. “Every time we disabled an account or tried to segment servers, we saw them on another server. Because they had those privileges, they were also taking away our access rights while we were taking theirs.”

    With conventional containment measures failing, the decision was made to sever the university’s connection entirely, taking TU/e’s 14,000 students and 4,700 staff offline for what turned out to be a week. However, forensic analysis by Fox-IT later confirmed this decision prevented a devastating ransomware attack.

    Implementation gaps

    TU/e’s experience exposes the gap between security awareness and flawless execution that haunts even the most diligent organisations. At the end of 2024, the university identified compromised credentials belonging to several user accounts, flagging them as “risky users” through its monitoring tools. “We knew these accounts were leaked,” admits De Vries. “We identified them at the end of last year and sent users instructions on changing their passwords. But a configuration error allowed them to re-enter the same password.” 

    This single oversight undermined what should have been a successful remediation process.  

    Similarly, multi-factor authentication for the university’s VPN was already planned and budgeted for. “It was on the schedule to be implemented by summer,” he says. “It would have been deployed around this time.”

    Instead, attackers exploited its absence to gain initial access using the dark web credentials. 

    The response showcased the Netherlands’ collaborative approach to higher education cyber security. TU/e benefits from SurfSoc, a security monitoring service delivered by Fox-IT and managed by Surf, the collaborative organisation providing IT services to Dutch universities and research institutions. Surf detected the malicious activity at 9:55 pm and alerted TU/e by 10:48 pm, even as the university’s security team responded to internal alerts. This redundant detection system accelerated the response timeline.

    “We were already aware of potential malicious activity when Fox-IT, operating Surfsoc, contacted us,” says De Vries.

    When TU/e called Fox-IT’s emergency response line at 11:50 pm, Fox-IT supported TU/e’s decision to disconnect the network immediately. The network went offline at 1:17 am on the Sunday, cutting off attackers who had been installing remote administration tools, creating privileged accounts and attempting to disable backup systems – all hallmarks of ransomware preparation.

    Disruption versus damage

    The decision to take 20,000 users offline for a week was not made lightly, but the alternative would have been far worse. Fox-IT’s forensic investigation concluded that “the adversary exhibited many characteristics typical of a ransomware attack”, with rapid escalation to domain administrator privileges and attempts to disable backup systems following established ransomware playbooks. 

    “The biggest impact for the university was on students and staff,” says De Vries. “We had to postpone exams; academics had to mark papers over extended periods. That impact can’t be expressed in euros”. Yet the financial calculation was stark. The direct costs of the response remained manageable – “not comparable to what we spend annually on security”, according to De Vries. Had ransomware been successfully deployed, however, “it probably would have been in the millions”.

    The human cost, while significant, was temporary. Exam schedules were rearranged, research activities paused, and normal operations disrupted, but the university’s core functions remained intact. A successful ransomware attack could have crippled operations for months while demanding substantial ransom payments with no guarantee of data recovery. 

    TU/e’s ability to respond decisively stemmed from regular crisis preparation. The university participates in Surf’s sector-wide Ozon cyber crisis exercise every two years alongside annual internal drills, ensuring crisis teams know their roles before disaster strikes. “Everyone in the crisis organisation knew their role,” says De Vries. “You don’t want to be looking at each other asking, ‘How did this work again?’ when the real crisis hits.”

    The crisis management structure activated smoothly, with clear communication protocols and defined responsibilities. This organisational readiness enabled the rapid decision-making that contained the attack. 

    This preparation extended beyond TU/e’s walls. The university’s decision to publish detailed forensic reports reflects the Dutch higher education sector’s collaborative approach to cyber security, starkly contrasting corporate secrecy around breaches. The precedent was set by Maastricht University, which suffered a major ransomware attack in 2019 and shared its experiences openly to help other institutions. “We are universities – we’re about gaining and sharing knowledge,” says De Vries. “There’s a culture in the education sector of sharing these experiences so others can learn from them.”

    The collaboration is systematic: university CISOs meet monthly through Surf to share intelligence and best practices. “There’s no university that doesn’t have this on their radar,” he notes.

    Persistent risks 

    Complex research environments create persistent vulnerabilities. TU/e supports research groups using Windows 7 equipment, necessitating older authentication protocols that attackers can exploit.

    “We have an IT landscape that must support both old and new systems because research groups have equipment that still works perfectly for their research but uses older operating systems,” says De Vries.

    Since resuming operations, TU/e has conducted individual security assessments before reconnecting research systems to the internet. 

    Despite the successful response, he remains realistic about future threats. “It’s not a question of if, but when,” says De Vries. “You have to prepare as an organisation for it to happen, no matter how good your security is.”

    His advice to fellow security leaders is practical: regularly drill crisis response teams and ensure detection systems work around the clock. “You need good detection so you’re properly informed when things go wrong, and a crisis organisation that can act immediately,” says De Vries.

    TU/e’s experience proves that even well-prepared organisations remain vulnerable. But rapid detection, decisive leadership and accepting short-term disruption can prevent far greater long-term damage. When perfect security remains impossible, response quality determines impact.

    Read more on Endpoint security


    • Europe leads shift from cyber security ‘headcount gap’ to skills-based hiring


    • CISA: Election infrastructure has never been more secure

      By: Alexander Culafi


    • Five-minute interview: Cristina Bentue, IriusRisk


    • China claims it cracked Apple’s AirDrop, can track senders

      By: Alexander Culafi

    BMI Calculator – Check your Body Mass Index for free!

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleInterview: Manish Jethwa, chief technology officer, Ordnance Survey
    Next Article Fortifying the future: The pivotal role of CISOs in AI operations
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    Microsoft finally fixes the worst thing about Excel’s pivot tables

    July 30, 2025

    Logitech’s newest MX Master mouse is on sale for $40 off right now

    July 30, 2025

    Adobe adds one of its most-requested updates to Photoshop

    July 30, 2025
    Leave A Reply Cancel Reply

    Top Posts

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 202532 Views

    New Akira ransomware decryptor cracks encryptions keys using GPUs

    March 16, 202529 Views

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 202528 Views

    OpenAI details ChatGPT-o3, o4-mini, o4-mini-high usage limits

    April 19, 202522 Views
    Don't Miss
    Artificial Intelligence July 30, 2025

    AI models may be accidentally (and secretly) learning each other’s bad behaviors

    AI models may be accidentally (and secretly) learning each other’s bad behaviorsArtificial intelligence models can…

    vivo X Fold 5 launches in Malaysia for RM6999

    Microsoft finally fixes the worst thing about Excel’s pivot tables

    Logitech’s newest MX Master mouse is on sale for $40 off right now

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    AI models may be accidentally (and secretly) learning each other’s bad behaviors

    July 30, 20252 Views

    vivo X Fold 5 launches in Malaysia for RM6999

    July 30, 20252 Views

    Microsoft finally fixes the worst thing about Excel’s pivot tables

    July 30, 20252 Views
    Most Popular

    Xiaomi 15 Ultra Officially Launched in China, Malaysia launch to follow after global event

    March 12, 20250 Views

    Apple thinks people won’t use MagSafe on iPhone 16e

    March 12, 20250 Views

    French Apex Legends voice cast refuses contracts over “unacceptable” AI clause

    March 12, 20250 Views
    © 2025 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.