Cyber correspondent
BBCAlmost each day, my telephone pinges with messages from hackers of all stripes.
Good, unhealthy, no-no.
I’ve been reporting on cyber safety for greater than a decade, so I do know that a lot of them favor to speak about their hacks, conclusions and migration.
About 99% of those conversations are firmly closed in my chat log and don’t lead information tales. But just lately it was not possible to disregard a ping.
“Hey. This is right from BBC reporting on this co-op news, right?” Hackers messaged me on Telegram.
“We have some news for you,” they teased.
When I fastidiously requested what was it, the folks behind the Telegram account – who didn’t have any identify or profile image – gave me a observe on what he claimed that for M&S and Co -Aop, for Cyber assaults, which brought on mass disintegration.
Through the subsequent 5 hours backwards and forwards, it grew to become clear to me that these clear hackers had been fluent English audio system and though they claimed that they had been the messengers, it was clear that they had been intently connected-not concerned intimately-M&S and Co-Oop hack.
He shared proof, proving that he had stolen a considerable amount of non-public buyer and worker data.
I checked a pattern of the information they gave me – after which safely eliminated it.

Messages that affirm doubts
They had been clearly disillusioned that co-op was not giving their ransom calls for, however wouldn’t say how a lot cash they had been demanding in alternate for the retailer in bitcoin whether or not they would promote the stolen knowledge or not.
After a dialog with the BBC's editorial coverage group, we determined that this report was in public curiosity that they supplied proof that they had been liable for Hack.
I shortly contacted the press group within the co-op for remark, and inside minutes the agency, who initially lowered hack, was admitted to staff, clients and inventory markets about important knowledge violations.
Much later, the hackers despatched me an extended anger and aggressive letter about co-op's response to their hack and later pressured restoration, exhibiting that the retailer dodged a extra severe hack narrowly by intervening in chaotic minutes after his pc. The system was infiltrated. Letters and conversations with hackers confirmed what cyber safety specialists had been saying as a result of this wave of assaults on retailers began – hackers had been from a cyber crime service known as Dragonforce.
Who are the dragonforce, you have to be asking? Based on our interplay with hackers and complete data, we now have some clues.
Dragonforce affords varied providers to cyber prison colleagues on its darkish web site, which is in alternate for a 20% deduction of any ransom collected. Anyone can join and use their malicious software program to scrape the sufferer's knowledge or use their darkish web site for his or her public forcibly restoration.
It has change into a super in organized cyber crime; It is called Rainsmware-e-A-Service.
The most infamous service in current occasions known as lockbit, however it’s all partially defective because it was cracked by the police final 12 months.
After the dissolution of such teams, an influence vacuum has emerged. A quarrel for dominance on this underground world, innovation of their choices to some rival teams.
Power wrestle
Dragonforce just lately rejected itself as a cartel, for instance, supplies much more choices to hackers, together with 24/7 buyer support.
According to cyber specialists equivalent to Hannah Bomgartner, the top of analysis at a cyber threat safety firm, Silobekar, the group was promoting its widespread provide for the reason that starting of 2024 and has been actively focused by actively since 2023.
“The latest models of Dragonforce include features such as administration and client panels, encryption and ransomware dialogue tools, and many,” mentioned Ms. Bomgartner.
As a transparent illustration of the power-stragal, the darkish web site of the dragonforce was just lately hacked and was distorted by a rival gang known as Ranasamab earlier than once more every week in the past.
“Some jestaling appears behind the curtain of ransomware ecosystem – which may be for the status of the prime 'leader' or to disrupt other groups to take more parts of the victim,” mentioned Aiden Sinnott, senior risk researcher at cyber safety firm SecureWorkss mentioned, “Rainmine ecosystem curtains.
Who is pulling the wire?
Vipul Modus Aperandi of Dragonforce has to be posted about his victims, as it has done 168 times from December 2024 – a London accountancy firm, an Illinois Steel Manufacturer, an Egyptian investment firm. Nevertheless, dragonforce remains silent about retail attacks.
Radio silence usually indicates that a aggrieved organization has paid hackers to keep quiet. As neither dragonforce, co-op nor M&S commented on this point, we do not know what is happening behind the curtain.
To establish who people are behind the dragonforce are difficult, and it is not known where they are located. When I asked his Telegram account about this, I did not get any answer. Although the hackers did not clearly tell me that they were behind the recent hack on the M&S and Herods, they confirmed a report in Bloomberg that wrote it.
Of course, they are criminals and can lie.
Some researchers say that Dragonforce is located in Malaysia, while others say Russia, where many of these groups are considered located. We know that Dragonforce has no specific target or agenda other than making money.
And if the dragonforce is just the service to use other criminals – who is pulling the wire and choosing to attack the UK retailers?
In the early stages of the M&S hack, unknown sources told the cyber news site Blaping Computer that evidence is pointing to a loose collective of cyber criminals, known as scattered spider – but it has not yet been confirmed by the police.
The scattered spider is not actually a group in the general sense of the word. It is more than a community that conducts on sites such as discord, telegram and forum – so the “scattered” details that they were given by cyber security researchers in the crowdstruk.
He is known among the English-speaking and perhaps in teenagers in UK and US and Young. We know it from researchers and previous arrests. In November, the US accused five men and boys for its twenty -seventh condition and alleged scattered spider activity in teenagers. One of them is the 22 -year -old Scottish man Tyler Buchanan, who has not given a petition, and the rest are based.
However, Kracdown by the police has little impact on the determination of hackers. On Thursday, Google's Cyber Safety Division issued a warning that it was now starting looking at attacks such as spider scattered on American retailers.
For hackers I spoke on Telegram, they refused to answer whether they were scattered spider or not. “We is not going to reply that query” he said he said.
Perhaps in an indication for the immaturity and attention of hackers, two of them said that they wanted to go as “Raymond Redington” and “Damba Zuma”, which included blacklists after the characters of the American crime thriller, including a wanted criminal that leads the police to take other criminals on a blacklist.
In a message for me, he claimed: “We are placing British retailers on the blacklist.”

With inputs from BBC


