In the news

Nursery cyberattacks push UK education into a new era of risk.

Written by Aaron Flack | Sep 29, 2025

A British nursery chain has become the focus of one of the most disturbing cyber incidents to hit the education sector. Kido International, which runs nurseries across Greater London, confirmed a criminal group had accessed systems containing the names, addresses and photographs of thousands of children. The hackers, who identify themselves as Radiant, claim to have stolen more than 8,000 records and have already published samples on dark-web forums. They have also threatened to release more material and have reportedly contacted parents directly to apply pressure.

The National Cyber Security Centre condemned the targeting of childcare providers, describing the intrusion as particularly egregious. The Metropolitan Police are actively investigating the matter. Kido has indicated that a third-party system has been compromised; however, early speculation linking this issue to the nursery software provider Famly has been refuted by its chief executive. This situation highlights a broader challenge: educational providers are significantly dependent on a diverse range of software platforms for billing, record-keeping, communication, and image sharing. When one link in that chain fails, the fallout cascades across an entire community.

Radiant’s tactics are a departure from conventional ransomware playbooks. Rather than focusing on system lockouts, the group has weaponised the sensitivity of the data itself. By urging parents to sue and hinting at further disclosures, they are exploiting the psychological weight of safeguarding responsibilities. This shifts the dynamic for education providers and their suppliers. It is no longer only about system availability or financial extortion. It is about the lasting exposure of children’s personal information.

Immediate fallout and systemic ramifications

The immediate impact on a nursery group or school struck by such an attack is twofold. First comes the operational scramble: liaising with law enforcement, isolating affected systems, and answering questions from anxious families. Then comes the safeguarding crisis. The release of photographs, medical notes or incident logs transforms a data breach into a potential child-safety risk. Once such information is online, it cannot be recalled, and it can be misused for harassment, stalking or targeted fraud for years.

Reputational damage compounds the harm. Even when a third-party supplier is at fault, parents and regulators hold the institution responsible. The narrative forms quickly, often before facts are established. In a sector where trust is the bedrock of enrolment and inspection outcomes, that reputational blow can linger long after the breach itself has been contained.

The regulatory dimension is precise. Under UK GDPR, organisations must notify the Information Commissioner’s Office within 72 hours if personal data is compromised. Where the risk to individuals is high, families must also be informed without delay. Education providers hold particularly sensitive categories of data, from safeguarding notes to medical records, which attract heightened scrutiny. In practice, this means nurseries, schools and their suppliers are expected to demonstrate not just technical security but governance, risk assessment and data minimisation.

Sector standards are already in place. The Department for Education has set cybersecurity requirements for schools and colleges, and the NCSC provides free protective services such as filtering and incident guidance. Where organisations fail to meet these baselines, they will struggle to explain themselves to regulators, insurers and parents. The Kido case is a reminder that compliance is not optional paperwork. It is a frontline defence against both legal sanction and reputational collapse.

Attackers have also shifted tactics to increase pressure. Reports suggest Radiant contacted parents directly. That escalation puts institutions in the position of managing not just their own communications but the emotions and anxieties of hundreds of families simultaneously. For education leaders, this raises the bar for incident preparedness. It is no longer sufficient to have a backup plan. Clear parent communication scripts, law enforcement reporting channels, and evidence handling protocols are all essential.

 

The precedent and the long-term risk picture

Cyber attacks on education are not new, but the deliberate targeting of nursery children’s data is a line few expected to see crossed. It sets a precedent that others may now exploit. The psychological leverage of threatening children’s safety is obvious, and if Radiant achieves notoriety or financial reward, copycats are likely.

The long-term risks extend beyond immediate identity theft. Children cannot monitor credit reports or defend their digital footprints. Images and notes leaked today could resurface years later in criminal repositories or be repurposed for social engineering. This makes questions about data retention and deletion more urgent. Providers need to ask why images are stored indefinitely, whether notes are encrypted, and how long records are vital.

The supply chain is the critical fault line. Early years providers and schools often run lean operations and rely on external vendors for administration, safeguarding, payments and parent engagement. Contracts and privacy policies offer little protection once attackers breach a supplier’s environment. Insurers and regulators will expect proof of vendor due diligence: how platforms are selected, whether data is segregated across tenants, how encryption is enforced, and whether access is tightly controlled. Where suppliers cannot demonstrate strong controls, operators may need to scale back the data they entrust to those platforms.

The regulatory response is predictable. The ICO will examine the timeliness of reporting, the adequacy of technical and organisational measures, and the decision-making around data minimisation. Ofsted and governing bodies will probe safeguarding oversight and leadership accountability. Even where fines are avoided, undertakings and audits may follow, tying up management attention for months.

Recovery remains a weak point across the education sector. Government figures show more institutions are struggling to restore systems quickly after incidents compared with last year, suggesting resilience gaps. Insurance carriers are also sharpening their stance, with closer scrutiny of staff training, access management, and backup integrity before policies will pay out.

For UK education, the Kido breach is more than a cautionary tale. It demonstrates that attackers are prepared to weaponise the youngest and most vulnerable to maximise leverage. It shows that third-party risk is the soft seam that adversaries will probe. It underlines that regulators, insurers, and parents all expect higher standards than many providers currently meet. The incident sets a precedent: from now on, every nursery, school, and education supplier must assume that children’s data is a target and act accordingly.

Speak to an expert on supply chain risk.

 
 Sources