Ransomware Drama at M&S: When Hackers Use the BBC for Customer Service!

Marks & Spencer’s chairman, Archie Norman, confirmed their April cyberattack was ransomware-related, involving DragonForce, but declined to reveal if a ransom was paid. He described the attack as a business nightmare, like finding out your Wi-Fi password was “12345” and hoping nobody noticed. Rebuilding systems was inevitable.

Pro Dashboard

Hot Take:

When it comes to ransomware, M&S might just be wishing for a good old-fashioned buy-one-get-one-free deal on their cybersecurity measures! While the chairman’s poker face on ransom payouts might win him a spot in Vegas, the real jackpot here is the revelation that ransomware can make brushing your teeth a newsworthy experience. Who knew oral hygiene could be so dramatic?

Key Points:

  • M&S confirmed a ransomware attack linked to Scattered Spider using DragonForce infrastructure.
  • No direct comment on whether a ransom was paid, but hinted it’s a “business decision.”
  • Attack leveraged compromised credentials from Tata Consultancy Services (TCS).
  • Systems were shut down, impacting business operations significantly.
  • Mandatory reporting of cyber incidents suggested as a necessity by M&S chairman.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?