Europe's Largest University, La Sapienza, Crippled by Ransomware Attack

La Sapienza University in Rome Remains Largely Offline Following Major Cyberattack Attributed to Pro-Russian Group

CRITICAL
February 12, 2026
5m read
RansomwareCyberattackThreat Actor

Impact Scope

People Affected

112,500 students plus faculty and staff

Industries Affected

Education

Geographic Impact

Italy (local)

Related Entities

Threat Actors

Femwar02

Other

La Sapienza UniversityBablock/Rorschach

Full Report

Executive Summary

La Sapienza University of Rome, the largest university in Europe by enrollment, has been paralyzed by a significant cyberattack that began on February 2, 2026. The university was forced to take its IT systems offline as a precautionary measure, leading to massive operational disruptions for its students and faculty. As of February 11, 2026, many core digital services were still unavailable as recovery efforts continued. Though not officially confirmed by the university, the incident is widely reported to be a ransomware attack. The pro-Russian hacktivist group Femwar02 is the alleged perpetrator, believed to have used a variant of the Bablock/Rorschach ransomware. The attack underscores the vulnerability of large, complex academic institutions to disruptive cyberattacks.

Threat Overview

The attack on La Sapienza began on February 2, prompting an immediate and widespread shutdown of network services to contain the threat and preserve data integrity. This shutdown has impacted virtually all aspects of university life, from student administration to academic resources. The university has resorted to using social media for updates and has set up physical "infopoints" on campus to disseminate information.

Attribution for the attack points towards a pro-Russian group named Femwar02. The malware is suspected to be Bablock, which is also known as Rorschach. This ransomware is known for its high-speed encryption capabilities and its ability to customize itself for each victim, making it particularly effective and difficult to defend against. A ransom note was reportedly discovered on compromised systems, but the university has correctly followed best practices by not engaging with the attackers.

Technical Analysis

Based on the characteristics of Rorschach/Bablock ransomware, the attack likely followed these stages:

  1. Initial Access: The entry vector for ransomware attacks on universities often involves phishing emails, exploitation of public-facing applications (e.g., VPNs or web servers), or stolen credentials for remote access services.
  2. Reconnaissance and Lateral Movement: Once inside, the attackers would have explored the network to identify high-value targets, such as domain controllers, backup servers, and critical application servers. They would use tools like Cobalt Strike or native Windows utilities to move across the network.
  3. Privilege Escalation: The attackers would have escalated their privileges to gain domain administrator rights, which is necessary to deploy the ransomware at scale.
  4. Defense Evasion: Rorschach is known to employ techniques to terminate security services and clear event logs to hinder detection and response.
  5. Impact (Encryption): The ransomware payload was deployed across the network, encrypting files on numerous servers and workstations, leading to the university's decision to shut down its systems.

MITRE ATT&CK Mapping

Impact Assessment

The impact on La Sapienza University is catastrophic. The shutdown of IT systems has halted teaching, research, and administrative functions. Students are unable to access course materials, submit assignments, or check grades. Faculty cannot access research data or administrative tools. The recovery process for such a large and complex organization will be long and extremely costly. Beyond the immediate operational disruption, the university faces:

  • Data Loss: Even with backups, some data may be permanently lost.
  • Financial Costs: The cost of incident response, system restoration, and potential infrastructure upgrades will be substantial.
  • Reputational Damage: The incident damages the university's reputation and may affect future student enrollment and research funding.

This attack is part of a disturbing trend of ransomware gangs targeting the education sector, which is often perceived as having limited security budgets, complex IT environments, and a low tolerance for downtime, making them more likely to pay a ransom.

IOCs

No specific technical Indicators of Compromise have been publicly released.

Detection & Response

  • Ransomware Detection: Deploy EDR and network security tools with behavioral detection capabilities to identify ransomware activity, such as rapid file modification (encryption), deletion of volume shadow copies, and attempts to disable security software.
  • Network Segmentation: A segmented network can help contain a ransomware outbreak, preventing it from spreading from the initial point of compromise to the entire organization.
  • Incident Response: La Sapienza's decision to shut down systems was a drastic but necessary step to halt the encryption process. A well-rehearsed incident response plan is critical for making such decisions quickly.

Mitigation

  1. Offline Backups: Maintain multiple, immutable, and offline backups of all critical data. This is the single most important defense against ransomware, as it allows for restoration without paying the ransom. Regularly test the backup and recovery process.
  2. Patch Management: Aggressively patch all internet-facing systems and critical internal servers to close the vulnerabilities that attackers exploit for initial access.
  3. Multi-Factor Authentication (MFA): Enforce MFA on all remote access services (VPN, RDP) and for all privileged accounts to prevent credential-based attacks.
  4. Attack Surface Reduction: Minimize the public-facing attack surface by disabling unnecessary services and restricting access to management interfaces.

Timeline of Events

1
February 2, 2026
The cyberattack on La Sapienza University begins, leading to a precautionary shutdown of IT systems.
2
February 11, 2026
Reports confirm many of the university's digital services remain offline as recovery efforts continue.
3
February 12, 2026
This article was published

MITRE ATT&CK Mitigations

Maintain offline and immutable backups of critical data to enable recovery without paying a ransom.

Enforce MFA on all remote access and privileged accounts.

Mapped D3FEND Techniques:

Segment the network to contain the spread of ransomware.

Mapped D3FEND Techniques:

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

RansomwareLa SapienzaUniversityEducationItalyCyberattackBablockRorschach

📢 Share This Article

Help others stay informed about cybersecurity threats