112,500 students plus faculty and staff
La Sapienza University of Rome, the largest university in Europe by enrollment, has been paralyzed by a significant cyberattack that began on February 2, 2026. The university was forced to take its IT systems offline as a precautionary measure, leading to massive operational disruptions for its students and faculty. As of February 11, 2026, many core digital services were still unavailable as recovery efforts continued. Though not officially confirmed by the university, the incident is widely reported to be a ransomware attack. The pro-Russian hacktivist group Femwar02 is the alleged perpetrator, believed to have used a variant of the Bablock/Rorschach ransomware. The attack underscores the vulnerability of large, complex academic institutions to disruptive cyberattacks.
The attack on La Sapienza began on February 2, prompting an immediate and widespread shutdown of network services to contain the threat and preserve data integrity. This shutdown has impacted virtually all aspects of university life, from student administration to academic resources. The university has resorted to using social media for updates and has set up physical "infopoints" on campus to disseminate information.
Attribution for the attack points towards a pro-Russian group named Femwar02. The malware is suspected to be Bablock, which is also known as Rorschach. This ransomware is known for its high-speed encryption capabilities and its ability to customize itself for each victim, making it particularly effective and difficult to defend against. A ransom note was reportedly discovered on compromised systems, but the university has correctly followed best practices by not engaging with the attackers.
Based on the characteristics of Rorschach/Bablock ransomware, the attack likely followed these stages:
T1486 - Data Encrypted for Impact: The core of the ransomware attack.T1078 - Valid Accounts: Likely used for initial access and lateral movement.T1562.001 - Disable or Modify Tools: A common ransomware tactic to disable antivirus and EDR.T1021.002 - SMB/Windows Admin Shares: A probable method for deploying the ransomware across the network.The impact on La Sapienza University is catastrophic. The shutdown of IT systems has halted teaching, research, and administrative functions. Students are unable to access course materials, submit assignments, or check grades. Faculty cannot access research data or administrative tools. The recovery process for such a large and complex organization will be long and extremely costly. Beyond the immediate operational disruption, the university faces:
This attack is part of a disturbing trend of ransomware gangs targeting the education sector, which is often perceived as having limited security budgets, complex IT environments, and a low tolerance for downtime, making them more likely to pay a ransom.
No specific technical Indicators of Compromise have been publicly released.
Maintain offline and immutable backups of critical data to enable recovery without paying a ransom.
Enforce MFA on all remote access and privileged accounts.
Mapped D3FEND Techniques:
Segment the network to contain the spread of ransomware.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats