We review vendors based on rigorous testing and research but also take into account your feedback and our affiliate commission with providers. Some providers are owned by our parent company.
Learn more
vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of cybersecurity researchers, writers, and editors continues to help readers maintain their online freedom in partnership with Kape Technologies PLC, which also owns the following products: Holiday.com, ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and detailed examination by the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.
Advertising Disclosure

vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of cybersecurity researchers, writers, and editors continues to help readers maintain their online freedom in partnership with Kape Technologies PLC, which also owns the following products: Holiday.com, ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and detailed examination by the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

Hackers Breach Nursery Chain And Demand Ransom

Andrea Miliani Published on October 03, 2025 Cybersecurity Researcher

A group of hackers targeted the Kido International nursery chain and demanded a ransom last week. The attackers threatened to release private data onto the dark web.

According to the BBC, the hackers breached the nursery’s internal system and posted 10 children’s profiles on the dark web on Thursday and 10 more last Friday. The leaked data included sensitive information such as photographs, details about household members, and birth dates and locations. Stolen records also contained families’ and employees’ names, contact details, and national insurance numbers.

British authorities and the Metropolitan Police are investigating. Kido International informed parents about the breach and said that the compromised data had been stored on Famly, a software service widely used by childcare providers and nurseries.

"This malicious attack represents a truly barbaric new low, with bad actors trying to expose our youngest children's data to make a quick buck," said Anders Laustsen, Famly Boss, to the BBC. "We have conducted a thorough investigation of the incident and can confirm that there has been no breach of Famly's security or infrastructure in any way and no other customers have been affected.”

Ciaran Martin, former head of the National Cyber Security Centre, described the situation as "absolutely horrible," but urged calm as well. "The hackers are trying to stoke up fear, and the risk of physical harm to children is extremely low," said Martin to the BBC.

Some parents told the BBC they had received "threatening" calls from hackers pressuring them to urge the nursery to pay the ransom. The BBC noted that this type of call is “extremely rare.”

The hackers contacted the BBC on Monday. "We do it for money, not for anything other than money," said one of the hackers when asked about feeling guilty for their actions. "This isn't my first time, and will not be my last time." However, they admitted that the attention has been overwhelming and claimed they would not target preschools again.

In March, a dataset containing more than 47,000 records of children with special needs was exposed online after billing invoices from a company called Encore Support Services were found in an unsecured database.

About the Author

Andrea is a seasoned tech journalist with a growing passion for cybersecurity, covering cyberattacks, AI breakthroughs, and the latest trends shaping the future of technology.

Please, comment on how to improve this article. Your feedback matters!

Leave a comment

This field must contain more than 50 characters

The field content should not exceed 1000 letters

Sorry, links are not allowed in this field!

Name should contain at least 3 letters

The field content should not exceed 80 letters

Sorry, links are not allowed in this field!

Special characters are not allowed in the Name field

Please enter a valid email address