Concerted Attacks On British Retailers
Hackers have attacked Marks & Spencer (M&S), the Co-op and Harrods, with a threat of more attacks to follow. The Government has urged British businesses of all sizes to treat cyber security as an “absolute priority” following the wave of attacks on these leading retailers, with Cabinet Minister Pat McFadden describing the attacks as a wake-up call.
While details are presently unknown, the Co-op said that hackers gained access to the names and contact details of Co-op members but not their passwords, or details of bank, credit cards or transactions.
Now, the UK National Cyber Security Centre (NCSC) has issued new guidance to combat social engineering techniques used against the reatilers by the hackers, with a warning that the criminals launching these cyber attacks were pretending to be from the corporate IT Help Desk in order to penetrate organisations.
The NCSC is advising that organisations should reconsider how their IT teams "authenticates staff members" before resetting passwords, especially senior employees with access to high-level parts of an IT network, highlighting so called 'social engineering' as one the ways that hackers gain account access. Cyber criminals use social engineering techniques to get people to trust them when they email, text or call pretending to be from a company's IT team, with the aim of tricking employees into handing over their log in passwords and security codes. There is a reverse format of this exploit, that of calling IT team members and pretending to be an employee locked out of their account in order to obtain network access.
The NCSC says these tactics are associated with the English-speaking cyber criminals known as Scattered Spider.
This group are though to be responsible for dozens of ransom attacks on companies to steal data, lock files, damage IT systems and extort victims.Perhaps Scattered Spider's best know exploit was the attack on MGM Grand Casinos & Resorts which brought the company to its knees in September 2023.
In expert comment, Cynthia Overby, the Director of Security at Rocket Software made the following observations. “A ransomware attack has caused widespread disruption at retailer Marks & Spencer, halting all online orders and impacting online in-store payments as well in its UK stores. While we have no confirmation on who is responsible, a demand for payment is imminent if it hasn’t happened already.
“The malware used has locked down some of M&S’s central systems, rendering them inaccessible which explains the widespread disruption across stores and its online platforms. Since the retailer has chosen to remain silent beyond the prompt notification of its customers of the technical problems they’re experiencing, all we know is that the hackers most likely found their way in via social engineering techniques.
"Ransomware attacks not only wreak havoc on the IT infrastructure, it also shakes the foundations of brand trust and reputation...
...In those instances, many are tempted to just pay the ransomware and resolve the issue quickly. It bears noting however that paying ransomware holds no guarantees either. In many cases, the data cannot be recovered and the acquiescence only encourages future attacks.” Overby concluded.
There have been six arrests in the US and UK in the past year of hackers accused of being from Scattered Spider, however, the accused have denied they are part of Scattered Spider but from another group known as DragonForce, also known for ransom exploits. Originally positioned as a Pro-Palestine hacktivist-style operation, DragonForec has since shifted focus to financial gain and extortion
Researchers at SentineOne report that DragonForce claims to take a 20% share of successful ransomware payouts, allowing the affiliate to keep 80%, noting that this: “enables enterprising threat actors to launch seemingly unique ransomware operations, while leveraging DragonForce’s infrastructure and code.
For the developers, this offering allows DragonForce to profit from attacks by affiliates without having the brand tied to the attack or specific operators.”
NCSC | SentinelOne | BBC | Independent | The Times | Bristol Post | Decision Mareting | Yahoo
Image: Ideogram
You Might Also Read:
Understanding Social Engineering Attack Methods:
If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.
- Individual £5 per month or £50 per year. Sign Up
- Multi-User, Corporate & Library Accounts Available on Request
- Inquiries: Contact Cyber Security Intelligence
Cyber Security Intelligence: Captured Organised & Accessible