Boston Public Library Suffers a Cyberattack

  • By Dawna M. Roberts
  • Published: Sep 10, 2021
  • Last Updated: Mar 18, 2022

Bleeping Computer disclosed that on Wednesday, the Boston Public Library was hit by a widespread cyberattack that crippled its entire network.

What Happened?

The Boston Public Library (BPL) serves 4 million visitors per year across twenty-five neighborhood branches and millions online, and it suffered a major cyberattack recently. The library divulged this information last Wednesday in a public statement to the press.

According to Bleeping Computer “It is the third-largest public library in the United States behind the federal Library of Congress and the New York Public Library, based on the  total number of items it holds.”

In the public notice, the library said,

“The library is currently experiencing a significant system outage, and online library services that require login are unavailable.”

“We apologize for any inconvenience this outage may have caused patrons,” said Kurt Mansperger, Chief Technology Officer of the BPL. “Thank you for your patience as our team and law enforcement officials work to restore our digital services and protect the library from future attacks.”

The library uses the OverDrive system for renting content, and currently, all logins are suspended. They hope to have the issue resolved quickly to allow patrons to resume logging into the library services.

Boston Public Library Data Breach

How Did the Boston Public Library Respond?

The BPL said as soon as the cyberattack was discovered, all “Affected systems were taken offline immediately, and proactive steps were taken to isolate the problem and shut down network communication.”

As of today, the library is still suffering some outages. They are working closely with government officials and law enforcement. In their public statement, the library commented that, “The library is working with the Mayor’s Department of Innovation and Technology and law enforcement officials to address the cybersecurity attack. The Library’s IT department is working on restoring all technology services. In the meantime, all locations will remain open, patrons will still be able to check out books, and some online services remain operational. This is an ongoing situation, and the library will update patrons and staff about services and impacts on its website.”

So far, law enforcement and threat assessors have not determined who was responsible for the attack, and they can find no evidence that any employee or customer data was exfiltrated.

IT Staff Working Overtime to Fix the Outage

The Boston Public Library’s IT staff is working overtime to fix all the outages caused by the attack. In addition, they are securing any vulnerabilities before bringing services back online.

The library remains open, and customers can still borrow books. However, everything is being handled manually until the system is restored.

The original news of the attack came from a short tweet posted by the BPL last week. Subsequently, they posted a longer statement to inform the public about what was going on.

Bleeping Computer reached out to the Boston Public Library for comment, but a spokesperson was not available.

The State of IT Security and Public Resources

As the news grinds out every day, we see more and more public offices and resources hit by cyberattacks. It hammers home the sad realization that typical cybersecurity measures are not working and that most public resources and government entities are simply not secured well enough. Installing antivirus software on each terminal is not going to cut it.

Most data breaches have occurred due to phishing campaigns and ignorant employees not trained in cybersecurity best practices. IT staff and resources are rarely prioritized until an attack occurs. Despite the U.S. government’s attempts to further nationwide awareness and security-conscious mandates, most organizations don’t act until they have to when it’s already too late.

We, as consumers, are the actual victims because we use these resources and trust these companies with our personal information.

About the Author
IDStrong Logo

Related Articles

Instagram Vulnerability Allowed Hackers Access to Control Your Phone

Security experts Check Point Research discovered a critical vulnerability while examining Instagra ... Read More

Alien Malware Infects More than 226 Mobile Apps and Steals Bank Data

As reported on September 24, 2020, by ZDNet and ThreatPost, a new strain of malware named “A ... Read More

Universal Health Systems Hit by Ransomware Attack

Universal Health Systems (UHS), a Fortune 500 company owning more than 400 hospitals across the co ... Read More

Exchange Server Bug Exposes a Big Risk to Hackers

Months after Microsoft released a patch to fix a serious flaw in MS Exchange Server, more than 61% ... Read More

Clients’ Bank Data Exposed in Blackbaud Ransomware Attack

Blackbaud software was victim to a ransomware attack last May, and new information suggests that c ... Read More

Latest Articles

Avoiding Scams During the 2024 Paris Olympics

Avoiding Scams During the 2024 Paris Olympics

Breakdancing is coming to the world stage while French citizens stage a creative protest with the hashtag "JeChieDansLaSeineLe23Juin.

What is Hashing and How Does It Work in Cyber Security?

What is Hashing and How Does It Work in Cyber Security?

Hashing transforms a key or set of characters into a unique value from the original input, all for cybersecurity data validation and integrity checking.

What Is Google Chat Scam and How to Spot and Stop It

What Is Google Chat Scam and How to Spot and Stop It

Google Chat is a popular communication software that allows you to share content and send messages in real time. Individuals use it for personal communication or collaboration with teams at work.

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Notice

By proceeding with this scan, you agree to let IDStrong run a Free Scan of supplied parameters of your personal information and provide free preliminary findings in compliance with our Terms of Use and Privacy Notice. You consent to us using your provided information to complete the Free Scan and compare it against our records and breach databases or sources to provide your Free preliminary findings report.

Rest assured: IDStrong will not share your information with third parties or store your information beyond what is required to perform your scan and share your results.

Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close