Holywood News

Hackers use alias in TV shows claiming that UK retailers are “blacklisting” after cyberattacks on M&S and co-ops

The hacker responsible for the devastating cyber attacks on M&S and co-ops has allegedly placed all UK retailers on the “blacklist” of the “blacklist”.

The allegedly behind the nationwide clearance of supermarket shelves and massive disruptions, alleged hackers have now provided evidence that a large number of private customer and employee information has been stolen.

It was reported that five hours of exchange between the alleged cyber fraudster and the BBC Network correspondents, they Frustration at the fact that the cooperative did not give it a ransom requirement, and at the same time no confirmation Bitcoin The numbers require exchange of no disclosure or sale of stolen data.

And while keeping their identity and position unknown, the hackers even stressed their unwavering reputation and infamy, claiming that they ultimately wanted to be called “Raymond Reddington” and “Dembe Zuma,” two characters from the American hit-up crime thriller “Blacklist.”

In a message to the BBC, they boasted: “We are putting UK retailers on the blacklist.”

The 10 TV series, released in 2013, centers on the notorious international criminals and hopes to work with the FBI to find other criminals on a “blacklist”.

The BBC said the “English speakers” behind anonymous telegraph accounts were finally able to prove their intimate involvement in the cyber attack through multiple messages.

The hackers responsible for the devastating cyber attacks that attacked M&S and the co-ops reportedly told the BBC via telegram that they wanted to be called “Raymond Reddington” (right) and ‘dembe zuma’ (left) (left) (left) and two characters from the hit of the American crime thriller Blacklist, hit by the United States.

The picture shows Raymond Reddington of the popular program

The picture shows Raymond Reddington of the popular program “Blacklist” released in 2013.

According to reports, five hours of telegram messages were exchanged between alleged cyber fraudsters and BBC's cyber correspondents, they were frustrated that the cooperative did not give it a ransom requirement (file image)

According to reports, five hours of telegram messages were exchanged between alleged cyber fraudsters and BBC’s cyber correspondents, they were frustrated that the cooperative did not give it a ransom requirement (file image)

The exchange and other information provided ultimately leads the network correspondent to the final conclusion that the hacker is associated with the Dragonforce Hacking Group.

Dragonforce’s ransomware operation uses malware that prevents the target from accessing its own devices and data when triggered.

The criminals then use the stolen data as leverage to extort huge amounts of money, a process known as “ransomware-service”.

Although who ended up using the service to attack two popular UK retailers, several security experts believe the strategy used mimics a loosely coordinated group of hackers known as “scattered spiders” or “Octo Tempest.”

After the BBC reviewed the merger of evidence provided by the hackers, they contacted the co-op’s news team for comment. Until then, they claimed that popular retailers who initially downplayed the meaning of hackers eventually admitted widespread data breaches.

The cooperative has previously claimed that the cyber attack had only “small impact” on its operations and insisted that “there is no evidence that customer data is damaged.”

However, a co-op spokesperson later said that the hacker accessed data related to our current and past members.

After that, in an angry letter received by the hacker he was later accused, it was revealed that British stores “nearly avoided more serious hackers” shortly after their computer systems initially penetrated.

In an angry letter, the BBC was later received by alleged hackers, also revealed that British stores intervened shortly after their computer systems were initially infiltrated,

In an angry letter, the BBC was later received by alleged hackers, also revealed that British stores intervened shortly after their computer systems were initially infiltrated, “nearly avoiding more serious hackers.”

The quick-thinking cooperative owners have apparently

The quick-thinking cooperative owners have apparently “tightened the plug” on their system and found that the M&S system, which was also attacked by hackers, was seriously compromised

The quick-thinking boss has obviously “squeezed the plug” on their system and discovered that the M&S system was also targeted by the hackers and suffered serious compromises.

The hacker told the BBC: “The cooperative’s network has never suffered from ransomware. They pulled up their own plugs – sales, burning logistics and dispute shareholder value.

They added that they have successfully penetrated the cooperative’s systems and stole customer data and have been uploading malicious data when they were arrested.

Hackers have already limited the impact of the attack by shutting down certain IT systems, including part of their supply chain and logistics operations, resulting in a delivery disruption.

Turning off the computer prevents further damage from hackers, which means companies are able to isolate the system and evaluate what has been tampered with.

This means that while M&S is still patching together to get systems like online shopping back to work properly, the co-ops are able to recover faster.

The co-op said its food store and online availability will improve compared to this weekend, and its stock ordering system is now online again.

The cooperative said it was compared to this weekend

The cooperative said it was compared to this weekend

The hackers didn't find it in M&S's system for up to 52 hours before the devastating cyber attack was finally discovered. The crisis team then worked tirelessly to protect the beloved British store throughout the five-day period

The hackers didn’t find it in M&S’s system for up to 52 hours before the devastating cyber attack was finally discovered. The crisis team then worked tirelessly to protect the beloved British store throughout the five-day period

Now it is also able to accept payments in all forms, including contactless and chips and chips.

A spokesperson for the cooperative said on May 14: “After a malicious third-party cyber attack, we have taken early and decisive actions to limit access to our systems to protect our cooperative.

“We are now in the recovery phase and are taking steps to gradually bring our system online in a safe and controlled way.”

Meanwhile, M&S’s clients delayed the stock after a devastating hack three weeks ago, forcing it to stop selling online for five days – its share price fell by more than £500 million, with the company’s share price valued at a £1 billion stock exchange.

After the attack, some M&S stores left empty shelves as troubled retailers continued to fight a brutal hack.

Shoppers left anger in some outlets being “completely empty” including bananas, fruits and vegetables, fish and colins, caterpillar cakes in stock.

Insiders revealed that as the crisis continues to plague staple foods on British streets, staff are reportedly forced to work up to 24 hours a day while lasting a “sleepless night” to fix it.

The hackers didn’t find it in M&S’s system for up to 52 hours before the devastating cyber attack was finally discovered. Then throughout the five-day “attack phase”, the crisis team struggled tirelessly to protect the beloved British store, which frequently frequented 9.4 million active customers.

Alan Woodward, a professor of cybersecurity at the University of Surrey, told era He believes the store still cannot resume its online sales, and customers have been unable to receive any orders through the website or app since April 25, “which shows that they are getting a little less prepared than they should have.”

Alan Woodward, a professor of cybersecurity at the University of Surrey, told The Times that he believes M&S is still failing to resume its online sales, “It shows that they are getting less prepared than they should have done. Photo: Stuart Macchin, CEO of M&S

Alan Woodward, a professor of cybersecurity at the University of Surrey, told The Times that he believes M&S is still failing to resume its online sales, “It shows that they are getting less prepared than they should have done. Photo: Stuart Macchin, CEO of M&S

Pictured: trademarks and empty shelves in Spencer stores in Paddington, London on April 29. After the attack, some M&S stores left empty shelves as troubled retailers continued to be struggling with a brutal hacker.

Pictured: trademarks and empty shelves in Spencer stores in Paddington, London on April 29. After the attack, some M&S stores left empty shelves as troubled retailers continued to be struggling with a brutal hacker.

After the devastating attack, retailers are in a red alert for similar attacks, and as Dragonforce says it is expected to launch more.

In an interview with Bloomberg, its anonymous creator threatened to say it would normally expect a ransom payment of millions if the data was not received from retailers.

The team operates similarly to the Crime Cartel and sells its software to other hackers, such as the Scattered Spider-Man.

“Our job is not to destroy, we just take the money and go away,” it said. Dragonforce Hackers seized more than 90 victims last year and targeted companies in various industries.

The Information Commissioner’s Office said on May 2 that it is also studying the attacks, as well as similar major incidents involving M&S competitors’ cooperatives.

M&S and co-op customers are also urged to use strong passwords and different passwords on multiple platforms.

“We are working closely with law enforcement partners to investigate. We are considering incidents separately. However, we are paying attention to them that may be linked, so this will continue to be reviewed.”

Both the Co-op and M&S have been contacted for comment.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Check Also
Close
Back to top button