Jump to content
  • Sign Up
×
×
  • Create New...

Recommended Posts

  • Diamond Member

This is the hidden content, please

Co-op narrowly avoided an even worse cyber attack, BBC learns

The Co-op narrowly averted being locked out of its computer systems during the cyber attack that saw customer data stolen and store shelves left bare, the hackers who claim responsibility have told the BBC.

The revelation could help explain why the Co-op has

This is the hidden content, please
more quickly than fellow retailer M&S, which had its systems more comprehensively compromised, and is still unable to carry out online orders.

Hackers who have claimed responsibility for both attacks told the BBC they tried to infect Co-op with malicious software known as ransomware – but failed when the firm discovered the attack in action.

Both the Co-op and M&S declined to comment.

The gang, using the cyber crime service DragonForce, sent the BBC a long, offensive rant about their attack.

“Co-op’s network never ever suffered ransomware. They yanked their own plug – tanking sales, burning logistics, and torching shareholder value,” the criminals said.

But cyber experts like Jen Ellis from the Ransomware Task Force said the response from Co-op was sensible.

“Co-op seems to have opted for self-imposed immediate-term disruption as a means of avoiding criminal-imposed, longer-term disruption. It seems to have been a good call for them in this instance,” she said.

Ms Ellis said these kinds of crisis decisions are often taken quickly when hackers have breached a network and can be extremely difficult.

Speaking exclusively to the BBC, the criminals claimed to have breached Co-op’s computer systems long before they were discovered.

“We spent a while seated in their network,” they boasted.

They stole a large amount of private customer data and were planning to infect the company with ransomware, but were detected.

Ransomware is a kind of attack where hackers scramble computer systems and demand payment from victims in exchange for handing back control.

It would also have made the restoration of Co-op’s systems more complex, time-consuming and expensive – exactly the problems M&S appears to be wrestling with.

The criminals claim they were also behind the attack on M&S which struck over Easter.

Although M&S has yet to confirm it is dealing with ransomware, cyber experts have long said that is the situation and M&S has not issued any advice or corrections to the contrary.

Nearly three weeks on, the retailer is still struggling to get back to normal, as online orders are still suspended and some shops have had continued issues with contactless payments and empty shelves this week.

An analysis from Bank of America estimates the fallout from the hack is costing M&S £43m per week.

On Tuesday, M&S admitted personal customer data was stolen in the hack, which could include telephone numbers, home addresses and dates of birth.

It added the data theft did not include useable payment or card details, or any account passwords – but nonetheless urged customers to reset their account details and be wary of potential scammers using the information to make contact.

The Co-op seems to be recovering more quickly, saying its shelves will start to return to normal from this weekend.

Nonetheless it is expected to feel the effects of the cyber attack for some time.

“Co-op have acted quickly and their work on the recovery helps to soften things slightly, but rebuilding trust is a bit harder,” Prof Oli Buckley, a cyber security expert at Loughborough University, told the BBC.

“It will be a process of showing that lessons have been learned and there are stronger defences in place,” he added.

The same cyber-crime group has also claimed responsibility for

This is the hidden content, please
of the London department store Harrods.

The hackers who contacted the BBC say they are from DragonForce which operates an affiliate cyber crime service so anyone can use their malicious software and website to carry out attacks and extortions.

It’s not known who is ultimately using the service to attack the retailers, but some security experts say the tactics seen are similar to that of a loosely coordinated group of hackers who have been called Scattered Spider or Octo Tempest.

The gang operates on Telegram and Discord channels and is English-speaking and young – in some cases only teenagers.

Conversations with the Co-op hackers were carried out in text form – but it is clear the hacker, who called himself a spokesperson, was a fluent English speaker.

They say two of the hackers want to be known as “Raymond Reddington” and “Dembe Zuma” after characters from US crime thriller Blacklist which involves a wanted criminal helping police take down other criminals on a ‘blacklist’.

The hackers say “we’re putting *** retailers on the Blacklist”.



This is the hidden content, please

#Coop #narrowly #avoided #worse #cyber #attack #BBC #learns

This is the hidden content, please

This is the hidden content, please

For verified travel tips and real support, visit: https://hopzone.eu/

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Unfortunately, your content contains terms that we do not allow. Please edit your content to remove the highlighted words below.
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Vote for the server

    To vote for this server you must login.

    Jim Carrey Flirting GIF

  • Recently Browsing   0 members

    • No registered users viewing this page.

Important Information

Privacy Notice: We utilize cookies to optimize your browsing experience and analyze website traffic. By consenting, you acknowledge and agree to our Cookie Policy, ensuring your privacy preferences are respected.