Close Menu
    Trending
    • Revisiting Benchmarking of Tabular Reinforcement Learning Methods
    • Is Your AI Whispering Secrets? How Scientists Are Teaching Chatbots to Forget Dangerous Tricks | by Andreas Maier | Jul, 2025
    • Qantas data breach to impact 6 million airline customers
    • He Went From $471K in Debt to Teaching Others How to Succeed
    • An Introduction to Remote Model Context Protocol Servers
    • Blazing-Fast ML Model Serving with FastAPI + Redis (Boost 10x Speed!) | by Sarayavalasaravikiran | AI Simplified in Plain English | Jul, 2025
    • AI Knowledge Bases vs. Traditional Support: Who Wins in 2025?
    • Why Your Finance Team Needs an AI Strategy, Now
    AIBS News
    • Home
    • Artificial Intelligence
    • Machine Learning
    • AI Technology
    • Data Science
    • More
      • Technology
      • Business
    AIBS News
    Home»Technology»M&S hackers sent abuse and ransom demand directly to CEO
    Technology

    M&S hackers sent abuse and ransom demand directly to CEO

    Team_AIBS NewsBy Team_AIBS NewsJune 6, 2025No Comments5 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Joe Tidy

    Cyber correspondent, BBC World Service

    Bloomberg via Getty Images The M&S logo is seen pictured next to a note saying 'est. 1884' on the side of a Marks and Spencer store with an out-of-focus anonymous shopper holding a canvas bag in the foreground, in London on 1 MayBloomberg through Getty Photos

    An abusive electronic mail despatched by the Marks & Spencer hackers to the retailer’s boss gloating concerning the hack and demanding cost has been seen by the BBC.

    The message to M&S CEO Stuart Machin – which was in damaged English – was despatched on the 23 April from the hacker group referred to as DragonForce utilizing the e-mail account of an worker.

    The e-mail confirms for the primary time that M&S has been hacked by the ransomware group – one thing that M&S has to date refused to acknowledge.

    “We’ve marched the methods from China all the way in which to the UK and have mercilessly raped your organization and encrypted all of the servers,” the hackers wrote.

    “The dragon desires to talk to you so please head over to [our darknet website].”

    The extortion electronic mail was proven to the BBC by a cyber-security knowledgeable.

    The blackmail message, which incorporates the n-word, was despatched to the M&S CEO and 7 different executives.

    In addition to bragging about putting in ransomware throughout the M&S IT system to render it ineffective, the hackers say they’ve stolen the non-public information of tens of millions of shoppers.

    Practically three weeks later customers were informed by the corporate that their information might have been stolen.

    The e-mail was despatched apparently utilizing the account of an worker from the Indian IT big Tata Consultancy Companies (TCS) – which has offered IT providers to M&S for over a decade.

    The Indian IT employee based mostly in London has an M&S electronic mail tackle however is a paid TCS worker.

    It seems as if he himself was hacked within the assault.

    TCS has beforehand mentioned it is investigating whether or not it was the gateway for the cyber-attack.

    The corporate has informed the BBC that the e-mail was not despatched from its system and that it has nothing to do with the breach at M&S.

    M&S has declined to remark totally.

    ‘We will each assist one another’

    A darknet hyperlink shared within the extortion electronic mail connects to a portal for DragonForce victims to start negotiating the ransom price. That is additional indication that the e-mail is genuine.

    Sharing the hyperlink – the hackers wrote: “let’s get the social gathering began. Message us, we’ll make this quick and straightforward for us.”

    The criminals additionally seem to have particulars concerning the firm’s cyber-insurance coverage too saying “we all know we are able to each assist one another handsomely : ))”.

    The M&S CEO has refused to say if the corporate has paid a ransom to the hackers.

    DragonForce ended the e-mail with a picture of a dragon respiratory fireplace.

    A graphic of a dragon breathing fire

    This dragon picture was appended to the hackers electronic mail, seen by the BBC

    The e-mail confirms for the primary time the hyperlink between M&S’s hack and the ongoing Co-op cyber-attack, which DragonForce have additionally claimed accountability for.

    The 2 hacks – which started in late April – have wrought havoc on the 2 retailers. Some Co-op cabinets had been left naked for weeks, whereas M&S expects its operations to be disrupted till July.

    Though we now know that DragonForce is behind each, it’s nonetheless not clear who the precise hackers are.

    DragonForce provides cyber-criminal associates numerous providers on their darknet website in trade for a 20% lower of any ransoms collected.

    Anybody can enroll and use their malicious software program to scramble a sufferer’s information or use their darknet web site for his or her public extortion.

    Nothing has appeared on the prison’s darknet leak website about both Co-op or M&S however the hackers informed the BBC final week that they had been having IT issued of their very own and could be posting data “very quickly.”

    Some researchers say DragonForce are based mostly in Malaysia, whereas others say Russia. Their electronic mail to M&S implies that they’re from China.

    Hypothesis has been mounting {that a} unfastened collective of younger western hackers generally known as Scattered Spider may be the associates behind the hacks and in addition one on Harrods.

    Scattered Spider will not be actually a gaggle within the regular sense of the phrase. It is extra of a group which organises throughout websites like Discord, Telegram and boards – therefore the outline “scattered” which was given to them by cyber-security researchers at CrowdStrike.

    Some Scattered Spider hackers are recognized to be youngsters within the US and UK.

    The UK’s Nationwide Crime Company mentioned in a BBC documentary concerning the retail hacks, that they’re focusing investigations on the group.

    The BBC spoke to the Co-op hackers who declined to reply whether or not or not they had been Scattered Spider. “We cannot reply that query” is all they mentioned.

    Two of them mentioned they wished to be generally known as “Raymond Reddington” and “Dembe Zuma” after characters from US crime thriller The Blacklist which includes a wished prison serving to police take down different criminals on a blacklist.

    In a message to me, they boasted: “We’re placing UK retailers on the Blacklist.”

    There have been a sequence of smaller cyber-attacks on UK retailers since however none as impactful of disruptive as these on Co-op, M&S and Harrods.

    Within the early levels of the M&S hack, unknown sources informed cyber information website Bleeping Laptop that proof is pointing to Scattered Spider.

    The UK’s national cyber-crime unit has confirmed to the BBC that the group is one in every of their key suspects.

    As for the hackers I spoke to on Telegram, they declined to reply whether or not or not they had been Scattered Spider. “We cannot reply that query” is all they mentioned.

    A green promotional banner with black squares and rectangles forming pixels, moving in from the right. The text says: “Tech Decoded: The world’s biggest tech news in your inbox every Monday.”



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous Article8 Passive Income Ideas That Are Actually Worth Pursuing
    Next Article Agent AI: How Intelligent Agents Are Shaping the Future of Automation and Decision-Making
    Team_AIBS News
    • Website

    Related Posts

    Technology

    Qantas data breach to impact 6 million airline customers

    July 2, 2025
    Technology

    Cuba’s Energy Crisis: A Systemic Breakdown

    July 1, 2025
    Technology

    Musk’s X appoints ‘king of virality’ in bid to boost growth

    July 1, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Revisiting Benchmarking of Tabular Reinforcement Learning Methods

    July 2, 2025

    I Tried Buying a Car Through Amazon: Here Are the Pros, Cons

    December 10, 2024

    Amazon and eBay to pay ‘fair share’ for e-waste recycling

    December 10, 2024

    Artificial Intelligence Concerns & Predictions For 2025

    December 10, 2024

    Barbara Corcoran: Entrepreneurs Must ‘Embrace Change’

    December 10, 2024
    Categories
    • AI Technology
    • Artificial Intelligence
    • Business
    • Data Science
    • Machine Learning
    • Technology
    Most Popular

    FATAL ERROR: Thought Process Not Found | by José Luis Cruz Rivera | Feb, 2025

    February 10, 2025

    Morevac’s paradox is no paradox. Logical reasoning was always designed… | by From Narrow To General AI | Apr, 2025

    April 24, 2025

    Still Saying ‘I’ll Just Do It’? That’s Why You’re Stuck

    June 11, 2025
    Our Picks

    Revisiting Benchmarking of Tabular Reinforcement Learning Methods

    July 2, 2025

    Is Your AI Whispering Secrets? How Scientists Are Teaching Chatbots to Forget Dangerous Tricks | by Andreas Maier | Jul, 2025

    July 2, 2025

    Qantas data breach to impact 6 million airline customers

    July 2, 2025
    Categories
    • AI Technology
    • Artificial Intelligence
    • Business
    • Data Science
    • Machine Learning
    • Technology
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    • About us
    • Contact us
    Copyright © 2024 Aibsnews.comAll Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.