Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    I tried 0patch as a last resort for my Windows 10 PC – here’s how it compares to its promises

    January 20, 2026

    A PC Expert Explains Why Don’t Use Your Router’s USB Port When These Options Are Present

    January 20, 2026

    New ‘Remote Labor Index’ shows AI fails 97% of the time in freelancer tasks

    January 19, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»M&S confirms that social engineering led a massive ransomware attack
    Security

    M&S confirms that social engineering led a massive ransomware attack

    PineapplesUpdateBy PineapplesUpdateJuly 9, 2025No Comments4 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    M&S confirms that social engineering led a massive ransomware attack
    Share
    Facebook Twitter LinkedIn Pinterest Email

    M&S confirms that social engineering led a massive ransomware attack

    The M&S today confirmed that the network of retail outlets was initially violated in the “refined copying attack”, which eventually caused the dragonforce ransomware attack.

    M&S President Archie Norman revealed this in a hearing with the UK Parliament’s Business and Trade Sub-Committee on economic security about the recent attacks on the retail in the country.

    While Norman did not go to the details, he said that the danger actors motivated one of the 50,000 people working with the company to cheat the third party unit to reset an employee’s password.

    Norman explained to the MPs, “Through the initial entry in our case, which was on 17th April, that people now say social engineering. As far as I can tell that I can tell that there is a expression to copy,” Norman explained to MPs.

    “And this was a sophisticated copy. They just did not go up and said if you would change my password. They appeared as someone with their details. And the point of the entry point included a third-party.”

    As Reported by FT In May, IT outsourcing company Tata Consultancy Services began an investigation whether it was inadvertently involved in the attack on M&S. Tata provides help desk support for M&S and is believed to have been cheated by threatened actors in resetting an employee’s password, which was then used to dissolve the M&S network.

    For the first time, M&S referred to the dragonforce ransomware operation as a potential assailant, which he said that he was working from Asia.

    “The incharge of the attack is considered a dragonforce, which is a ransomware operation based, we believe in Asia.”

    Since the attack, several media outlets have falsely known as “Dragonforce Malaysia”, with a halt, with a dragonforce ransomware gang. The hecticist is believed to be considered as a Palestine Group exiting Malaysia, while the dragonforce ransomware operation is considered in Russia.

    As the first reported by BlappingCopper, the attack on M&S was organized by danger actors associated with scattered spider who deployed the dragonforce ransomware on the network.

    This deliberately closed all its systems to prevent the spread of the attack to M&S.

    However, by then, it was too late, many VMware ESXI server encrypted and telling sources that Bleepingcomputer has been told that about 150GB of data was stolen.

    The ransomware operation employs a double-explosion strategy, which includes not only encrypting devices, but also threatening to publish data if not paid and ransom is not paid.

    While Bleepingcomputer was told that data was stolen in the attack, Dragonforce has not entered its data leak site for M&S. This may indicate that the retail chain paid the ransom demand to prevent the leaks of the stolen data.

    When asked about the ransom demands during the hearing, Norman said that they get out of their hands while working with the danger actors.

    Norman said, “We took a preliminary decision that no one in M&S would deal directly with the actors of danger.

    Norman is probably referring to ransomware dialogue firms that help companies get access to bitcoins to interact and pay payment with the danger actors.

    When asked whether he had paid the ransom demand, Norman said they were not discussing these details publicly because they “don’t think that it is in public interest,” but had fully shared the subject with NCA and officials.

    The Ransomware gang rarely do anything for free, and if the data was stolen and not yet leaked, either a payment has been made or the actor of the danger is still interacting with M&S.


    Tines needle

    While cloud attacks can be more sophisticated, the attackers still succeed with surprisingly simple techniques.

    Drawing by the detection of Vij in thousands of organizations, this report reveals the 8 major techniques used by Claude-Floid danger actors.

    Attack confirms engineering LED massive Ransomware social
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleMy favorite budget is even cheaper for Dutch Oven Prime Day
    Next Article Groke is sure that the antisemitic looks after its recent update
    PineapplesUpdate
    • Website

    Related Posts

    Startups

    Your Bluetooth headphones may be under attack – here’s what to do next

    January 15, 2026
    Startups

    This bright LED power bank proved to be my most useful blackout gadget

    January 13, 2026
    Startups

    Your smart home is at risk – 6 ways to protect your devices from attack

    December 6, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    10,000 steps or Japanese walk? We ask experts if you should walk ahead or fast

    June 16, 20250 Views

    FIFA Club World Cup Soccer: Stream Palmirus vs. Porto lives from anywhere

    June 16, 20250 Views

    What do chatbott is careful about punctuation? I tested it with chat, Gemini and Cloud

    June 16, 20250 Views
    Our Picks

    I tried 0patch as a last resort for my Windows 10 PC – here’s how it compares to its promises

    January 20, 2026

    A PC Expert Explains Why Don’t Use Your Router’s USB Port When These Options Are Present

    January 20, 2026

    New ‘Remote Labor Index’ shows AI fails 97% of the time in freelancer tasks

    January 19, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2026 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.