DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

‘People have had to move house’: Inside the British Library, two years on from devastating cyber attack

Posted on November 3, 2025 by Dissent

Sometimes we forget about breaches when they are out of the immediate news cycle. Here is a reminder that some ransomware attacks have long-lasting impacts. Athena Stavrou reports:

Home to more than 170 million items, including Magna Carta, the British Library is one of the world’s largest and most impressive book collections.

However, in October 2023, a major cyber attack plunged it into chaos, shutting down its digital systems and resulting in the leaking of staff details onto the dark web.

Two years on, staff – who are striking due to a pay dispute – have said the disruption is still creating chaos and considerably increasing their workload.

They say they have faced abuse as a result of the ongoing issues, while some have had to make major changes in their personal lives after their personal details were leaked.

[…]

While they now use a digital form to place orders, staff still have to input information manually, which takes considerably longer.

Meanwhile, dozens of services at the library are still unavailable, including ebooks, its archives and manuscripts catalogue, and online journal articles. This has meant staff have suffered abuse from frustrated members unable to access the materials needed.

Read more at The Independent.

The October 2023 attack was a ransomware attack by Rhysida. The threat actors subsequently leaked employee data. A check of its dark web leak site today shows that the listing claiming 573 GB comprising 490,191 files is still online, as is the data tranche.

Paying a ransom is discouraged because it only funds future criminal acts, and there is no guarantee that data will be recovered and not re-ransomed or sold.  Library personnel have never discussed publicly whether they regret not paying the £600,000 ransom demand, and it was never revealed whether they had negotiated with Rhysida at all. If the library had known then what the next two years would be like and that the problems would be ongoing, would they have made a different decision?

 


Related:

  • British Library: Employee data leaked in cyber attack
  • British Library's candid ransomware comms driven by 'emotional intelligence'
Category: Commentaries and AnalysesMalwareMiscellaneousNon-U.S.

Post navigation

← Two years after an audit highlighted significant concerns, North Salem Central School District leaves sensitive student data at risk
Canadian woman stuck since 2021 in Mauritius after passport withheld →

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says
  • The Case for Making EdTech Companies Liable Under FERPA
  • NHS providers reviewing stolen Synnovis data published by cyber criminals

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation
  • Who’s watching the watchers? This Mozilla fellow, and her Surveillance Watch map

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.