Close Menu
    Trending
    • NEW: Comer Subpoenas Biden White House Physician to Testify on Autopen and Mental Decline Scandal | The Gateway Pundit
    • Paige DeSorbo Not Returning To ‘Summer House’ After 7 Seasons
    • Australian bouncy castle operator cleared over accident that killed six children
    • Thailand ready for ‘high-level operation’ in Cambodia border dispute | Border Disputes News
    • Browns confirm Dillon Gabriel news amid QB competition
    • We can reshore American manufacturing
    • M&S hackers sent abuse and ransom demand directly to CEO
    • Citibank Backtracks On Gun Policy
    The Daily FuseThe Daily Fuse
    • Home
    • Latest News
    • Politics
    • World News
    • Tech News
    • Business
    • Sports
    • More
      • World Economy
      • Entertaiment
      • Finance
      • Opinions
      • Trending News
    The Daily FuseThe Daily Fuse
    Home»Tech News»BBC reporter on talking to the hackers
    Tech News

    BBC reporter on talking to the hackers

    The Daily FuseBy The Daily FuseMay 18, 2025No Comments7 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    BBC reporter on talking to the hackers
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Joe Tidy

    Cyber correspondent

    BBC A man with brown hair and wearing a light blue shirt looks in contemplation.BBC

    Joe Tidy interacted with hackers who claimed to have finished the M&S and Co-op hack

    Virtually every day, my cellphone pings with messages from hackers of all stripes.

    The great, the dangerous, the not-so-sure.

    I have been reporting on cyber safety for greater than a decade, so I do know that lots of them like to speak about their hacks, findings and escapades.

    About 99% of those conversations keep firmly locked in my chat logs and do not result in information tales. However a latest ping was unimaginable to disregard.

    “Hey. That is Joe Tidy from the BBC reporting on this Co-op information, right?” the hackers messaged me on Telegram.

    “We now have some information for you,” they teased.

    Once I cautiously requested what this was, the folks behind the Telegram account – which had no title or profile image – gave me the within observe on what they claimed to have finished to M&S and the Co-op, in cyber assaults that triggered mass disruption.

    By way of messages back-and-forth over the following 5 hours, it grew to become clear to me that these obvious hackers had been fluent English audio system and though they claimed be messengers, it was apparent they had been intently linked to – if not intimately concerned in – the M&S and Co-op hacks.

    They shared proof proving that they’d stolen an enormous quantity of personal buyer and worker data.

    I checked out a pattern of the information they’d given me – after which securely deleted it.

    A shop fridge with almost empty shelves, and a sign stuck on the window which says "Sorry we are having some availability issues which will be resolved shortly"

    Buyers have been met with empty cabinets at some UK Co-op shops in latest weeks

    Messages that confirmed suspicions

    They had been clearly pissed off that Co-op wasn’t giving in to their ransom calls for however would not say how a lot cash in Bitcoin they had been demanding of the retailer in alternate for the promise that they would not promote or give away the stolen information.

    After a dialog with the BBC’s Editorial Coverage staff, we determined that it was within the public curiosity to report that they’d supplied us with proof proving that they had been liable for the hack.

    I shortly contacted the press staff on the Co-op for remark, and inside minutes the agency, who had initially downplayed the hack, admitted to staff, clients and the inventory market in regards to the vital information breach.

    A lot later, the hackers despatched me a protracted offended and offensive letter about Co-op’s response to their hack and subsequent extortion, which revealed that the retailer narrowly dodged a extra extreme hack by intervening within the chaotic minutes after its laptop systems were infiltrated. The letter and dialog with the hackers confirmed what specialists within the cyber safety world had been saying since this wave of assaults on retailers started – the hackers had been from a cyber crime service referred to as DragonForce.

    Who’re DragonForce, you could be asking? Based mostly on our conversations with the hackers and wider data, we’ve some clues.

    DragonForce presents cyber prison associates numerous providers on their darknet web site in alternate for a 20% minimize of any ransoms collected. Anybody can join and use their malicious software program to scramble a sufferer’s information or use their darknet web site for his or her public extortion.

    This has turn out to be the norm in organised cyber crime; it is generally known as ransomware-as-a-service.

    Probably the most notorious of latest occasions has been a service referred to as LockBit, however that is all however defunct now partly as a result of it was cracked by the police final yr.

    Following the dismantling of such teams, an influence vacuum has emerged. Cue a tussle for dominance on this underground world, resulting in some rival teams innovating their choices.

    Energy wrestle ensues

    DragonForce just lately rebranded itself as a cartel providing much more choices to hackers together with 24/7 buyer assist, for instance.

    The group had been promoting its wider providing since a minimum of early 2024 and has been actively concentrating on organisations since 2023, in keeping with cyber specialists like Hannah Baumgaertner, Head of Analysis at Silobeaker, a cyber threat safety firm.

    “DragonForce’s newest mannequin consists of options comparable to administration and consumer panels, encryption and ransomware negotiation instruments, and extra,” Ms Baumgaertner mentioned.

    As a stark illustration of the power-struggle, DragonForce’s darknet web site was just lately hacked and defaced by a rival gang referred to as RansomHub, earlier than re-emerging a couple of week in the past.

    “Behind the scenes of the ransomware ecosystem there appears to be some jostling – that could be for prime ‘chief’ place or simply to disrupt different teams as a way to take extra of the sufferer share,” mentioned Aiden Sinnott, senior menace researcher from the cyber safety firm Secureworks.

    Who’s pulling the strings?

    DragonForce’s prolific modus operandi is to submit about its victims, because it has finished 168 occasions since December 2024 – a London accountancy agency, an Illinois metal maker, an Egyptian funding agency are all included. But up to now, DragonForce has remained silent in regards to the retail assaults.

    Usually radio silence about assaults signifies {that a} sufferer organisation has paid the hackers to maintain quiet. As neither DragonForce, Co-op nor M&S have commented on this level, we do not know what could be taking place behind the scenes.

    Establishing who the persons are behind DragonForce is hard, and it isn’t recognized the place they’re positioned. Once I requested their Telegram account about this, I did not get a solution. Though the hackers did not inform me explicitly that they had been behind the latest hacks on M&S and Harrods, they confirmed a report in Bloomberg that spelt it out.

    After all, they’re criminals and could possibly be mendacity.

    Some researchers say DragonForce are primarily based in Malaysia, whereas others say Russia, the place many of those teams are considered positioned. We do know that DragonForce has no particular targets or agenda apart from creating wealth.

    And if DragonForce is simply the service for different criminals to make use of – who’s pulling the strings and selecting to assault UK retailers?

    Within the early phases of the M&S hack, unknown sources instructed cyber information web site Bleeping Pc that proof is pointing to a free collective of cyber criminals generally known as Scattered Spider – however this has but to be confirmed by the police.

    Scattered Spider just isn’t actually a gaggle within the regular sense of the phrase. It is extra of a group which organises throughout websites like Discord, Telegram and boards – therefore the outline “scattered” which was given to them by cyber safety researchers at CrowdStrike.

    They’re recognized to be English-speaking and possibly within the UK and the US and younger – in some instances youngsters. We all know this from researchers and former arrests. In November the US charged 5 males and boys of their twenties and youths for alleged Scattered Spider exercise. One in every of them is 22-year-old Scottish man Tyler Buchanan, who has not made a plea, and the remainder are US primarily based.

    Crackdowns by police appear to have had little impact on the hackers’ dedication, although. On Thursday, Google’s cyber safety division issued warnings that it was beginning to see Scattered Spider-like assaults on US retailers now too.

    As for the hackers I spoke to on Telegram, they declined to reply whether or not or not they had been Scattered Spider. “We cannot reply that query” is all they mentioned.

    Maybe in a nod to the immaturity and attention-seeking nature of the hackers, two of them mentioned they needed to be generally known as “Raymond Reddington” and “Dembe Zuma” after characters from US crime thriller The Blacklist which entails a needed prison serving to police take down different criminals on a blacklist.

    In a message to me, they boasted: “We’re placing UK retailers on the Blacklist.”

    A green promotional banner with black squares and rectangles forming pixels, moving in from the right. The text says: “Tech Decoded: The world’s biggest tech news in your inbox every Monday.”



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    The Daily Fuse
    • Website

    Related Posts

    M&S hackers sent abuse and ransom demand directly to CEO

    June 6, 2025

    Tesla shares hit as Trump-Musk feud explodes

    June 6, 2025

    Getting Past Procastination – IEEE Spectrum

    June 5, 2025

    Stores open at midnight as fans rush to buy Nintendo Switch 2

    June 5, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Israel will begin negotiations on next phase of Gaza ceasefire this week, minister says

    February 18, 2025

    Israel must withdraw from Lebanon by January 26 deadline: President Aoun | Israel attacks Lebanon News

    January 19, 2025

    An Unexpected Trump Bump for the World’s Centrists

    March 12, 2025

    Germans protest at conservative cooperation with far right on migration | Protests News

    February 3, 2025

    Inter Milan defeats Barcelona, advances to final

    May 7, 2025
    Categories
    • Business
    • Entertainment News
    • Finance
    • Latest News
    • Opinions
    • Politics
    • Sports
    • Tech News
    • Trending News
    • World Economy
    • World News
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    • About us
    • Contact us
    Copyright © 2024 Thedailyfuse.comAll Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.