Close Menu
    Trending
    • Ex-Playboy Model Kendra Wilkinson Embraces ‘Aging Poorly’
    • Trump hints end of Iran war in sight, saying operations ‘very complete’
    • US blacklists Sudanese Muslim Brotherhood as ‘terrorist’ group | Muslim Brotherhood News
    • The ‘Most TD-catches in NFL history’ quiz
    • From medals to the Capitol: When women are elected, everyone wins
    • Mr. President, please take off your hat
    • How Cross-Cultural Engineering Drives Tech Advancement
    • Neocons Advising Trump Are Destroying America
    The Daily FuseThe Daily Fuse
    • Home
    • Latest News
    • Politics
    • World News
    • Tech News
    • Business
    • Sports
    • More
      • World Economy
      • Entertaiment
      • Finance
      • Opinions
      • Trending News
    The Daily FuseThe Daily Fuse
    Home»Tech News»M&S hackers sent abuse and ransom demand directly to CEO
    Tech News

    M&S hackers sent abuse and ransom demand directly to CEO

    The Daily FuseBy The Daily FuseJune 6, 2025No Comments6 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    M&S hackers sent abuse and ransom demand directly to CEO
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Joe Tidy

    Cyber correspondent, BBC World Service

    Bloomberg via Getty Images The M&S logo is seen pictured next to a note saying 'est. 1884' on the side of a Marks and Spencer store with an out-of-focus anonymous shopper holding a canvas bag in the foreground, in London on 1 MayBloomberg by way of Getty Pictures

    An abusive e mail despatched by the Marks & Spencer hackers to the retailer’s boss gloating concerning the hack and demanding fee has been seen by the BBC.

    The message to M&S CEO Stuart Machin – which was in damaged English – was despatched on the 23 April from the hacker group referred to as DragonForce utilizing the e-mail account of an worker.

    The e-mail confirms for the primary time that M&S has been hacked by the ransomware group – one thing that M&S has to this point refused to acknowledge.

    “We’ve marched the methods from China all the way in which to the UK and have mercilessly raped your organization and encrypted all of the servers,” the hackers wrote.

    “The dragon needs to talk to you so please head over to [our darknet website].”

    The extortion e mail was proven to the BBC by a cyber safety professional.

    The blackmail message, which incorporates the n-word, was despatched to the M&S CEO and 7 different executives.

    In addition to bragging about putting in ransomware throughout the M&S IT system to render it ineffective, the hackers say they’ve stolen the non-public knowledge of thousands and thousands of consumers.

    Practically three weeks later customers were informed by the corporate that their knowledge could have been stolen.

    The e-mail was despatched apparently utilizing the account of an worker from the Indian IT large Tata Consultancy Companies (TCS) – which has offered IT companies to M&S for over a decade.

    The Indian IT employee primarily based in London has an M&S e mail handle however is a paid TCS worker.

    It seems as if he himself was hacked within the assault.

    TCS has beforehand mentioned it is investigating whether or not it was the gateway for the cyber assault.

    The corporate has advised the BBC that the e-mail was not despatched from its system and that it has nothing to do with the breach at M&S.

    M&S has declined to remark solely.

    ‘We will each assist one another’

    A darknet hyperlink shared within the extortion e mail connects to a portal for DragonForce victims to start negotiating the ransom payment. That is additional indication that the e-mail is genuine.

    Sharing the hyperlink – the hackers wrote: “let’s get the social gathering began. Message us, we’ll make this quick and straightforward for us.”

    The criminals additionally seem to have particulars concerning the firm’s cyber insurance coverage coverage too saying “we all know we will each assist one another handsomely : ))”.

    The M&S CEO has refused to say if the corporate has paid a ransom to the hackers.

    DragonForce ended the e-mail with a picture of a dragon respiration hearth.

    A graphic of a dragon breathing fire

    This dragon picture was appended to the hackers e mail, seen by the BBC

    The e-mail confirms for the primary time the hyperlink between M&S’s hack and the ongoing Co-op cyber attack, which DragonForce have additionally claimed duty for.

    The 2 hacks – which started in late April – have wrought havoc on the 2 retailers. Some Co-op cabinets have been left naked for weeks, whereas M&S expects its operations to be disrupted till July.

    Though we now know that DragonForce is behind each, it’s nonetheless not clear who the precise hackers are.

    DragonForce affords cyber legal associates varied companies on their darknet website in trade for a 20% reduce of any ransoms collected.

    Anybody can join and use their malicious software program to scramble a sufferer’s knowledge or use their darknet web site for his or her public extortion.

    Nothing has appeared on the legal’s darknet leak website about both Co-op or M&S however the hackers advised the BBC final week that they have been having IT issued of their very own and could be posting info “very quickly.”

    Some researchers say DragonForce are primarily based in Malaysia, whereas others say Russia. Their e mail to M&S implies that they’re from China.

    Hypothesis has been mounting {that a} free collective of younger western hackers often known as Scattered Spider could be the associates behind the hacks and in addition one on Harrods.

    Scattered Spider isn’t actually a gaggle within the regular sense of the phrase. It is extra of a neighborhood which organises throughout websites like Discord, Telegram and boards – therefore the outline “scattered” which was given to them by cyber safety researchers at CrowdStrike.

    Some Scattered Spider hackers are identified to be youngsters within the US and UK.

    The UK’s Nationwide Crime Company mentioned in a BBC documentary concerning the retail hacks, that they’re focusing investigations on the group.

    The BBC spoke to the Co-op hackers who declined to reply whether or not or not they have been Scattered Spider. “We can’t reply that query” is all they mentioned.

    Two of them mentioned they wished to be often known as “Raymond Reddington” and “Dembe Zuma” after characters from US crime thriller The Blacklist which entails a wished legal serving to police take down different criminals on a blacklist.

    In a message to me, they boasted: “We’re placing UK retailers on the Blacklist.”

    There have been a sequence of smaller cyber assaults on UK retailers since however none as impactful of disruptive as these on Co-op, M&S and Harrods.

    DragonForce affords cyber legal associates varied companies on their darknet website in trade for a 20% reduce of any ransoms collected.

    Anybody can join and use their malicious software program to scramble a sufferer’s knowledge or use their darknet web site for his or her public extortion.

    Nothing has appeared on the legal’s darknet leaksite about both Co-op or M&S however the hackers advised the BBC they have been having IT problems with their very own and could be posting info “very quickly.”

    Some researchers say DragonForce are primarily based in Malaysia, whereas others say Russia. Their e mail to M&S implies that they’re from China.

    Within the early levels of the M&S hack, unknown sources advised cyber information website Bleeping Laptop that proof is pointing to Scattered Spider.

    The UK’s national cyber-crime unit has confirmed to the BBC that the group is certainly one of their key suspects.

    As for the hackers I spoke to on Telegram, they declined to reply whether or not or not they have been Scattered Spider. “We can’t reply that query” is all they mentioned.

    A green promotional banner with black squares and rectangles forming pixels, moving in from the right. The text says: “Tech Decoded: The world’s biggest tech news in your inbox every Monday.”



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    The Daily Fuse
    • Website

    Related Posts

    How Cross-Cultural Engineering Drives Tech Advancement

    March 9, 2026

    Offshore Wind and Military Radar: Solving Security Gaps

    March 9, 2026

    Military AI Governance: Who Sets the Rules?

    March 8, 2026

    Laser 3D Printing Could Build Lunar Base Structures

    March 7, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Did Zelensky & Biden Deliberately Kill An American For Free Speech?

    February 21, 2025

    Ryan Blaney wins at New Hampshire, advances to Round of 8

    September 22, 2025

    Meghan Markle Sends Personal Note To Podcaster After Criticism Of Her Show

    March 21, 2025

    Russian Drone Attack Kills 3 in Kyiv Ahead of Cease-Fire Talks

    March 23, 2025

    Paramilitary Group in Sudan Agrees to Cease-Fire Proposal

    November 6, 2025
    Categories
    • Business
    • Entertainment News
    • Finance
    • Latest News
    • Opinions
    • Politics
    • Sports
    • Tech News
    • Trending News
    • World Economy
    • World News
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    • About us
    • Contact us
    Copyright © 2024 Thedailyfuse.comAll Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.