Update, 8:40 p.m.: The university will be open on Thursday, but Thursday is a study day with no scheduled classes, according to a notice from APSU. Employees are expected to report to work if they are traditionally scheduled to work on campus on Thursday.
Computer labs will not be open, and employees are asked to not use work computers on campus or at home.
Students still have access to their meal plans, and payroll has already been processed, so employees will be paid on time this week
Students can access their D2L classes by visiting elearn.apsu.edu. No apps need to be deleted from phones, such as the Avaya Cloud, email or Zoom. Information Technology continues to work through this process, and the university will provide updates when this situation is resolved, according to the notice.
Update, 4:30 p.m.: The university’s Information Technology staff are investigating the ransomware attack, and they believe they have contained the threat, according to APSU spokesman Bill Persinger.
There are no plans to alter university schedules at this time, as today was the last day of classes, he said. Tomorrow is a study day, with exams starting Friday.
Previously:
CLARKSVILLE, TN (CLARKSVILLE NOW) – Austin Peay State University was hit with a ransomware attack Wednesday afternoon, forcing an alert that all university-connected computers be shut down.
The administration and APSU Police sent out alerts by email to all students faculty and staff, saying, “APSU ALERT: We are under a Ransomeware (sic) attack. If your computer is connected to the APSU network, please disconnect IMMEDIATELY.”
The alerts then clarified that all computers should be shut down.
“APSU ALERT: Ransom ware attack. THIS IS NOT A TEST. SHUT DOWN ALL COMPUTERS NOW!”
The alerts were also sent out by Twitter.
APSU ALERT: Ransom ware attack. THIS IS NOT A TEST. SHUT DOWN ALL COMPUTERS NOW!
— Austin Peay State University (@austinpeay) April 27, 2022
Ransomware is invasive software designed to block access to a computer system until a sum of money is paid. It can be unleased in a system through junk email, infected flash drives or infected computers.
This article will be updated.