3.142
Striker
Sounds like a guess to meIt depends on the controls in place but with the right governance and controls in place then storing data electronically should be safer.
Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
Sounds like a guess to meIt depends on the controls in place but with the right governance and controls in place then storing data electronically should be safer.
Are you aware of any details of how it was breached? I've not seen any of that yet.The fallout continues. The library is likely to spend 40% of its reserves repairing the damage. Still no estimate for how long it'll take to get things back to normal.
(Typical that when it comes to royalties, the media highlight millionaire celebrity authors, not those for whom the annual payments are absolutely vital.)
Ransomware cyber attack on British Library ‘set to cost £7m’
National Cyber Security Centre and Metropolitan Police support investigationwww.standard.co.uk
Richard Osman among authors missing royalties amid ongoing cyber-attack on British Library
Writers’ much-needed ‘annual windfall’ of up to £6,600 delayed as library in London struggles to restore crippled systemswww.theguardian.com
To be fair the article emphasises the people really impacted by this and using a famous author's name will draw more attention to it than Wendy Erskine's.The fallout continues. The library is likely to spend 40% of its reserves repairing the damage. Still no estimate for how long it'll take to get things back to normal.
(Typical that when it comes to royalties, the media highlight millionaire celebrity authors, not those for whom the annual payments are absolutely vital.)
Ransomware cyber attack on British Library ‘set to cost £7m’
National Cyber Security Centre and Metropolitan Police support investigationwww.standard.co.uk
Richard Osman among authors missing royalties amid ongoing cyber-attack on British Library
Writers’ much-needed ‘annual windfall’ of up to £6,600 delayed as library in London struggles to restore crippled systemswww.theguardian.com
Are you aware of any details of how it was breached? I've not seen any of that yet.
Doesn't give any technical details. I'll do a bit of digging.The Chief Executive put out a statement in December, though the attack took place in October. I presume, because it was ransomware, they were advised not to make too much fuss at the time. They didn't pay the ransom by the deadline, and now a lot of the data is being released on the 'dark web'.
Loading…
blogs.bl.uk
Ethos is the first place I looked. Mine's gone, meaning the world has been done a favour (services to humanity, save it from boredom).EThOS still lost...half a million doctoral thesis titles, and many full text versions of the theses themselves. About 98% of all PhDs ever awarded in the UK in there, and a valuable research source.
In some cases soft targets and a lot of it is high value targets. Things like the British Library and universities have a high value both in terms of research capability and also some of the research data and innovations they hold. Along with that, like councils, they are a major embarrassment to the sitting government to lose one for a while. Many attacks appear to be state sponsored and designed for a destabilising effect.Redcar Council reckons it cost them over £11 million to recover from their ransomware attack. They didn't pay the ransom but were initially told to keep quiet by central government. Are these public sector institutions viewed as softer targets by cyber criminals?
Doesn't give any technical details. I'll do a bit of digging.
Good that they didn't pay. Essentially if you pay you are funding cyber crime against more victims.
Good.They had no choice about the ransom - they're forbidden from paying one as they're an 'arms-length body' governed by the DCMS.
My wife's team were phished and almost all of them fell for it. Her boss had to send an email to ask people to stop clicking on it. Genius stuff.The British Library have published a detailed report of their cyber attack.
Looking at the point of view of the technology and the management side, my summary is. It looks like a failing of stretched technology teams, management and insufficient funding to maintain all the systems they were running. I suspect it started with a single compromised account which then led to access to a remote desktop service, without multifactor authentication configured. It would not surprise me if the initial compromised account was done so via a phishing email.
Report at https://www.bl.uk/home/british-library-cyber-incident-review-8-march-2024.pdf
- They were unable to restore some systems as they were out of support.
- This highlights the importance of keeping everything at a supportable level.
- This was the major reason for the length of the recovery.
- It looks like a program of work was underway to replace these systems, but progress had been slowed due to resourcing issues, both funds and staffing.
- "The Technology department was overstretched before the incident"
- They called their recovery phase Rebuild & Renew because so many systems needed redeveloping. They had a recruitment surge to support this.
- Attackers had gained access 3 days prior to the ransomware payload being deployed. Once inside they took around 3 minutes to gain lateral movement to other systems.
- The event was detected the next day, but the team incorrectly thought there was no malicious activity.
- It was believed the entry point was a remote desktop type application. Accounts were not protected by multifactor authentication. This had been set up to facilitate remote working during Covid-19.
- Copying personal and sensitive data was a primary goal, with 440Gb of data being downloaded early on the morning of the main attack.
- Servers were then encrypted to create maximum disruption and to cover traces of the attack methods
- The website was down, limiting communications. Social media, email and WhatsApp (cascading down) was used to keep staff informed.
- Trade Unions were used to give advice to affected staff.
Sorry some of the formatting has gone a bit odd there
We get phishing email sent all the time from the security team..My wife's team were phished and almost all of them fell for it. Her boss had to send an email to ask people to stop clicking on it. Genius stuff.
I worked for a company and we had a public sector client and we ran their IT. We wanted to do some phising testing to check vulnerability and look how secure. Anyway iirc they wouldnt let us. HR concerns about making judgements on employees. Seemed crazy to me.We get phishing email sent all the time from the security team..
Some are getting better and better. I've fallen for one . You have to sit a ten minute course
Ones that get people is if it's about renumeration.. people get blinded by $$#
Yeah same. Blindingly obvious most times.We get phishing email sent all the time from the security team..
Some are getting better and better. I've fallen for one . You have to sit a ten minute course
Ones that get people is if it's about renumeration.. people get blinded by $$#
So they didn’t want people to have an insight into the competence of their employees?I worked for a company and we had a public sector client and we ran their IT. We wanted to do some phising testing to check vulnerability and look how secure. Anyway iirc they wouldnt let us. HR concerns about making judgements on employees. Seemed crazy to me.
Nope. HR or unions too concerned about how that data might be used against employees. Like I say, seemed crazy to me.So they didn’t want people to have an insight into the competence of their employees?