Two teenagers have been arrested in connection with a targeted ransomware incident that compromised the sensitive personal information of thousands of young children and their families. The Kido International cyberattack, which was disclosed in September 2025, marks a sobering reminder of the vulnerabilities inherent in the digital infrastructure of early-years education providers.
Kido International, a multinational provider operating nurseries across Greater London and in various international locations, became the center of a significant data breach that exposed the private details of approximately 8,000 children and staff members. The breach has drawn international attention, not only for its scale but for the extreme sensitivity of the data compromised, which included photographs and home addresses of minors.
The incident has prompted a response from the United Kingdom’s National Cyber Security Centre (NCSC), which issued guidance following the attack. This breach highlights a growing trend of cybercriminals targeting educational institutions that may lack the robust internal security capacities of larger corporate entities.
Scope of the Data Breach and Safeguarding Risks
The nature of the stolen data has raised acute safeguarding concerns. According to reports, a criminal group claimed to have accessed and leaked personal data relating to about 8,000 children and staff. The compromised information was not limited to administrative records. it included highly personal identifiers such as children’s names, photographs, dates of birth and home addresses, as well as parental contact details via Wikipedia.
To prove the validity of their theft, the attackers posted sample profiles of ten children on a dark web leak site. This tactic is common in ransomware attacks to pressure victims into paying a ransom, but in this instance, the use of children’s images added a layer of severity that drew widespread condemnation in the United Kingdom and internationally.
The breach also targeted staff data, which the attackers reportedly intended for potential publication. The exposure of home addresses and contact information for both staff and parents creates long-term privacy risks and potential safety vulnerabilities for the families involved.
The Role of Third-Party Platforms in Educational Vulnerability
Initial investigations indicate that the breach did not originate within Kido International’s primary internal systems, but rather through a third-party digital platform. This platform was specifically used to store and share children’s photographs and developmental information with parents, a common practice in modern early-years education to maintain parent-teacher engagement.
This point of failure underscores a critical weakness in the education sector’s digital supply chain. Cybersecurity research has previously identified early-years education providers as being particularly susceptible to cyberattacks. This vulnerability is attributed to three primary factors:
- Reliance on Cloud-Based Tools: The heavy use of third-party cloud communication tools to share media and updates.
- Fragmented Digital Infrastructure: A lack of unified security standards across different platforms and providers.
- Limited Internal Security Capacity: Many nurseries operate with limited IT budgets and lack dedicated cybersecurity personnel to audit third-party vendors.
Legal Consequences and Regulatory Response
The investigation into the Kido International cyberattack led to the arrest of two teenagers. Although the ages of the perpetrators may surprise some, it reflects a broader trend of “script kiddies” or young, technically proficient individuals utilizing available ransomware tools to target organizations with perceived security gaps.

In the wake of the attack, the UK’s National Cyber Security Centre (NCSC) stepped in to provide guidance to other education providers. The NCSC’s involvement emphasizes the require for nurseries and schools to treat their digital platforms with the same level of safeguarding scrutiny they apply to their physical premises.
Key Takeaways from the Incident
- Target: Kido International, a multinational nursery provider.
- Impact: Data of ~8,000 children and staff leaked, including photos and home addresses via Wikipedia.
- Vector: A third-party digital platform used for sharing developmental information.
- Outcome: Two teenagers arrested; NCSC issued sector-wide guidance.
- Risk Factor: Early-years providers are vulnerable due to fragmented infrastructure and reliance on cloud tools.
The Kido International case serves as a pivotal example of why data protection for minors must be prioritized. When the data involved includes the photographs and home addresses of children, a cyberattack ceases to be a mere financial or operational hurdle and becomes a serious safeguarding crisis.
The next confirmed checkpoint in this matter will be the legal proceedings following the arrest of the two teenagers, as authorities determine the extent of their involvement and the potential for further data recovery.
We invite our readers to share their thoughts on how educational institutions can better protect children’s data in the comments below.