Ransomware is a type of malicious software that encrypts the victim's data, rendering it inaccessible until a ransom is paid. Over the years, ransomware tactics have evolved, becoming more sophisticated and damaging. Originally, ransomware attacks were more indiscriminate, targeting individuals and organizations alike. However, cybercriminals have become more strategic, now focusing on high-value targets.
Ransomware gangs have discovered that targeting CEOs can yield higher returns. By threatening to release sensitive data, they put immense pressure on CEOs to comply with their demands. This method of extortion not only threatens the individual's reputation but also jeopardizes the entire organization's security and financial stability.
Anonymity: Cybercriminals use encryption and the dark web to hide their identities, making it challenging for law enforcement agencies to trace them.
Jurisdictional Challenges: Ransomware attacks are often transnational, complicating legal processes. Different countries have varying laws and levels of cooperation with international authorities.
Sophisticated Techniques: These criminals are adept at covering their tracks, using advanced encryption, and frequently changing their digital footprints to evade detection.
Resource Limitations: Law enforcement agencies often lack the resources and specialized knowledge required to effectively tackle these sophisticated cybercrimes.
The consequences of a ransomware attack can be devastating. For CEOs, the personal and professional stakes are incredibly high. They face potential damage to their reputation, legal ramifications, and significant financial loss. For the organization, it can result in operational disruption, loss of sensitive data, and a breach of trust with customers and stakeholders.
The responsibility of the attack has been claimed by ransomware gang Rhysida. The group has listed the library as their victim over its darknet forum, where it has leaked the low resolution snippets of the stolen information. The gang is offering to auction the further information for 20 Bitcoin, or about £600,000, to the highest bidder.
As a result of the attacks, the library’s operations have been disrupted for weeks. The stolen data includes images of passport photos and HMRC employment records.
In the darknet website, the listing for the British Library reads, “With just seven days on the clock, seize the opportunity to bid on exclusive, unique and impressive data. Open your wallets and be ready to buy exclusive data.”
The aforementioned listing appeared on the website on Monday, where the group has demanded the ransom to be paid till November 27.
In regards to this, Emisoft’s threat analyst, Brett Callow says that the data “auction” was effectively a “continuation of the extortion attempt” by the gang.
The cyberattack on the British Library started in late October, where the attackers stole large chunks of the library’s website.
Staff at the archive's St Pancras location have been compelled by the disruption to disable the public Wi-Fi and only accept cash payments for some transactions.
Staff at the archive's St Pancras location have been compelled by the disruption to disable the public Wi-Fi and only accept cash payments for some transactions.
The British Library released the following statement on Monday: "We are aware that some data has been exposed, after confirmation last week that this was a ransomware attack. It looks like these are from our own HR records.”
“We have no evidence that data of our users has been compromised.”
The National Cyber Security Centre (NCSC), which is affiliated with GCHQ, and the Metropolitan Police are collaborating with the library to strengthen its IT infrastructure and carry out a forensic examination.
Sir Roly Keating, chief executive of the British Library, said: “We are immensely grateful to our many users and partners who have shown such patience and support as we work to analyse the impact of this criminal attack and identify what we need to do to restore our online systems in a safe and sustainable manner.”
More than 300,000 files were posted online in March after the 36,000-student Minneapolis Public Schools refused to pay a $1 million ransom. Among those files were complete sexual assault case folios including this information. Medical records, complaints of discrimination, Social Security numbers, and contact information for district employees were among the other data disclosed.
The ‘nation’s schools’ that are lush with data have been a primary target for hackers. “In this case, everybody has a key,” says Ian Coldwater, a cybersecurity expert whose son attends a Minneapolis high school.
Districts – often short of funds – are also short of resources to defend themselves from or even properly respond when attacked, as months after the attack, the Minneapolis administrators did not yet promise to inform about the attack to individual victims.
Families of six students whose sexual case files were leaked reached the Association Press only after getting to know about it through a message from a reporter, alerting them of the leak.
Los Angeles Unified School District caught a ransomware attack in progress last Labor Day weekend, only to find the private paperwork of more than 1,900 former students — including psychological evaluations and medical records — leaked online. It was not until February that district officials disclosed the breach's full scope.
It turns out that the long-term effects of school ransomware attacks are not in school closures, expensive recovery efforts, or even skyrocketing cyberinsurance premiums. The AP discovered private documents available on both the open internet and the dark web, causing trauma for teachers, students, and parents.
“A massive amount of information is being posted online, and nobody is looking to see just how bad it all is. Or, if somebody is looking, they’re not making the results public,” says analyst Brett Callow of the cybersecurity firm Emsisoft.
Other major cities that experiences a data theft incident include San Diego, Des Moines and Tucson, Arizona. While the severity of attack remains unclear, the authorities were criticized for their negligence in acknowledging and responding to the ransomware attack.
School systems have been slower to respond than other ransomware targets, who have strengthened and segregated networks, encrypted data, and required multi-factor authentication.
As per a report by the Center for Internet Security, a federally funded nonprofit, one in three U.S districts had been breached by the end of 2021. According to analyst Allan Liska from cybersecurity firm Recorded Future , ransomware have affected over 5 million students in US already and the cases are likely to only increase this year.