Pupils hacking their own schools for fun, watchdog warns

After an increase in cyber attacks, a government observer warned the students who hacked their school systems on the “threat from the inside ..
The Information Commissioner Office (ICO) has demonstrated a “worrying model olan, which shows that students are more responsible for more than half of the cyber attacks of the school.
Although these attacks started as a “some entertainment ve at school, he warned that it could cause real damage and that it may have consequences for young people and arranged them for“ cyber crime life ”.
Between January 2022 and 2024, ICO analyzed the 215 personal data violation report caused by internal attacks in the education sector.
57 percent of the events were caused by students and that almost one -third of the attacks from the inside of the weak passwords, or they were caused by them in pieces of paper.
ICO said that this means that young pirates do not go in, they have entered ”.
Heather Touyey said: “While educational environments are experiencing numerous cyber attacks, there is evidence that the ‘threat from the inside’ is not insufficient, that it is largely investigated, and that it may lead to the risk of damage and guilt in the future.
“In a school environment, courage, challenge, and a little entertainment can ultimately lead to organizations or children who damage critical infrastructure.
“It is important that we understand the interests and motivation of the next generation to ensure that children stay on the right side of the law and to progress to reward careers in a sector that needs continuous experts.”
Schools face an increasing number of cyber attacks. According to the government’s Cyber Security Violations survey, 60 percent of secondary schools and 44 percent of primary schools detected violations or attacks.
An example given by ICO has elaborated how 11 students have reached the information management system of a secondary school that holds the personal information of more than 1,400 students.
The students used the vehicles downloaded to break their passwords and security protocols.
Another case saw a student using a personnel entry to access AA College’s information management system. The system has hidden personal information to more than 9,000 personnel, name and home address, school records, health data, protection and pastoral logs and emergency contacts.
The more analysis of 215 incident, 23 percent of the events, such as non -surgical devices, such as poor data protection applications, students were allowed to use personnel devices or to access the data without a legitimate need.
20 percent of the events were caused by personnel who sent data to personal devices, and 17 percent of them were due to access to systems such as wrong installation or SharePoint.
Only 5 percent of the events are described as internal ones using sophisticated techniques to skip safety and network controls.




