27.4 C
Canberra
Wednesday, March 4, 2026

Marks & Spencer’s ransomware nightmare


Over Easter, retail large Marks & Spencer (M&S) found that it had suffered a extremely damaging ransomware assault that left some store cabinets empty, shut down on-line ordering, some workers unable to clock out and in, and precipitated a few of its main suppliers to resort to pen and paper.

In a gloating abuse-filled electronic mail to M&S CEO Stuart Machin, the DragonForce hacker group claimed duty for the assault.

In response to a BBC Information report, the message learn partially:

“We’ve marched the methods from China all the way in which to the UK and have mercilessly raped your organization and encrypted all of the servers”

In a determined try to comprise the assault, M&S switched off the VPN utilized by workers to work remotely. Though this and different actions helped cease the assault from spreading, it additionally additional disrupted the corporate’s operations.

And there isn’t any doubt that the impression of the ransomware assault on M&S’s backside line have been important: it has suffered roughly £40 million per week in misplaced gross sales.

And the assault wasn’t simply information for the retail large and its suppliers. Final month, the corporate revealed for the primary time that buyer knowledge had been stolen by the hackers – together with phone numbers, dwelling addresses, and dates of delivery.

M&S has blamed “human error” for the cyber assault, and fingers have been pointed within the course of an worker of Tata Consultancy Providers (TCS), which supplies IT providers to the retail large.

Some have reported claims from insiders at M&S’s head workplace that the corporate not have a correct plan in place for dealing with a ransomware incident, though the agency has formally disputed this saying it did have sturdy enterprise continuity plans.

Regardless of the reality, it is clear that extra corporations must have put in place complete examined plans on learn how to remediate a ransomware assault and different sorts of cybersecurity breach.

They might even be clever to guage rigorously whether or not they’re at present doing sufficient to defend their techniques from a concerted assault by hackers – whether or not it arrives straight, or through a third-party provider.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

[td_block_social_counter facebook="tagdiv" twitter="tagdivofficial" youtube="tagdiv" style="style8 td-social-boxed td-social-font-icons" tdc_css="eyJhbGwiOnsibWFyZ2luLWJvdHRvbSI6IjM4IiwiZGlzcGxheSI6IiJ9LCJwb3J0cmFpdCI6eyJtYXJnaW4tYm90dG9tIjoiMzAiLCJkaXNwbGF5IjoiIn0sInBvcnRyYWl0X21heF93aWR0aCI6MTAxOCwicG9ydHJhaXRfbWluX3dpZHRoIjo3Njh9" custom_title="Stay Connected" block_template_id="td_block_template_8" f_header_font_family="712" f_header_font_transform="uppercase" f_header_font_weight="500" f_header_font_size="17" border_color="#dd3333"]
- Advertisement -spot_img

Latest Articles