Fraud Management & Cybercrime
,
Geo Focus: The United Kingdom
,
Geo-Specific
Retailer Continues to Recover From Ransomware Incident

British retailer Marks & Spencer was reportedly targeted by financial crime group Scattered Spider, who deployed ransomware on the company’s VMware ESXi server.
See Also: Demostración Del Producto: Backup Y Recuperación De VM
The retailer continues to recover from a cyber incident that disrupted operations in its online and offline stores. Security experts told the BBC that the DragonForce ransomware group was behind the attack.
DragonForce emerged in August 2023 as a traditional ransomware-as-a-service group but earlier this year announced a shift under which it provides infrastructure and tools such ransom negotiation but allows hackers to hack under their own brand and use whatever malicious encrypter they want, Sophos reported on April 23.
Citing unidentified industry sources, BleepingComputer reported Monday that attack has the hallmarks of an operation conducted by members of the Scattered Spider cybergang. Hackers may have breached the British multinational retailer as early in February and stolen ntds.dit
, the main Active Directory Services database file. Hackers used extracted credentials to attack retailer VMWare ESXi hosts, it reported.
The attack is estimated to have wiped out 500 million pounds in stock valuation as of Thursday. Online orders has been paused since Friday and the BBC reported on Wednesday the retailer has had difficulty restocking food items.
Details of the ransom demanded are unknown. The company did not immediately respond to a request for comment.
Scattered Spider, also tracked as UNC3944, Scatter Swine and Oktapus, largely consists of members from the United States and the United Kingdom. Group members are suspected of targeted 130 organizations worldwide, including MGM Resorts, Clorox and to have stolen 391 bitcoins, valued over $27 million from its victims.
Spanish police last month extradited Tyler Buchanan, a 23-year-old suspected head of the Scattered Spider to the United States where he faces charges for wire fraud, aggravated identity theft and conspiracy (see: Suspected Scattered Spider Head Extradited From Spain).
Another leading member of the group, Noah Urban, pled guilty to federal charges tied to a string of cyberattacks on major U.S. companies last month.
Despite law enforcement action, the group is estimated to have stayed active throughout 2024, regularly targeting cloud infrastructure for credential theft (see: Hacks Targeting Cloud Single Sign-On Rose in 2024).