A 16-Year-Old Took Down Every School in Northern Ireland. Now What?
When the C2K cyber attack hit Northern Ireland’s school network at the start of April, the assumption from most people I spoke to was that it was a ransomware gang. That’s the usual profile for attacks on education: organised criminal groups targeting under-resourced institutions that are likely to pay up. The NCSC has warned about it repeatedly.
It wasn’t a criminal gang. The PSNI announced on Tuesday that a 16-year-old boy had been arrested in Portadown, County Armagh, in connection with the attack. He was arrested under Sections 1, 2, and 3A of the Computer Misuse Act 1990, which cover unauthorised access, intent to commit further offences, and unauthorised acts that impair computer operation.

A single teenager, apparently acting alone, disrupted the IT systems used by over 300,000 pupils and 20,000 teachers across every school in Northern Ireland, weeks before GCSE and A-Level exams. The Education Authority has now confirmed that some personal data was compromised.
The threat isn’t always external
Schools spend most of their cybersecurity thinking on external threats: phishing emails, ransomware, brute-force attacks from outside the network. That’s reasonable. Those threats are real, and I’ve written about them recently. But the C2K arrest should force a more uncomfortable conversation.
The person who brought down Northern Ireland’s entire school network was, by all indications, a student. Someone who likely had legitimate access to part of the system already. Someone who understood how the network worked because they used it every day.
This isn’t a new pattern. Schools have always had technically capable pupils who push boundaries. Most of them are just curious. Some find vulnerabilities and quietly tell a teacher. A very small number do real damage. The difference now is that school IT systems are so interconnected that a single point of compromise can cascade across an entire region.
Why students are a unique security challenge
External attackers need to find a way in. Students are already inside.
They have accounts on the network. They know the workflows, the platforms, and often the quirks of how the system is configured. In many schools, they’ve watched teachers type passwords, seen shared credentials on whiteboards, or discovered that the Wi-Fi password hasn’t changed in three years.
The 16-year-old arrested in Portadown didn’t need to buy credentials on a dark web marketplace or craft a sophisticated phishing campaign. He had proximity, time, and knowledge of the environment. That’s a fundamentally different threat model from the external ransomware attacks that dominate the headlines.
This doesn’t mean schools should treat every student as a potential attacker. That would be absurd and counterproductive. But it does mean that security architectures designed entirely around keeping outsiders out are incomplete.
What schools should be doing differently
I covered the broader lessons from the C2K outage in my original post: offline backups, independent communication channels, incident response planning. Those still apply. But the student angle raises some additional points.
Network segmentation matters. If a student account can be used to reach administrative systems, the network is flat and the risk is high. Student traffic should be on a separate VLAN from staff systems, management platforms, and anything with access to sensitive data. This is basic network hygiene, but plenty of schools still run everything on a single flat network because it’s simpler to manage.
Privilege escalation monitoring. When a student account starts doing things that student accounts don’t normally do (accessing admin interfaces, running scripts, querying directories), that should trigger an alert. Many schools don’t have the monitoring in place to detect this. If your school uses Microsoft 365, Entra ID (formerly Azure AD) has conditional access policies and sign-in risk detection that can flag unusual behaviour. It’s included in many education licences but often isn’t configured.
Account hygiene is non-negotiable. Shared passwords, generic accounts, staff credentials left on sticky notes: all of these are escalation opportunities. Every user should have an individual account with appropriate permissions. MFA should be enabled on every staff and admin account. Student accounts should have the minimum permissions needed for their work and nothing more.
Regular access reviews. When pupils leave, do their accounts get disabled promptly? When a student moves year groups, do their permissions update? Stale accounts with elevated permissions are an open door. This is boring, repetitive administrative work, which is exactly why it doesn’t get done consistently.
Take technical curiosity seriously, in both directions. A student who reports a vulnerability should be thanked, not punished. A school that creates a safe channel for responsible disclosure (even informally) is more likely to hear about problems before someone exploits them. Equally, a student who is probing network boundaries needs early intervention from someone who understands both the technical and pastoral implications.
The capability gap is closing
Ten years ago, taking down a regional school network would have required skills that most teenagers simply didn’t have. That’s no longer true. Open-source security tools, YouTube tutorials, online communities, and AI assistants have dramatically lowered the bar. A motivated 16-year-old with an internet connection has access to the same reconnaissance and exploitation tools that professional penetration testers use.
This isn’t an argument against teaching computing or making technical resources available to young people. The overwhelming majority of technically curious students will use those skills constructively, and many of them will go on to careers in cybersecurity where those skills are desperately needed. But it does mean that the assumption of “our students wouldn’t know how to do that” is outdated. Some of them absolutely would, and the C2K case proves that at least one of them did.
Schools can’t afford to think small on this
The C2K attack has confirmed something that security professionals have been saying for years: the insider threat is real, even in education. The fact that it was a student, not a disgruntled employee or a criminal gang, should prompt a rethink of how schools model their risks.
This isn’t about installing more firewalls or buying expensive monitoring software. It’s about assuming that someone on your network might already be looking for weaknesses, and building your systems so that finding one doesn’t give them the keys to everything. Segment your networks. Monitor for anomalies. Review permissions regularly. And create a culture where security is everyone’s responsibility, including the students who use the system every day.
Northern Ireland’s schools are still recovering. The rest of the UK should be learning from what happened, before it happens closer to home.