Features 26.09.2024
AI Autopsy: The Long Road to Recovery for the British Library
The British Library has shared a detailed report of the 2023 cyber incident and its aftermath. Assured Intelligence picks out the highlights for our autopsy report
Features 26.09.2024
The British Library has shared a detailed report of the 2023 cyber incident and its aftermath. Assured Intelligence picks out the highlights for our autopsy report
In October 2023, the British Library suffered a double extortion ransomware attack which knocked out much of its server estate and led to the theft of 600GB of internal data. As of March 2024, the government-sponsored public body had spent £1.6m recovering from the breach. The incident severely impacted the institution’s custodianship and research “purposes” – eroding value and reputation.
Yet out of crisis can come opportunity. The British Library, with a collection of over 25 million books, is the world’s most extensive library. It has decided to share a detailed cyber incident report in its aftermath. This 18-page document is a cautionary tale that offers CISOs plenty of food for thought.
It’s still not 100% certain how the Rhysida ransomware affiliate gained initial access to the library’s IT network. The institution has evidence of unauthorised access on October 25 2023, and believes that the “most likely source” of the attack is the compromise of privileged account credentials. That means most likely either a phishing or brute-force attack. An extensive ecosystem of partners and suppliers makes this more likely.
“The server, although protected by firewalls and anti-virus software, crucially didn’t have multi-factor authentication (MFA) enabled”
“The library utilises numerous trusted partners for software development, IT maintenance, and other forms of consultancy, and whose staff have a variety of levels of access to our network or infrastructure dependent on their contract with us and the level of supervision or vetting that is undertaken,” the report reveals.
The library’s best guess is that this enabled access to an on-premises “terminal server” which, although protected by firewalls and anti-virus software, crucially didn’t have multi-factor authentication (MFA) enabled. The Rhysida threat actors stole around half a million digital documents from the library, including personally identifiable information (PII) on users and staff.
As the British Library laudably refused to pay a ransom, the PII was put up for sale and then dumped on the dark web. Around 60% of the data – belonging to finance, tech and people teams – was lifted wholesale from network drives. Most of the rest was obtained after the actors searched the library network via keywords such as “passport” or “confidential” – copying files from drives used by staff for personal purposes. The group also hijacked native utilities to create backup copies of 22 databases, which were subsequently exfiltrated.
However, the most damaging part of the raid, was the encryption of critical data and systems, and the destruction of some servers to disrupt system recovery and preserve the attackers’ anonymity, according to the report.
“While we have secure copies of all our digital collections, we have been hampered by the lack of viable infrastructure on which to restore it”
“While we have secure copies of all our digital collections – both born-digital and digitised content, and the metadata that describes it – we have been hampered by the lack of viable infrastructure on which to restore it,” it explains. “The re-build of our infrastructure, on equipment approved and purchased before the attack, has been under way since December 2023 and remains ongoing.”
Another major hurdle to recovery is that the library’s “major software systems” – including those which catalogue and ingest “non-print legal deposit” (NPLD) material, and inter-library loans – can’t simply be restored in their current form. That’s because they’re no longer supported or won’t work with this new infrastructure.
Following an initial crisis management phase, in which the library’s gold and silver crisis response teams leapt into action, leadership began a transition from response to recovery. Its ‘Rebuild and Renew’ programme features a six-month phase to “identify and implement interim solutions to restore services, internal processes and partnerships”. This is to be followed by an 18-month renew phase, designed to create new infrastructure through upgrades, adaptations and new technology.
The silver and gold crisis response teams briefly superseded normal management structures during the crisis phase – handling all technical responses, workarounds, expenditure, and internal/external comms. Importantly, they also recorded “practical operational-level lessons” about their disaster management efforts, which will help to improve future processes.
The report’s main value for readers is in sharing the early lessons learned from the incident. They largely revolve around new technology, risk management processes, staffing and incident response.
1: Revamp technology
The report highlights that the library must:
2: Revisit risk management
The library also acknowledges that it must enhance intrusion response processes, so that in-depth security reviews are commissioned after even the smallest sign of network intrusion. That’s because it’s easy for an attacker to hide in plain sight and achieve persistence after gaining initial access.
All cyber risk should also be flagged to senior management to ensure it is able to benefit from a holistic view, the library claims. Low-level risks might fly under the radar separately but could combine to indicate something more serious. Finally, business continuity plans should be run for individual systems/services and a mass outage of all systems.
Meeting minimum cybersecurity standards and regularly reviewing and auditing policies and processes is also essential for managing risk effectively. The library admits it fell out of compliance with Cyber Essentials Plus in 2022, due to legacy systems.
3: Get incident response right
The library warns that recovery must be prioritised alongside security. “Given that no security is perfect, the ability to quickly recover is essential when (not if) an attack is successful. Investment in security needs to be balanced against investment in back-up and recovery capabilities,” the report notes.
Having external security expertise on retainer is essential in this regard; accelerating incident response, boosting resilience and improving the depth of analysis in the early stages of an attack.
4: Don’t forget your people
Motivated security-aware employees are the final piece in the puzzle, according to the British Library report. That’s why the library recommends:
The British Library suffered one of the worst ransomware breaches in recent memory for a combination of reasons, and there’s no single silver bullet solution that would have kept it safe. From a high-level perspective, however, some common problems emerge.
The library’s on-premises infrastructure was far worse affected than its cloud systems, especially in the context of Rhysida’s destructive efforts. Its core, cloud-based email, finance, HR and payroll systems were undamaged, for example.
“The library admits it fell out of compliance with Cyber Essentials Plus in 2022”
The library’s technology department was also overstretched in the run-up to the incident, and there are concerns that skills shortages may create additional risk as the institutions looks to migrate to next-gen systems. Developing a security-by-design culture has so far proven elusive.
Ultimately, no organisation has unlimited resources, so understanding where to focus efforts first is key – which is where system visibility is important.
“Although the security measures we had in place on October 28 2023 were extensive and had been accredited and stress-tested, with the benefit of hindsight there is much we wish we had understood better or had prioritised differently,” the report concludes.
Hopefully, the insight it offers will help CISOs better develop their own risk management and incident response strategies, to avoid a similar fate.