Cyberattack Disrupts Eindhoven University Operations

Eindhoven, Friday, 24 January 2025.
Eindhoven University of Technology faces urgent cybersecurity upgrades after hackers accessed login details, prompting network shutdown to protect data integrity.
Initial Discovery and Response
The cyberattack was first detected on January 12, 2025, at approximately 9:00 PM, when TU/e’s ICT department identified suspicious server activity [1][5]. University officials responded swiftly by taking the entire network offline during the early morning hours to prevent potential data compromise [1]. According to insider reports, the breach occurred through compromised login credentials of at least one employee and one student, allowing attackers to access the university’s Windows domain through multiple accounts [1].
Impact and Security Measures
The university, located just five miles from ASML Holding NV’s global headquarters [8], experienced significant disruptions to its operations. All network-dependent services, including email, WiFi, and campus payment systems were affected [2]. Vice President Patrick Groothuis emphasized that while the shutdown caused serious inconvenience, it was necessary to prevent more severe consequences [2][3]. The university is conducting a thorough forensic investigation in partnership with cybersecurity firm Fox-IT, with results expected to be published in April 2025 [3].
Recovery and Operational Status
After nine days of disruption, TU/e successfully restored its systems on January 19, 2025, with education resuming the following day [1]. The university has implemented enhanced security protocols, and as of January 21, 2025, has transitioned from crisis management back to normal operations [3]. This incident has prompted other institutions, notably Radboud University Nijmegen, to accelerate their security measures, particularly in implementing additional authentication protocols [1].
Investigation and Future Implications
The compromised login credentials were later discovered in criminal databases containing information stolen through malware designed to harvest passwords and digital identities [1]. While the investigation continues, authorities have not yet determined whether the attackers were seeking criminal gain or targeting scientific data and intellectual property [1]. The university has established a dedicated support line (+3164168340) for affected students and staff [3], demonstrating its commitment to maintaining transparent communication throughout the recovery process.