Craig Pepper
November 27, 2023
5 Min Read

Threat Report 27.11.23

More On British Library Cybersecurity Challenge

The British Library is currently grappling with a significant technology outage attributed to a cyber-attack. The impact extends to the library's website, online systems, and certain onsite services. Although Wi-Fi services have been restored at both sites, the disruption is expected to persist for an extended period, possibly spanning several months.

The British Library is currently grappling with a significant technology outage attributed to a cyber-attack. The impact extends to the library's website, online systems, and certain onsite services. Although Wi-Fi services have been restored at both sites, the disruption is expected to persist for an extended period, possibly spanning several months.

Upon investigation, it has been confirmed that the Rhysida ransomware group is responsible for this disruptive cyber attack. The group not only claimed responsibility but also showcased a low-resolution image on its leak site, indicating the compromise of data from the prestigious library.

In response to the attack, the British Library has swiftly implemented targeted protective measures to ensure the integrity of its systems. Furthermore, a collaborative effort is underway, involving the National Cyber Security Centre (NCSC), the Metropolitan Police, and cybersecurity specialists. This joint effort aims to thoroughly investigate the attack and formulate strategies to mitigate its impact.

Acknowledging data leakage, the library advises users with passwords shared across other accounts to change them as a precautionary measure. This highlights the potential risks associated with such cyber incidents, emphasising the need for individual vigilance.

The library expresses gratitude for the patience and understanding of its users during this ongoing investigation. Regular updates will be provided as the situation evolves, and efforts to restore more services are anticipated in the coming weeks.

Fidelity National Financial Grapples with Ransomware

Fidelity National Financial (FNF), a Fortune 500 company providing title insurance and settlement services, has unveiled a cybersecurity incident impacting specific FNF systems. Swiftly filing a report with the Securities and Exchange Commission (SEC), the company has initiated an investigation into the incident, which bears significant implications for FNF's operational landscape.

In the ongoing investigation, an unauthorised third party penetrated specific FNF systems, acquiring credentials and wreaking havoc across various sectors, including title insurance, escrow, other title-related services, mortgage transactions, and technology services to the real estate and mortgage industries.

Responding to the breach, FNF promptly implemented measures to contain the incident, including blocking access to certain systems, causing disruptions to business operations. Engaging leading experts, alerting law enforcement, and actively assessing the extent of the incident constitute key components of FNF's response.

This cybersecurity hiccup has resulted in disruptions to critical services, affecting scheduled closings and leaving agents and homebuyers in a precarious position. The potential financial and operational fallout looms large for FNF, a major player recording over $11 billion in total revenue in 2022.

Attributed to an unauthorised third party, the cybersecurity incident has the BlackCat ransomware group claiming responsibility. While the group hasn't disclosed the full data extent, it signals readiness to reveal more based on FNF's response.

Security experts speculate that the entry point into FNF's systems might be linked to the CitrixBleed vulnerability affecting Citrix Netscaler devices (CVE-2023-4966), raising concerns about patching timelines and potential exploitation avenues.

New Relic's Cybersecurity Incident

New Relic, a web tracking and analytics company, has issued a security advisory alerting its customers to a cybersecurity incident. The advisory, though scant on details, assures the community of an active investigation with the assistance of third-party cybersecurity experts.

In the advisory, New Relic underscores its commitment to the community, informing customers of the ongoing cybersecurity investigation. CEO Bill Staples conveys appreciation for the community's participation and reassures customers of the company's continuous efforts to address the incident.

The advisory provides a mere glimpse of the incident's nature, hinting at a potential compromise and urging customers to remain vigilant. However, specific details about the incident are conspicuously absent, leaving customers uncertain about its severity and necessary precautions.

Customers are informed that they will be directly contacted if specific actions are required. The advisory emphasises that if customers do not receive communication from New Relic, there is no immediate action they need to take at the present time. The lack of detailed instructions may leave customers uncertain about the severity of the incident and the necessary precautions.

Approached for comments, New Relic states that it is an ongoing investigation, and the information available is in the security bulletins. However, key questions regarding the timeline of the incident, data access, detection methods, and the involvement of third-party experts remain unanswered. Additionally, the scope of the incident—whether it affects all customers globally or is confined to specific regions—is yet to be clarified.

The lack of detail may cause concern among customers who are uncertain about the security of their data and systems. The timing of the incident, particularly during the Thanksgiving long weekend, adds an element of urgency and potential inconvenience for affected users.

Read similar blogs