Close Menu
    Facebook LinkedIn YouTube WhatsApp X (Twitter) Pinterest
    Trending
    • Chelsea F.C. partners with Damac for soccer-themed Dubai skyscraper
    • 10 Lessons from 10 years of innovation and engineering at Picnic
    • 13 Best Soundbars We’ve Tested and Reviewed (2025): Sonos, Sony, Bose
    • GOP sneaks decade-long AI regulation ban into spending bill
    • ‘Love Island USA’ Season 7: Release Date and Time on Peacock
    • The camera tech propelling shows like Adolescence
    • Step-by-Step Guide to Using AI for Professional Logo Design
    • This patient’s Neuralink brain implant gets a boost from Grok
    Facebook LinkedIn WhatsApp
    Times FeaturedTimes Featured
    Sunday, May 18
    • Home
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    • More
      • AI
      • Robotics
      • Industries
      • Global
    Times FeaturedTimes Featured
    Home»Tech Analysis»BBC reporter on talking to the hackers
    Tech Analysis

    BBC reporter on talking to the hackers

    Editor Times FeaturedBy Editor Times FeaturedMay 18, 2025No Comments7 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email WhatsApp Copy Link


    Joe Tidy

    Cyber correspondent

    BBC A man with brown hair and wearing a light blue shirt looks in contemplation.BBC

    Joe Tidy interacted with hackers who claimed to have completed the M&S and Co-op hack

    Nearly every day, my cellphone pings with messages from hackers of all stripes.

    The nice, the unhealthy, the not-so-sure.

    I have been reporting on cyber safety for greater than a decade, so I do know that a lot of them like to speak about their hacks, findings and escapades.

    About 99% of those conversations keep firmly locked in my chat logs and do not result in information tales. However a latest ping was unattainable to disregard.

    “Hey. That is Joe Tidy from the BBC reporting on this Co-op information, appropriate?” the hackers messaged me on Telegram.

    “Now we have some information for you,” they teased.

    Once I cautiously requested what this was, the individuals behind the Telegram account – which had no title or profile image – gave me the within observe on what they claimed to have completed to M&S and the Co-op, in cyber assaults that triggered mass disruption.

    By messages back-and-forth over the subsequent 5 hours, it turned clear to me that these obvious hackers had been fluent English audio system and though they claimed to be messengers, it was apparent they had been intently linked to – if not intimately concerned in – the M&S and Co-op hacks.

    They shared proof proving that that they had stolen an enormous quantity of personal buyer and worker info.

    I checked out a pattern of the information that they had given me – after which securely deleted it.

    A shop fridge with almost empty shelves, and a sign stuck on the window which says "Sorry we are having some availability issues which will be resolved shortly"

    Customers have been met with empty cabinets at some UK Co-op shops in latest weeks

    Messages that confirmed suspicions

    They had been clearly annoyed that Co-op wasn’t giving in to their ransom calls for however would not say how a lot cash in Bitcoin they had been demanding of the retailer in change for the promise that they would not promote or give away the stolen knowledge.

    After a dialog with the BBC’s Editorial Coverage crew, we determined that it was within the public curiosity to report that that they had offered us with proof proving that they had been liable for the hack.

    I rapidly contacted the press crew on the Co-op for remark, and inside minutes the agency, who had initially downplayed the hack, admitted to workers, prospects and the inventory market in regards to the important knowledge breach.

    A lot later, the hackers despatched me a protracted indignant and offensive letter about Co-op’s response to their hack and subsequent extortion, which revealed that the retailer narrowly dodged a extra extreme hack by intervening within the chaotic minutes after its pc systems were infiltrated. The letter and dialog with the hackers confirmed what specialists within the cyber safety world had been saying since this wave of assaults on retailers started – the hackers had been from a cyber crime service known as DragonForce.

    Who’re DragonForce, you is perhaps asking? Based mostly on our conversations with the hackers and wider data, we’ve some clues.

    DragonForce affords cyber legal associates varied providers on their darknet website in change for a 20% lower of any ransoms collected. Anybody can enroll and use their malicious software program to scramble a sufferer’s knowledge or use their darknet web site for his or her public extortion.

    This has grow to be the norm in organised cyber crime; it is referred to as ransomware-as-a-service.

    Essentially the most notorious of latest instances has been a service known as LockBit, however that is all however defunct now partly as a result of it was cracked by the police final 12 months.

    Following the dismantling of such teams, an influence vacuum has emerged. Cue a tussle for dominance on this underground world, resulting in some rival teams innovating their choices.

    Energy wrestle ensues

    DragonForce just lately rebranded itself as a cartel providing much more choices to hackers together with 24/7 buyer assist, for instance.

    The group had been promoting its wider providing since at the least early 2024 and has been actively focusing on organisations since 2023, in accordance with cyber specialists like Hannah Baumgaertner, Head of Analysis at Silobreaker, a cyber threat safety firm.

    “DragonForce’s newest mannequin consists of options corresponding to administration and shopper panels, encryption and ransomware negotiation instruments, and extra,” Ms Baumgaertner stated.

    As a stark illustration of the power-struggle, DragonForce’s darknet web site was just lately hacked and defaced by a rival gang known as RansomHub, earlier than re-emerging a few week in the past.

    “Behind the scenes of the ransomware ecosystem there appears to be some jostling – that is perhaps for prime ‘chief’ place or simply to disrupt different teams to be able to take extra of the sufferer share,” stated Aiden Sinnott, senior risk researcher from the cyber safety firm Secureworks.

    Who’s pulling the strings?

    DragonForce’s prolific modus operandi is to put up about its victims, because it has completed 168 instances since December 2024 – a London accountancy agency, an Illinois metal maker, an Egyptian funding agency are all included. But to date, DragonForce has remained silent in regards to the retail assaults.

    Usually radio silence about assaults signifies {that a} sufferer organisation has paid the hackers to maintain quiet. As neither DragonForce, Co-op nor M&S have commented on this level, we do not know what is perhaps occurring behind the scenes.

    Establishing who the persons are behind DragonForce is hard, and it is not identified the place they’re situated. Once I requested their Telegram account about this, I did not get a solution. Though the hackers did not inform me explicitly that they had been behind the latest hacks on M&S and Harrods, they confirmed a report in Bloomberg that spelt it out.

    In fact, they’re criminals and may very well be mendacity.

    Some researchers say DragonForce are based mostly in Malaysia, whereas others say Russia, the place many of those teams are regarded as situated. We do know that DragonForce has no particular targets or agenda apart from earning money.

    And if DragonForce is simply the service for different criminals to make use of – who’s pulling the strings and selecting to assault UK retailers?

    Within the early levels of the M&S hack, unknown sources instructed cyber information website Bleeping Laptop that proof is pointing to a free collective of cyber criminals referred to as Scattered Spider – however this has but to be confirmed by the police.

    Scattered Spider shouldn’t be actually a bunch within the regular sense of the phrase. It is extra of a group which organises throughout websites like Discord, Telegram and boards – therefore the outline “scattered” which was given to them by cyber safety researchers at CrowdStrike.

    They’re identified to be English-speaking and possibly within the UK and the US and younger – in some instances youngsters. We all know this from researchers and former arrests. In November the US charged 5 males and boys of their twenties and teenagers for alleged Scattered Spider exercise. Considered one of them is 22-year-old Scottish man Tyler Buchanan, who has not made a plea, and the remaining are US based mostly.

    Crackdowns by police appear to have had little impact on the hackers’ willpower, although. On Thursday, Google’s cyber safety division issued warnings that it was beginning to see Scattered Spider-like assaults on US retailers now too.

    As for the hackers I spoke to on Telegram, they declined to reply whether or not or not they had been Scattered Spider. “We cannot reply that query” is all they stated.

    Maybe in a nod to the immaturity and attention-seeking nature of the hackers, two of them stated they wished to be referred to as “Raymond Reddington” and “Dembe Zuma” after characters from US crime thriller The Blacklist which includes a wished legal serving to police take down different criminals on a blacklist.

    In a message to me, they boasted: “We’re placing UK retailers on the Blacklist.”

    A green promotional banner with black squares and rectangles forming pixels, moving in from the right. The text says: “Tech Decoded: The world’s biggest tech news in your inbox every Monday.”



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Editor Times Featured
    • Website

    Related Posts

    The camera tech propelling shows like Adolescence

    May 18, 2025

    Tesco resolves ‘software issue’ after customers flag app problems

    May 18, 2025

    Elton John brands government ‘absolute losers’ over AI copyright plans

    May 18, 2025

    Co-op says shelves to be more fully stocked this weekend

    May 14, 2025

    The Tech Guys Are Fighting. Literally.

    May 11, 2025

    Uber Revenue Is Up 14%, Despite Economic Fears

    May 8, 2025
    Leave A Reply Cancel Reply

    Editors Picks

    Chelsea F.C. partners with Damac for soccer-themed Dubai skyscraper

    May 18, 2025

    10 Lessons from 10 years of innovation and engineering at Picnic

    May 18, 2025

    13 Best Soundbars We’ve Tested and Reviewed (2025): Sonos, Sony, Bose

    May 18, 2025

    GOP sneaks decade-long AI regulation ban into spending bill

    May 18, 2025
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    About Us
    About Us

    Welcome to Times Featured, an AI-driven entrepreneurship growth engine that is transforming the future of work, bridging the digital divide and encouraging younger community inclusion in the 4th Industrial Revolution, and nurturing new market leaders.

    Empowering the growth of profiles, leaders, entrepreneurs businesses, and startups on international landscape.

    Asia-Middle East-Europe-North America-Australia-Africa

    Facebook LinkedIn WhatsApp
    Featured Picks

    8 Best Leggings (2025), Tested and Reviewed

    January 16, 2025

    Factors to Consider When Deciding Between Remote and Traditional Office Models

    August 16, 2024

    You Can Order At-Home COVID-19 Tests From USPS for Free

    September 30, 2024
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    Copyright © 2024 Timesfeatured.com IP Limited. All Rights.
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    • About us
    • Contact us

    Type above and press Enter to search. Press Esc to cancel.