web analytics

Ransomware: lessons all companies can learn from the British Library attack – Source: www.exponential-e.com

Rate this post

Source: www.exponential-e.com – Author: Graham Cluley


Ransomware-lessons-all-companies-can-learn-from_Blog-Banne_20240322-175134_1

In October 2023, the British Library suffered “one of the worst cyber incidents in British history,” as described by Ciaran Martin, ex-CEO of the National Cyber Security Centre (NCSC). 

The notorious Rhysida ransomware gang broke into one of the world’s greatest research libraries, encrypting or destroying much of its data, and exfiltrating 600 GB of files, including personal information of British Library staff and users.

This wasn’t the type of cyber attack that can be easily glossed over. The British Library’s enormous trove of data – with over 170 million items, including 13 million printed and electronic books, plus hundreds of thousands of periodicals, microfilms, and rare manuscripts – is used by researchers around the world.

Visitors to the library – online or in-person – were left in no doubt of the scale of the problem.

Meanwhile, the Rhysida hacking group demanded a ransom of 20 Bitcoin (approximately £600,000 at the time) for decryption keys and the return of the stolen data.

The British Library, however, announced that it had chosen not to have any contact with the Rhysida gang, let alone pay the ransom:

The library has not made any payment to the criminal actors responsible for the attack, nor engaged with them in any way. Ransomware gangs contemplating future attacks such as this on publicly-funded institutions should be aware that the UK’s national policy, articulated by NCSC, is unambiguously clear that no such payments should be made.

British Library

  • Prioritise recovery alongside security: Yes, you should invest in preventative measures, but you also need to ensure that you have the capability to rapidly restore systems if an attack should happen.
  • Cyber-risk awareness and expertise at senior level: Improve cyber-risk understanding among senior leadership for strategic investment; consider putting in place a dedicated expert to sit on the board or advise it.
  • Regularly train all staff in evolving risks: Provide role-specific, up-to-date cybersecurity training for all employees.
  • Proactively manage staff and user wellbeing: Include provisions for managing staff and user wellbeing in the aftermath of an attack, some of whom may have had their data compromised or their work disrupted.
  • Review acceptable personal use of IT: Update acceptable use policies to enforce personal data security best practices. The level of intrusion into the lives of individual staff members can be exacerbated where the use of network storage is allowed for personal use.
  • Collaborate with sector peers: Share insights and threat intelligence within your sector to stay informed about common threats and best cybersecurity practices.
  • Implement Government standards, review and audit policies and processes regularly: Meet minimum cybersecurity standards and conduct frequent policy and process reviews. The British Library says it was accredited Cyber Essentials Plus from 2019 until 2022, when changes to the standard meant that it ceased to be compliant pending replacement of some of its legacy core systems. It says its new infrastructure will be built to Cyber Essentials Plus standard in recovery.

The Rhysida hacking group published the stolen data on the dark web after failing to secure the ransom of 20 bitcoin that it had demanded.

The decision as to whether ransomware-hit organisations should pay a ransom or not is a complex one.

In a perfect world, if no-one ever paid the ransom, there wouldn’t be an incentive for ransomware gangs to attack companies. Criminals would look for other ways to make their fortunes, and hacking gangs would simply determine it wasn’t worth launching ransomware attacks.

Unfortunately, the world isn’t perfect. Some organisations will feel that they have no choice but to make the painful difficult decision to pay their attackers. It’s not that paying your extortionists is a good thing to do, but it might well be the pragmatic less worse thing for a business to do if it can see no other way to continue operating.

Five months later, while its buildings have remained open, the British Library’s online systems and services remain profoundly affected. Users cannot even change the passwords they have previously used to access British Library services.

The rebuild of the British Library’s infrastructure is expected to be completed by mid-April. After that, it will begin to restore systems in a phased roll-out.

Now, in an admirable display of transparency, the British Library has published a detailed report into the cyber attack, the lessons it has learnt, and detailed the struggles it has faced renewing its complex legacy infrastructure to better secure itself into the future.



Is your company ready for a ransomware attack?

Many organisations underestimate the importance of having a robust incident response plan. But knowing how to respond, especially in those critical first 48 hours after a cyber attack, can be critical.

Do you worry your company won’t know how to recover after a cyber attack? Has your business just been hit by ransomware and you’re wondering what to do?

There’s still hope.

Don’t make the mistake of believing that your organisation will never be targeted. The right approach is to take proactive measures in advance – as it’s not a case of whether your business will suffer the likes of a ransomware attack but when.

Make sure to read Exponential-e’s step-by-step guide on ransomware remediation.

The experts at Exponential-e are holding an event at The Shangri La Hotel in The Shard, London, on the 2nd May 2024. Register your free attendance now, and learn how you can best prepare your business against the threat of a devastating cyber attack.



Stay Informed

When you subscribe to the blog, we will send you an e-mail when there are new updates on the site so you wouldn’t miss them.

About the author

Graham Cluley is an award-winning cybersecurity public speaker, podcaster, blogger, and analyst. He has been a well-known figure in the cybersecurity industry since the early 1990s when he worked as a programmer, writing the first ever version of Dr Solomon’s Anti-Virus Toolkit for Windows.

Since then he has been employed in senior roles by computer security companies such as Sophos and McAfee.

Graham Cluley has given talks about cybersecurity for some of the world’s largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats.

Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the “10 Greatest Britons in IT History” for his contribution as a leading authority in internet security.

Original Post URL: https://www.exponential-e.com/blog/ransomware-lessons-all-companies-can-learn-from-the-british-library-attack

Category & Tags: Data loss,Guest blog,Malware,Ransomware,British Library,data breach,ransomware – Data loss,Guest blog,Malware,Ransomware,British Library,data breach,ransomware

LinkedIn
Twitter
Facebook
WhatsApp
Email

advisor pick´S post

More Latest Published Posts