Ransomware Drama at M&S: When Hackers Use the BBC for Customer Service!
Marks & Spencer’s chairman, Archie Norman, confirmed their April cyberattack was ransomware-related, involving DragonForce, but declined to reveal if a ransom was paid. He described the attack as a business nightmare, like finding out your Wi-Fi password was “12345” and hoping nobody noticed. Rebuilding systems was inevitable.

Hot Take:
When it comes to ransomware, M&S might just be wishing for a good old-fashioned buy-one-get-one-free deal on their cybersecurity measures! While the chairman’s poker face on ransom payouts might win him a spot in Vegas, the real jackpot here is the revelation that ransomware can make brushing your teeth a newsworthy experience. Who knew oral hygiene could be so dramatic?
Key Points:
- M&S confirmed a ransomware attack linked to Scattered Spider using DragonForce infrastructure.
- No direct comment on whether a ransom was paid, but hinted it’s a “business decision.”
- Attack leveraged compromised credentials from Tata Consultancy Services (TCS).
- Systems were shut down, impacting business operations significantly.
- Mandatory reporting of cyber incidents suggested as a necessity by M&S chairman.
Already a member? Log in here