Rome’s Academic Giant Paralyzed: Sapienza Remains Offline Amid Cyberattack Fallout
Subtitle: One week after a major cyberattack, Italy’s largest university is still struggling to restore digital services - raising urgent questions about transparency and security.
At the heart of Rome, Sapienza University - Europe’s largest academic institution - remains digitally crippled. A week has passed since a cyberattack took down its website and core student services. Yet, as students and staff scramble to adapt, the silence from university leadership is breeding frustration and anxiety. What happened behind those locked digital gates, and why is the recovery so slow?
Fast Facts
- Sapienza University’s main website and student portal, Infostud, have been offline for over a week.
- The university confirmed restoration of its Identity Management system but access remains limited to uncompromised devices.
- Calls for greater transparency about the scope of the data breach and ongoing risks have intensified.
- Other major Roman universities, including Roma Tre and Pontificia Salesiana, have also suffered cyber incidents in the past year.
Inside the Digital Blackout
For students, researchers, and faculty, the attack’s timing couldn’t have been worse. As exams and administrative deadlines loom, Sapienza’s core digital infrastructure is eerily silent. The university’s last update, issued via email and Facebook, announced only the partial restoration of its Identity Management (IdM) system - a critical gateway for secure access to internal services.
But there’s a catch. Only desktop PCs and laptops cleared of any trace of compromised files are permitted to reconnect. Devices that were powered off during the attack or not managed by the university’s Desktop Management system are considered safe - for now. Personal mobile devices are allowed, but only on private connections. The university’s WiFi remains off-limits for most.
Meanwhile, essential cloud services like Office 365 and IRIS remain accessible via direct web links, as they are not tied to the compromised authentication system. Still, the bulk of academic and administrative work remains in limbo.
Transparency in Question
The university community’s patience is wearing thin. With little information about the scale of the breach or whether personal data has been stolen, both students and staff are demanding answers. Multiple appeals for transparency have circulated, urging Sapienza to clarify what risks remain and how the incident is being managed.
Behind the scenes, an emergency meeting is reportedly underway to determine next steps. But the lack of regular, detailed updates has left many to wonder: is the university’s digital backbone fundamentally at risk?
A Broader Pattern
Sapienza’s ordeal is not an isolated event. Throughout 2025, Rome’s academic sector has become a prime target for cybercriminals. Both Roma Tre and the Pontifical Salesian University have suffered similar attacks, suggesting a wider vulnerability in the capital’s higher education network. The incidents raise urgent questions about preparedness, incident response, and the protection of sensitive academic data.
Conclusion
The drawn-out recovery at Sapienza is more than a technical headache - it’s a wake-up call for Italy’s universities. As cyberattacks escalate in frequency and sophistication, transparency, preparedness, and swift communication are no longer optional. For Sapienza’s tens of thousands of students and staff, the digital blackout is a stark reminder: in the age of cybercrime, academic institutions must treat cybersecurity as mission-critical.
WIKICROOK
- Identity Management (IdM): Identity management (IdM) manages user identities and access, ensuring only authorized users can access digital resources within an organization.
- Compromised Device: A compromised device is a computer or gadget that cyberattackers have infiltrated or altered, often used to steal data or launch further attacks.
- Cloud Services: Cloud services are online platforms for storing and processing data, often targeted by attackers seeking to hide activities or steal information.
- Desktop Management: Desktop management uses tools and processes to secure, monitor, and maintain computers in an organization, reducing risks and improving efficiency.
- Authentication System: An authentication system verifies a user's identity online, ensuring only authorized individuals can access protected digital resources or services.