Marks & Spencer cyber attack

Author
Discussion

Franco5

Original Poster:

390 posts

71 months

Yesterday (19:42)
quotequote all
Is there anyone with cyber security knowledge that could guess at the details of what they are currently dealing with?

Natpen79

57 posts

30 months

Yesterday (19:48)
quotequote all
I thought my missus was joking when she said she couldn’t return the clothes she was taking back an hour ago so came home with them. blabla

thetapeworm

12,378 posts

251 months

Yesterday (20:03)
quotequote all
It's hard to know currently but as someone working in IT (inc security) for a retail business I'm frustrated by the lack of information being shared biglaugh

They're sticking with "cyber incident" but sources like BleepingComputer are saying it's a ransomware attack by Scattered Spider:

https://www.bleepingcomputer.com/news/security/mar...

There was talk of a breach back in February where the Active Directory NTDS.dit file was supposedly taken. This potentially gives someone able to decipher it access to pretty much every account.

M&S have seemingly just isolated as many systems as they can to prevent access so remote workers can't work and distribution hubs etc are cut off from systems and data.

A few years ago M&S outsourced over half of their IT to Tata Consultancy in India.

My assumption based on working with them on other accounts is they've promised the world, and charged accordingly, not delivered and nobody at M&S really checked so disaster recovery hasn't gone to plan.

Edited by thetapeworm on Tuesday 29th April 20:18

Alex Z

1,701 posts

88 months

Yesterday (20:16)
quotequote all
As above, it looks like a ransomware attack. We won’t know for sure until they share more details, and that won’t happen till they are sure they have everything back under their control.

Lots of the warehouse staff are told to stay home, as are the dev teams.

Jimbo.

4,059 posts

201 months

Yesterday (20:45)
quotequote all
This is not just any IT outage…

RobB_

1,066 posts

200 months

Yesterday (20:56)
quotequote all
thetapeworm said:
A few years ago M&S outsourced over half of their IT to Tata Consultancy in India.
Don't TCS have most of UK retail sewn up? King of race to the bottom!

Might be few RFP's coming out hehe

eharding

14,386 posts

296 months

Yesterday (21:03)
quotequote all
Alex Z said:
As above, it looks like a ransomware attack. We won’t know for sure until they share more details, and that won’t happen till they are sure they have everything back under their control.

Lots of the warehouse staff are told to stay home, as are the dev teams.
Imagine being the poor sod running the new M&S store in Madrid yesterday, although it might have been some form of blessed relief not being able to partake in the company's complete fustercluck on an IT infrastructure on account of there being no bleedin' electricity for the store's systems either.

768

16,104 posts

108 months

Yesterday (21:19)
quotequote all
Azure tenant compromised through phishing attack, data exfiltrated subject to (time limited) ransom, bunch of next.js devs stting themselves. Possibly.

It's weird to me that, AIUI, they closed the checkout functionality themselves but left the site up. I assume they didn't think the actual website was compromised therefore, just the payment processing somehow. Doesn't quite add up to me, unless they've left their customers further exposed. I assume they've got external support in, NCSC have probably offered their advice too, not least on aspects like 2FA or what a Content-Security-Policy header is.

Quite a long time now to have not figured out the mechanism and stood up a fresh stack elsewhere.

vaud

54,128 posts

167 months

Yesterday (21:20)
quotequote all
RobB_ said:
Don't TCS have most of UK retail sewn up? King of race to the bottom!

Might be few RFP's coming out hehe
To be fair to TCS, they are pretty good. The top of the India heritage service providers. They aren't cheap and increasingly like IBM (fixed terms, no flexibility). Nobody choose TCS for cost (pick HCL/Wipro if you just want cost arbitrage)

Cheap offshore IT as a mechanism from 10-15 years ago, all service providers use India for 60-90% offshore, depending on sector and countries being delivered to.

.:ian:.

2,514 posts

215 months

Yesterday (21:31)
quotequote all
RobB_ said:
thetapeworm said:
A few years ago M&S outsourced over half of their IT to Tata Consultancy in India.
Don't TCS have most of UK retail sewn up? King of race to the bottom!

Might be few RFP's coming out hehe
Lots of doing the needful going on now I suspect... laugh

vaud

54,128 posts

167 months

Yesterday (21:37)
quotequote all
.:ian:. said:
RobB_ said:
thetapeworm said:
A few years ago M&S outsourced over half of their IT to Tata Consultancy in India.
Don't TCS have most of UK retail sewn up? King of race to the bottom!

Might be few RFP's coming out hehe
Lots of doing the needful going on now I suspect... laugh
Most IT services providers have incidents. From Accenture to the smallest providers. They bring scale and a lot of systems for security, etc at a scale that a client can't do on their own.

However, no system is perfect and often it is the human squishy thing that opens a highly targeted payload that breaks the system, regardless of the service being insourced or outsourced.

I've seen some incredible attacks, including one at a major insurer who spent a lot on internal security (not outsourced) and still got breached. They estimated that the development for the package was several $m.

eharding

14,386 posts

296 months

Yesterday (21:43)
quotequote all
vaud said:
They estimated that the development for the package was several $m.
Sorry, the budget for implementing the breach was $m?

What did the hackers do - find an administrator with all of the required credentials, and offer them the choice of $1m in cash in a brown paper bag after handing over the necessary authentication, or having their entire family fed to the pigs?

vaud

54,128 posts

167 months

Yesterday (21:59)
quotequote all
eharding said:
Sorry, the budget for implementing the breach was $m?

What did the hackers do - find an administrator with all of the required credentials, and offer them the choice of $1m in cash in a brown paper bag after handing over the necessary authentication, or having their entire family fed to the pigs?
Implementing the breach. It was super complex and very, very smart in using compromised updates for a software package to create backdoors.

I'd share the details, but I need to check if it ever went public.