Skip to main content
National Treasure Attack 600GB Stolen 90 Days Offline

600 GB, 20 Bitcoin, 90 Days Offline
Inside the British Library Ransomware Siege

How the Rhysida gang turned a national treasure into a cautionary tale that cost £7 million and froze academic research for months

600GB
Data Stolen
20 BTC
Ransom Demand
90 days
Offline
£7M
Recovery Cost
"At 23:29 on 25 October 2023 it took the Rhysida gang one stolen password to encrypt centuries of knowledge and lock the largest library on Earth out of its own digital shelves for three months."

48 Hours That Deleted History

Date / Time (GMT)Event
25 Oct 23:29Affiliate logs in to Terminal Services server (deployed 2020 for Covid remote work) without MFA
26 Oct 01:15Security team blocks suspicious account, resets it, re-enables same account later that morning—missed kill-chain moment
28 Oct 01:30440 GB of outbound traffic detected; attackers already exfiltrating HR, payroll & reader CRM via Robocopy / SQLCMD / Rclone
28 Oct 09:54Public tweet: "Technical issues affecting our website"—Wi-Fi, catalogue, phone lines, card readers dead
31 OctLibrary admits cyber-attack; NCSC & private forensics called in
16 NovRhysida posts sample scans (passports, HMRC letters); 20 BTC ransom demanded (≈ £600k)
27 NovDeadline passes; 573 GB (≈ 490k files) dumped free on dark web—90% of haul
15 Jan 2024Read-only catalogue finally back online—82 days after first outage
5 Jan 2024Board reveals £6–7m recovery bill—40% of the Library's entire cash reserves

When the UK's Memory Bank Goes Dark

600 GB stolen: passport scans, salary spreadsheets, reader address lists, even royalty-visit security plans
14 million books still safe on shelves, but digital metadata (catalogue, ISBN indexes, OCR text) encrypted or destroyed—no quick restore path
Legal-deposit intake halted; publishers could not deposit digital copies for three months—national archive gap
Academic research frozen: 40% drop in reading-room visits; PhD theses deadlines extended
£1.6m direct loss disclosed by Mar 2024; final cost tracking to £7m plus 18-month "Rebuild & Renew" programme

How Rhysida Turned a Library into a Crime Scene

MITRE TacticTechnique UsedBritish Library Reality
Initial AccessT1078 Valid AccountsStolen domain creds on RDP gateway (no MFA)
ExecutionT1059.003 Windows Command ShellRobocopy / SQLCMD to stage files
ExfiltrationT1048.002 Exfil Over Web ServiceRclone to Mega.io440 GB in 24h
ImpactT1486 Data Encrypted for ImpactBitLocker + Rhysida binary deployed; some servers wiped to hinder rebuild

A Perfect Storm of "We'll Get to It Later"

No MFA on crown-jewel server

Risk flagged in 2020, "consequences under-appraised"

Flat network architecture

Finance, HR, digital-collections on same VLAN → lateral movement paradise

Legacy dependencies

Windows 2008 R2 & end-of-life apps meant no vendor patches & no clean rebuild images

Manual data shuffles

Between old systems inflated sensitive-data footprint—more files to steal

Why Culture Crumbled Faster Than Code

"The British Library attack is a textbook example of legacy overload + MFA apathy. Attackers didn't need a zero-day—they needed one reused password and a weekend."
—Chris Grove, Senior Solutions Engineer, Odaseva
Translation:

MFA is not a "nice-to-have" for cultural institutions—it's the dead-bolt on the nation's attic.

Five NIST Controls That Would Have Kept the Lights (and Laptops) On

ControlNIST CSF IDFix
Phishing-resistant MFAPR.AC-7FIDO2 keys for all remote-desktop gateways—no SMS, no excuses
Network segmentationPR.AC-5Micro-segment HR/finance from reader-facing catalogue; use zero-trust SDP
Immutable backupsPR.IP-4Daily Veeam copy to offline tape + cloud-object-lock; test monthly bare-metal restore
Legacy-system retirementPR.IP-9Force EoL servers onto isolated legacy VLAN with strict ACLs; migrate to SaaS catalogue
Vendor incident SLARS.CO-2Insert 72-hour breach-notification clause; financial penalties for each day of delay

The Cultural Heritage Crisis

Rhysida spent three days rummaging through 600 GB of the UK's cultural genome, but the initial breach took seconds—the moment an unprotected Terminal Services session accepted a single-factor log-in.

If the guardian of 170 million items can be forced to spend half its cash reserves to reboot civilization, what treasures are you protecting with yesterday's locks?

"How many centuries of knowledge are 39 seconds away from digital darkness?"

Protect Your Legacy Systems Before It's Too Late

Don't let legacy vulnerabilities become your organization's downfall. Get a comprehensive security assessment and modernize your defenses against sophisticated ransomware attacks.