The British Library Gets Back Online

The UK's biggest library faced a massive cyber attack that took the entire collection offline, but the British Library is now back online with its main catalogue which contains 36m records of printed and rare books, maps, journals and music scores.

The restart took 11 weeks since the cripping cyber attack when a ransomware group took down its website and online catalog. But, access is currently reduced to “read-only” formats, and the full recovery of services could take until the end of 2024

“Full recovery of all our services will be a gradual process,” Sir Roly Keating, the library’s chief executive, said in a recent blog. “When the catalogue returns it won’t be in quite the form that long-standing users will be familiar with. Most notably it will be 'read-only', so although you will be able to search for items as before, the process for checking availability and ordering them for to use in the Reading Rooms will be different,” says Keating.

Rhysida, a known ransomware group, claimed responsibility for the attack at the end of October. In November, the library confirmed some employee data had been stolen in the attack and was being sold on the Dark Web. The library’s main catalogue has not been accessible since the ransom attack.

The ransom demanded to restore services was 20 Bitcoins, equivalent to aroung £600,000 / $750,000, which the Libaray refused to pay, whereas the cost of rebuiding systems to restore services is estimated at ten times that amount. 

The restoration online of the main catalogue will allow users to search for items, but the process of checking availability and ordering items for use in the library’s reading rooms will be different. At the time of tye attack the Libraray was embarking on a major investment in its core technology infrastructure. “That work will now be accelerated, to ensure that what emerges from this unwanted attack is a strengthened British Library that is as ready as it can possibly be to confront whatever future threats emerge from the constantly evolving world of cyber crime”, says Keating

Readers will also regain access to most of the library’s key special collections, including archives and manuscripts, but “for the time being” will need to come in person to consult offline versions of specialist catalogues, although the processes may be slower and more manual than before, f the library’s service to researchers  restores a core element of its public service.

This work will now be accelerated to ensure that the British Library’s IT infrastructure is musch stronger and able to withstand cyber threats.

British Library:   Guardian:    NYT:     Euronews:      Computer Weekly:         Infofsecurity Magazine

Image: Pixabay

You Might Also Read:

FBI & CISA  Advisory - Dealing With Ransom Attacks:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« Microsoft Is The Most Commonly Used Alias In Phishing Attacks 
Cyber Incidents Are The Biggest Risk To Business »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

DLA Piper

DLA Piper

DLA Piper is a global law firm with offices throughout the Americas, Asia Pacific, Europe and the Middle East. Practice areas include Cybersecurity.

Telecom Information Sharing and Analysis Center Japan (T-ISAC Japan)

Telecom Information Sharing and Analysis Center Japan (T-ISAC Japan)

T-ISAC Japan coordinates information sharing and activities related to ISP/telecommunications network security in Japan.

Cienaga Systems

Cienaga Systems

Cienaga Systems is a leader in autonomous cyber threat hunting technology.

Oneconsult

Oneconsult

Oneconsult provides cyber security services focusing on penetration tests / ethical hacking, ISO 27001 security audits and incident response & IT forensics.

Zerocopter

Zerocopter

Zerocopter enables you to confidently leverage the skills of the world's most knowledgable ethical hackers to secure your applications.

Dreamlab Technologies

Dreamlab Technologies

Over the last 20 years, Dreamlab Technologies has established itself as a source of constant innovation within the information security landscape.

Malleum

Malleum

MALLEUM are specialists in penetration testing and security assessments. We think like hackers – and act like them – to disclose discreet dangers to your organization.

Cyber Police of Ukraine

Cyber Police of Ukraine

Cyber Police of Ukraine is a law enforcement agency within the the Ministry of Internal Affairs of Ukraine dedicated to combating cyber crime.

DCX Technology

DCX Technology

Recognized as a leader in security services, DXC Technology help clients prevent potential attack pathways, reduce cyber risk and improve threat detection and incident response.

Port53 Technologies

Port53 Technologies

Port53 Technologies is focused on delivering enterprise-grade, cloud-delivered security solutions that are easy to deploy, simple to manage and extremely effective.

Siemens

Siemens

Siemens Industrial Security Services provide solutions for cybersecurity in automation environments based on the recommendations of the international standard IEC 62443.

Finnish Security & Intelligence Service (SUPO)

Finnish Security & Intelligence Service (SUPO)

The Finnish Security and Intelligence Service is a government agency tasked with combating serious threats to national security in Finland.

Maritime Cyber Threats Research Group - University of Plymouth

Maritime Cyber Threats Research Group - University of Plymouth

The Maritime Cyber Threats research group of the University of Plymouth is focused on investigating marine cyber threats and researching solutions.

Entech

Entech

Entech is a managed IT service provider. We work behind the scenes on your network to ensure data security and integrity.

Flotek

Flotek

Flotek is an IT & Comms service provider delivering SMEs with trusted, innovative and cost effective cloud technology, with confidence, clarity and clout.

Inveo Group

Inveo Group

Inveo group is the Italian leader for the management of privacy and data protection issues.