The British Library Gets Back Online

The UK's biggest library faced a massive cyber attack that took the entire collection offline, but the British Library is now back online with its main catalogue which contains 36m records of printed and rare books, maps, journals and music scores.

The restart took 11 weeks since the cripping cyber attack when a ransomware group took down its website and online catalog. But, access is currently reduced to “read-only” formats, and the full recovery of services could take until the end of 2024

“Full recovery of all our services will be a gradual process,” Sir Roly Keating, the library’s chief executive, said in a recent blog. “When the catalogue returns it won’t be in quite the form that long-standing users will be familiar with. Most notably it will be 'read-only', so although you will be able to search for items as before, the process for checking availability and ordering them for to use in the Reading Rooms will be different,” says Keating.

Rhysida, a known ransomware group, claimed responsibility for the attack at the end of October. In November, the library confirmed some employee data had been stolen in the attack and was being sold on the Dark Web. The library’s main catalogue has not been accessible since the ransom attack.

The ransom demanded to restore services was 20 Bitcoins, equivalent to aroung £600,000 / $750,000, which the Libaray refused to pay, whereas the cost of rebuiding systems to restore services is estimated at ten times that amount. 

The restoration online of the main catalogue will allow users to search for items, but the process of checking availability and ordering items for use in the library’s reading rooms will be different. At the time of tye attack the Libraray was embarking on a major investment in its core technology infrastructure. “That work will now be accelerated, to ensure that what emerges from this unwanted attack is a strengthened British Library that is as ready as it can possibly be to confront whatever future threats emerge from the constantly evolving world of cyber crime”, says Keating

Readers will also regain access to most of the library’s key special collections, including archives and manuscripts, but “for the time being” will need to come in person to consult offline versions of specialist catalogues, although the processes may be slower and more manual than before, f the library’s service to researchers  restores a core element of its public service.

This work will now be accelerated to ensure that the British Library’s IT infrastructure is musch stronger and able to withstand cyber threats.

British Library:   Guardian:    NYT:     Euronews:      Computer Weekly:         Infofsecurity Magazine

Image: Pixabay

You Might Also Read:

FBI & CISA  Advisory - Dealing With Ransom Attacks:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« Microsoft Is The Most Commonly Used Alias In Phishing Attacks 
Cyber Incidents Are The Biggest Risk To Business »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Cyber Technology Institute - De Montfort University

Cyber Technology Institute - De Montfort University

The Cyber Technology Institute provides training and high quality research and consultancy services in the fields of cyber security, software engineering and digital forensics.

Global Information Assurance Certification (GIAC)

Global Information Assurance Certification (GIAC)

GIAC provides certification in the knowledge and skills necessary for a practitioner in key areas of computer, information and software security.

Trusted Knight

Trusted Knight

Trusted Knight is a leading provider of security software solutions focused on defeating newly developed malware and crimeware trojans.

H3C Group

H3C Group

H3C provides a full range of Computer, Storage, Networking and Security solutions.

Red Snapper Recruitment

Red Snapper Recruitment

Red Snapper Recruitment is a market leading staffing services provider to the law enforcement, cyber security, offender supervision and regulatory services markets.

Prolimax

Prolimax

Prolimax deliver innovative solutions to IT Manufacturers, Distributors, Resellers and End-users including Data Erasure and secure IT Asset Disposition (ITAD)

SpyCloud

SpyCloud

SpyCloud is a leader in account takeover (ATO) prevention, protecting billions of consumer and employee accounts either directly or through product integrations.

BotGuard

BotGuard

BotGuard provides a service to protect your website from malicious bots, crawlers, scrapers, and hacker attacks.

DeFY Security

DeFY Security

DeFY Security is a Cyber Security solutions provider with more than 20 years of experience securing financial institutions, healthcare, manufacturing and retail.

NightDragon

NightDragon

NightDragon is a venture capital firm investing in innovative growth and late stage companies within the cybersecurity, safety, security, and privacy industry.

Secure Diversity

Secure Diversity

Secure Diversity is an innovative non-profit organization with leaders that think out of the box to create strategies & solutions to increase diversity in the cybersecurity industry.

Prescient Solutions

Prescient Solutions

Prescient Solutions is a managed services provider, using a cloud-based model to provide IT solutions to small, mid-sized, global organizations and government entities.

HiSolutions

HiSolutions

HiSolutions is a renowned consulting firms for IT governance, risk & compliance in Germany, combining highly specialized know-how in the field with profound process competence.

Detego Global

Detego Global

Detego Global are the creators of the Detego® Unified Digital Forensics Platform, a suite of modular tools used globally by military, law enforcement and intelligence agencies, and enterprises.

Radiance Technologies

Radiance Technologies

Radiance solutions provide technological advantage and operational superiority for our nation in the areas of intelligence, cyber and advanced weapon systems.

Harbottle & Lewis

Harbottle & Lewis

Harbottle & Lewis is a leading UK-based law firm focused on the Private Client and Technology, Media and Entertainment sectors.

CyberAntix

CyberAntix

CyberAntix offers Premium CyberSecurity for your business using an advanced Security Operations Centre technology and process platform reinforced by a steadfast and expert SOC team.