Cyberattack Disrupts Eindhoven University, Classes Cancelled Again
Eindhoven, Wednesday, 15 January 2025.
Eindhoven University of Technology cancels classes for a second day after a cyberattack, highlighting cybersecurity challenges in academia. Efforts continue to secure networks before upcoming exams.
Initial Response and Impact
The cyberattack, first detected on January 12, 2025, at 4:30 PM [5], prompted Eindhoven University of Technology (TU/e) to implement an immediate network shutdown. The university’s Vice President, Patrick Groothuis, confirmed that suspicious server activity led to this preventive measure [1][3]. The disruption has affected critical educational services, including Wi-Fi, email, Canvas, and Teams, forcing the cancellation of classes on both Monday and Tuesday [1].
Security Measures and Investigation
While there are currently no signs of data theft [1][3], university IT experts are conducting a thorough investigation into the incident. The institution has taken a methodical approach to network restoration, prioritizing educational systems [2]. A temporary Wi-Fi network, named ‘TUe-temporary-wifi,’ has been established on campus to provide basic connectivity [6]. The university has also set up a WhatsApp helpline for students and staff to address their concerns [6].
Academic Schedule Adjustments
In response to the disruption, TU/e has announced significant schedule changes. Exams originally planned for the week of January 20, 2025, have been postponed by one week [2]. The university is implementing a ‘catch-up week’ from January 20-26, 2025, with all deadlines extended accordingly [2]. While the campus remains open, most students have opted to stay away due to limited network accessibility [1].
Strategic Importance and Recovery Plans
The cyberattack has drawn particular attention due to TU/e’s strategic importance as a key feeder institution for ASML, the Dutch chipmaking giant [7]. The university expects network-bound systems to be available by January 20, 2025 [2], though Patrick Groothuis has emphasized that the restoration process will be conducted with utmost care to ensure security [1]. Non-network-related research activities and PhD defenses continue to operate normally, with all laboratories and facilities remaining functional and safe [8].
Bronnen
- www.iamexpat.nl
- www.tue.nl
- therecord.media
- www.techzine.eu
- ioplus.nl
- www.cursor.tue.nl
- fortune.com
- www.tue.nl