Toronto’s public library system now says “sensitive information” may have been copied by the ransomware gang that hit the institution.
“Based on the ongoing investigation, we have now determined that sensitive data may have been exposed,” the municipal library says on its website. “Further investigation is required to determine the extent of the exposure and individuals affected.
“We continue to actively collaborate with third-party experts to assess the scope of the exposure and individuals impacted. We anticipate the investigation will take some time to complete. We appreciate your patience and support. We will continue to be transparent, and provide further information as we learn more.”
As restoration work continues, an increasing number of services are added to the list of what is available online and at branches.
However, still unavailable are access to the tpl.ca website and online personal accounts; computers for public internet access, along with printing from those PCs; tpl:map passes; some digital collections; placing, suspending or managing holds and renewing library cards. That’s not a problem, because library cards won’t expire during the problem.
The ransomware attack started Oct. 28. Typically, attackers are in a system for at least several days, finding and copying data, before encrypting information.
A lending library wouldn’t have credit or debit card information on users. But any public library would have data some threat actors would like — and library users would consider private — such as lists of names, home addresses and email addresses. These would be useful for phishing attacks.
However, a library’s IT system might have sensitive data of employees — unless it is held by senior municipal IT systems — such as names, birthdates and Social Insurance numbers that could be used for creating phony ID and impersonation.
There’s no shortage of free advice for organizations on preparing for ransomware attacks. Canadian organizations can, for example, lean on the Canadian Centre for Cyber Security’s Ransomware Playbook, the Ontario government’s Cyber Security Centre of Excellence. In the U.S., there’s the government’s Stop Ransomware campaign. IT department and management leaders should also note the Institute for Security and Technology’s Ransomware Blueprint for Defense.