Close Menu
    Trending
    • Get All 291 Episodes Of Dragon Ball Z On Blu-Ray For $115
    • Did Galactic Battle tank the Fortnite player count?
    • Cybercriminals Are Hiding Malicious Web Traffic in Plain Sight
    • The ‘Wheel of Time’ Showrunner Still Hopes Its Story Continues Elsewhere
    • Latest stock availability for consoles and games
    • Canadian artists thrive as Spotify hits record $10 Billion payout to music industry
    • Nintendo Switch 2 is a rare sequel that’s better than the original
    • How To Use Zelda Notes App For Tears Of The Kingdom And Breath Of The Wild
    Tech Trends Today
    • Home
    • Technology
    • Tech News
    • Gadgets & Tech
    • Gaming
    • Curated Tech Deals
    • More
      • Tech Updates
      • 5G Technology
      • Accessories
      • AI Technology
      • eSports
      • Mobile Devices
      • PC Gaming
      • Tech Analysis
      • Wearable Devices
    Tech Trends Today
    Home»Tech Analysis»BBC reporter on talking to the hackers
    Tech Analysis

    BBC reporter on talking to the hackers

    GizmoHome CollectiveBy GizmoHome CollectiveMay 26, 202507 Mins Read
    Share Facebook Twitter Pinterest Copy Link LinkedIn Tumblr Email Telegram WhatsApp
    Follow Us
    Google News Flipboard
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    Joe Tidy

    Cyber correspondent, BBC World Service

    BBC A man with brown hair and wearing a light blue shirt looks in contemplation.BBC

    Joe Tidy interacted with hackers who claimed to have performed the M&S and Co-op hack

    Nearly day by day, my telephone pings with messages from hackers of all stripes.

    The great, the unhealthy, the not-so-sure.

    I have been reporting on cyber safety for greater than a decade, so I do know that lots of them like to speak about their hacks, findings and escapades.

    About 99% of those conversations keep firmly locked in my chat logs and do not result in information tales. However a latest ping was not possible to disregard.

    “Hey. That is Joe Tidy from the BBC reporting on this Co-op information, right?” the hackers messaged me on Telegram.

    “We’ve some information for you,” they teased.

    After I cautiously requested what this was, the individuals behind the Telegram account – which had no title or profile image – gave me the within monitor on what they claimed to have performed to M&S and the Co-op, in cyber assaults that precipitated mass disruption.

    By messages back-and-forth over the following 5 hours, it turned clear to me that these obvious hackers have been fluent English audio system and though they claimed to be messengers, it was apparent they have been carefully linked to – if not intimately concerned in – the M&S and Co-op hacks.

    They shared proof proving that that they had stolen an enormous quantity of personal buyer and worker data.

    I checked out a pattern of the info that they had given me – after which securely deleted it.

    A shop fridge with almost empty shelves, and a sign stuck on the window which says "Sorry we are having some availability issues which will be resolved shortly"

    Buyers have been met with empty cabinets at some UK Co-op shops in latest weeks

    Messages that confirmed suspicions

    They have been clearly annoyed that Co-op wasn’t giving in to their ransom calls for however would not say how a lot cash in Bitcoin they have been demanding of the retailer in trade for the promise that they would not promote or give away the stolen knowledge.

    After a dialog with the BBC’s Editorial Coverage crew, we determined that it was within the public curiosity to report that that they had offered us with proof proving that they have been chargeable for the hack.

    I shortly contacted the press crew on the Co-op for remark, and inside minutes the agency, who had initially downplayed the hack, admitted to workers, prospects and the inventory market concerning the vital knowledge breach.

    A lot later, the hackers despatched me an extended offended and offensive letter about Co-op’s response to their hack and subsequent extortion, which revealed that the retailer narrowly dodged a extra extreme hack by intervening within the chaotic minutes after its pc systems were infiltrated. The letter and dialog with the hackers confirmed what consultants within the cyber safety world had been saying since this wave of assaults on retailers started – the hackers have been from a cyber crime service referred to as DragonForce.

    Who’re DragonForce, you is likely to be asking? Primarily based on our conversations with the hackers and wider data, now we have some clues.

    DragonForce presents cyber felony associates numerous providers on their darknet web site in trade for a 20% lower of any ransoms collected. Anybody can enroll and use their malicious software program to scramble a sufferer’s knowledge or use their darknet web site for his or her public extortion.

    This has turn into the norm in organised cyber crime; it is often known as ransomware-as-a-service.

    Essentially the most notorious of latest occasions has been a service referred to as LockBit, however that is all however defunct now partly as a result of it was cracked by the police final yr.

    Following the dismantling of such teams, an influence vacuum has emerged. Cue a tussle for dominance on this underground world, resulting in some rival teams innovating their choices.

    Energy wrestle ensues

    DragonForce not too long ago rebranded itself as a cartel providing much more choices to hackers together with 24/7 buyer assist, for instance.

    The group had been promoting its wider providing since no less than early 2024 and has been actively focusing on organisations since 2023, in line with cyber consultants like Hannah Baumgaertner, Head of Analysis at Silobreaker, a cyber threat safety firm.

    “DragonForce’s newest mannequin consists of options resembling administration and consumer panels, encryption and ransomware negotiation instruments, and extra,” Ms Baumgaertner stated.

    As a stark illustration of the power-struggle, DragonForce’s darknet web site was not too long ago hacked and defaced by a rival gang referred to as RansomHub, earlier than re-emerging a couple of week in the past.

    “Behind the scenes of the ransomware ecosystem there appears to be some jostling – that is likely to be for prime ‘chief’ place or simply to disrupt different teams to be able to take extra of the sufferer share,” stated Aiden Sinnott, senior menace researcher from the cyber safety firm Sophos.

    Who’s pulling the strings?

    DragonForce’s prolific modus operandi is to publish about its victims, because it has performed 168 occasions since December 2024 – a London accountancy agency, an Illinois metal maker, an Egyptian funding agency are all included. But to date, DragonForce has remained silent concerning the retail assaults.

    Usually radio silence about assaults signifies {that a} sufferer organisation has paid the hackers to maintain quiet. As neither DragonForce, Co-op nor M&S have commented on this level, we do not know what is likely to be occurring behind the scenes.

    Establishing who the individuals are behind DragonForce is hard, and it isn’t identified the place they’re positioned. After I requested their Telegram account about this, I did not get a solution. Though the hackers did not inform me explicitly that they have been behind the latest hacks on M&S and Harrods, they confirmed a report in Bloomberg that spelt it out.

    In fact, they’re criminals and may very well be mendacity.

    Some researchers say DragonForce are based mostly in Malaysia, whereas others say Russia, the place many of those teams are regarded as positioned. We do know that DragonForce has no particular targets or agenda aside from getting cash.

    And if DragonForce is simply the service for different criminals to make use of – who’s pulling the strings and selecting to assault UK retailers?

    Within the early phases of the M&S hack, unknown sources instructed cyber information web site Bleeping Laptop that proof is pointing to a unfastened collective of cyber criminals often known as Scattered Spider – however this has but to be confirmed by the police.

    Scattered Spider will not be actually a bunch within the regular sense of the phrase. It is extra of a group which organises throughout websites like Discord, Telegram and boards – therefore the outline “scattered” which was given to them by cyber safety researchers at CrowdStrike.

    They’re identified to be English-speaking and possibly within the UK and the US and younger – in some circumstances youngsters. We all know this from researchers and former arrests. In November the US charged 5 males and boys of their twenties and youths for alleged Scattered Spider exercise. One in all them is 22-year-old Scottish man Tyler Buchanan, who has not made a plea, and the remaining are US based mostly.

    Crackdowns by police appear to have had little impact on the hackers’ dedication, although. On Thursday, Google’s cyber safety division issued warnings that it was beginning to see Scattered Spider-like assaults on US retailers now too.

    As for the hackers I spoke to on Telegram, they declined to reply whether or not or not they have been Scattered Spider. “We can’t reply that query” is all they stated.

    Maybe in a nod to the immaturity and attention-seeking nature of the hackers, two of them stated they wished to be often known as “Raymond Reddington” and “Dembe Zuma” after characters from US crime thriller The Blacklist which entails a wished felony serving to police take down different criminals on a blacklist.

    In a message to me, they boasted: “We’re placing UK retailers on the Blacklist.”

    A green promotional banner with black squares and rectangles forming pixels, moving in from the right. The text says: “Tech Decoded: The world’s biggest tech news in your inbox every Monday.”



    Source link

    Follow on Google News Follow on Flipboard
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
    GizmoHome Collective

    Related Posts

    NatWest apologises as banking app goes offline

    June 6, 2025

    M&S hackers sent abuse and ransom demand directly to CEO

    June 6, 2025

    Tesla shares hit as Trump-Musk feud explodes

    June 5, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Best Buy Offers HP 14-Inch Chromebook for Almost Free for Memorial Day, Nowhere to be Found on Amazon

    May 22, 2025

    The Best Sleeping Pads For Campgrounds—Our Comfiest Picks (2025)

    May 22, 2025

    Time has a new look: HUAWEI WATCH 5 debuts with exclusive watch face campaign

    May 22, 2025
    Latest Posts
    Categories
    • 5G Technology
    • Accessories
    • AI Technology
    • eSports
    • Gadgets & Tech
    • Gaming
    • Mobile Devices
    • PC Gaming
    • Tech Analysis
    • Tech News
    • Tech Updates
    • Technology
    • Wearable Devices
    Most Popular

    Best Buy Offers HP 14-Inch Chromebook for Almost Free for Memorial Day, Nowhere to be Found on Amazon

    May 22, 2025

    The Best Sleeping Pads For Campgrounds—Our Comfiest Picks (2025)

    May 22, 2025

    Time has a new look: HUAWEI WATCH 5 debuts with exclusive watch face campaign

    May 22, 2025
    Our Picks

    Two of the best skating games are back on Steam after being mysteriously pulled from sale months ago

    May 28, 2025

    Samsung Galaxy Z Fold 7 likely set for major screen upgrades

    June 5, 2025

    Seagate 20TB External Hard Drive Just $0.01 Per GB, Amazon Rushes to Empty Its Inventory

    May 30, 2025
    Categories
    • 5G Technology
    • Accessories
    • AI Technology
    • eSports
    • Gadgets & Tech
    • Gaming
    • Mobile Devices
    • PC Gaming
    • Tech Analysis
    • Tech News
    • Tech Updates
    • Technology
    • Wearable Devices
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    • About us
    • Contact us
    • Curated Tech Deals
    Copyright © 2025 Gizmohome.co All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.