Security

Cyber-crime

Rhysida ransomware gang: We attacked the British Library

Crims post passport scans and internal forms up for 'auction' to prove it


The Rhysida ransomware group says it's behind the highly disruptive October cyberattack on the British Library, leaking a snippet of stolen data in the process.

A low-res image shared to its leak site appears to show a handful of passport scans, along with other documents, some of which display the format of HMRC employment documents.

Rhysida started an auction for the stolen data with a deadline for bids ending just before 0800 UTC on November 27. The criminals said there will be only one single-party winner that will be the sole recipient of the stolen data. The starting bid has been set at 20 Bitcoin – roughly $745,000.

"With just 7 days on the clock, seize the opportunity to bid on exclusive, unique, and impressive data," Rhysida's message on its website states. "Open your wallets and be ready to buy exclusive data. We sell only to one hand, no reselling, you will be the only owner."

It goes without saying that any recipient has no way of knowing this and if Rhysida is indeed behind the attack, it may keep unlimited backups.

The Register approached the British Library for comment but it did not reply.

The British Library confirmed a major IT outage at the end of October, owing to a cybersecurity issue. It confirmed the incident to be ransomware in nature on November 14, but Rhysida's claim only arrived this morning, Monday November 20.

The disruption caused by the attack remains significant. When the attack was first confirmed, the library's famous red brick site in London's St Pancras was operating on a cash-only basis while electronic payments were down. Wireless internet connectivity for visitors was also unavailable, and order collection facilities were limited.

The website remains down at the time of writing, as it has been for weeks.

Regular updates have been provided via the library's X account and a separate website, with services still experiencing outages and disruption.

Responding to a question via social media regarding potential data theft, the British Library said on November 15 that it still wasn't aware of the full extent of the attack. 

"We're currently only able to confirm which services are still available but we're working to understand and resolve the situation as quickly as possible, and to restore our other services," it said.

"We'll share updates on how this may affect our users as soon as we can. We're really sorry for any inconvenience this has caused."

Rhysida's claims of being behind the attack come weeks after the British Library first confirmed the incident, and one week after it was confirmed as ransomware – an indication that negotiations may have broken down.

"Ransomware attacks naturally come with a negotiation phase immediately after the attack which can take time to find the sweet spot," Jake Moore, global cybersecurity advisor at ESET, told The Register

"If payments are to be considered by the victim, this difficult period can take days before more details are released. The victim parties often keep as much of their attacks under wraps but the criminal group will want to quickly claim responsibility.

"When a group leaves it some time to claim their crimes, it can usually mean that such negotiations have been going back and forth fighting for the right price from both sides. Seen as a [ransomware-as-a-service] model, Rhysida are likely to have not been paid the ransom they have finally demanded and are now pushing out the next phase of the attack by threatening the release of data."

Rhysida rousing authorities

The US' Cybersecurity and Infrastructure Security Agency (CISA) released an advisory on November 15 to spread awareness of the ransomware strain which has been opportunistically targeting organizations since May 2023.

Primarily targeting the education, healthcare, manufacturing, information technology, and government sectors, Rhysida is known for gaining access to victims via old vulnerabilities like ZeroLogon, and using phishing and stolen credentials to authenticate to VPNs of organizations that lack MFA by default.

Some security researchers have linked Rhysida's activity to groups like Vice Society, noting similarities in the tactics and techniques in Rhysida-linked attacks. 

Rhysida is thought to be a ransomware-as-a-service (RaaS) group in its own right, and Vice Society – believed to be behind major attacks like the one on the LA Unified School District – may be using its kit, researchers have theorized.

It operates on a double extortion model, as appears to be evidenced by the British Library attack, and the group tends to use living off the land techniques – using pre-loaded admin tools to blend in with typical network traffic. ®

Send us news
29 Comments

Scores of US credit unions offline after ransomware infects backend cloud outfit

Supply chain attacks: The gift that keeps on giving

Leader of pro-Russia DDoS crew Killnet 'unmasked' by Russian state media

Also: NXP China attack, Australia can't deliver on ransom payment ban (yet), and Justin Sun's very bad month

Black Basta ransomware operation nets over $100M from victims in less than two years

Assumed Conti offshoot averages 7 figures for each successful attack but may have issues with, er, 'closing deals'

2.5M patients infected with data loss in Norton Healthcare ransomware outbreak

AlphV lays claims to the intrusion

Europol shutters ransomware operation with kingpin arrests

A few low-level stragglers remain on the loose, but biggest fish have been hooked

US readies prison cell for another Russian Trickbot developer

Hunt continues for the other elusive high-ranking members

BlackCat ransomware crims threaten to directly extort victim's customers

Accounting software firm Tipalti says it’s investigating alleged break-in of its systems

British Library begins contacting customers as Rhysida leaks data dump

CRM databases were accessed and library users are advised to change passwords

Attack on direct debit provider London & Zurich leaves customers with 6-figure backlogs

Customers complain of poor comms during huge outage that’s sparked payroll fears

BlackCat claims it is behind Fidelity National Financial ransomware shakedown

One of US's largest underwriters forced to shut down a number of key systems

BlackCat plays with malvertising traps to lure corporate victims

Ads for Slack and Cisco AnyConnect actually downloaded Nitrogen malware

Ransomware more efficient than ever, and baddies are still after your logs

Trying times for incident responders who battle fastest-ever ransomware blitz as attackers keep scrubbing evidence clean