An IT security guy at a place I once worked said the executives were the biggest security vulnerability the company had because they wanted what they wanted and didn't care much about security. I think that's what tool Maersk down a few years ago - some exec installed malware that spread to the entire network.
"they normally put big all caps bold red warning if the person is a VIP, eg C suite, so they get VIP service - ie anything goes."
VessOnSecurity
in reply to Kevin Beaumont • • •cybernerd
Unknown parent • • •JaxxAI
Unknown parent • • •Simon B
Unknown parent • • •Kevin Beaumont
in reply to Kevin Beaumont • • •I'm going to make this the new ongoing megathread for DragonForce Ransomware Cartel's attack on UK retailers as they're all connected.
Why it matters: these are some of the UK's largest retailers, think Target or some such in a US sense.
Prior threads
M&S: cyberplace.social/@GossiTheDog…
Co-op: cyberplace.social/@GossiTheDog…
Harrods:
cyberplace.social/@GossiTheDog…
Kevin Beaumont (@GossiTheDog@cyberplace.social)
CyberplaceKevin Beaumont
in reply to Kevin Beaumont • • •The individuals operating under the DragonForce banner are using social engineering for entry.
Defenders should urgently make sure they have read the CISA briefs on Scattered Spider and LAPSUS$ as it's a repeat of the 2022-2023 activity.
Links: cisa.gov/sites/default/files/2…
cisa.gov/sites/default/files/2…
I would also suggest these NCSC guides on incident management: ncsc.gov.uk/collection/inciden…
and effective cyber crisis comms: ncsc.gov.uk/guidance/effective…
🌱 Ligniform
in reply to Kevin Beaumont • • •VessOnSecurity
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •Co-op Group have now admitted a significant amount of member (customer) information has been stolen by DragonForce Ransomware Cartel, saying they "accessed data relating to a significant number of our current and past members" - around 20 million people. The Membership database, basically. That includes home addresses and phone numbers etc.
Up until now Co-op hadn't even used the words cyber or threat actor, referring to an "IT issue" and "third party" in comms.
bbc.co.uk/news/articles/crkx3v…
Co-op DragonForce cyber attack includes customer data, firm admits
Joe Tidy (BBC News)Linus Lagerhjelm
in reply to Kevin Beaumont • • •for someone who is unfamiliar with the UK retail market, do you happen to know if Co-op is at all related to the Swedish company Coop that suffered from a major ransomware attack a couple of years ago?
bbc.com/news/technology-577075…
Swedish Coop supermarkets shut due to US ransomware cyber-attack
Joe Tidy (BBC News)Kevin Beaumont
in reply to Kevin Beaumont • • •New by me - breaking down the attacks on UK highstreet retailers
doublepulsar.com/dragonforce-r…
DragonForce Ransomware Cartel attacks on UK high street retailers: walking in the front door
Kevin Beaumont (DoublePulsar)Tryst 🏴
in reply to Kevin Beaumont • • •Third spruce tree on the left
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •Regarding IOCs around the UK retailer activity - there’s loads doing the rounds, and they’re almost all not useful.
Eg hundreds of dynamic VPN IPs from 2022. If you google them you’ll find them on vendor blogs from years ago for Scattered Spider - people are recycling in panic and passing around in panic.
Don’t hunt on random IOCs. IP addresses change. Strengthen foundational controls. Review sign in logs for abnormal activity etc.
Dave 🐶
in reply to Kevin Beaumont • • •Snoop
in reply to Kevin Beaumont • • •Orgs need to review their password reset process, share awareness to individuals who conduct password reset requests (IT helpdesk).
No IOC will help you identify social engineering activity.
Kevin Beaumont
in reply to Kevin Beaumont • • •Kevin Karhan
in reply to Kevin Beaumont • • •groff
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •Bleeping Computer have more on the Co-op breach bleepingcomputer.com/news/secu…
#threatintel #ransomware
../../nyanbinary
in reply to Kevin Beaumont • • •steeznson
in reply to Kevin Beaumont • • •UK cyber security at private firms tends to be very poor on average but social engineering remains the hacker's most effective tool.
Slack and Teams access in particular seems like a large attack vector. I believe the Twitter hack a few years back - when it was Twitter - was facillitated by superuser creds being pinned to a slack channel.
Kevin Beaumont
in reply to Kevin Beaumont • • •One of M&S’ biggest suppliers have said they have reverted to pen and paper for orders due to M&S lacking IT.
Additionally, M&S staff are raising concern about how they will be paid due to lack of IT systems.
M&S are over a week into a ransomware incident and still don’t have their online store working.
bbc.com/news/articles/cvgnyplv…
#threatintel #ransomware
M&S supplier back to pen and paper after cyber attack
Emma Simpson (BBC News)vampirdaddy
in reply to Kevin Beaumont • • •Rebuilding business is prioritised by importance. If the online shop is a small side hustle compared to the brick&mortar ones (or is much slower), then it’s lower priority.
Communicating the current status and expected progress is better, builds trust.
Wages usually are handled as lump payment, i.e. the same sum as last mont - and corrected later when the HR systems are back online.
The incidence response team should cover IT forensics, BCM and communication.
rickf
in reply to Kevin Beaumont • • •@metacurity
Mr. Rumbold is sure going to be busy…
penguin42
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •Mark Shane Hayden
in reply to Kevin Beaumont • • •🌬️
in reply to Kevin Beaumont • • •Dave 🐶
in reply to Kevin Beaumont • • •Tom DB 🦣
in reply to Kevin Beaumont • • •0xC0DEC0DE07E9
in reply to Kevin Beaumont • • •Pongolyn
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •Here's the ITV News report anyhoo, logline: "ITV News understands the the ongoing cyberattack faced by the supermarket has worsened since Friday, impacting the ordering system, drivers and warehouse staff."
itv.com/news/2025-05-03/worsen…
AnneH
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •Sunday Times has a piece looking into ransomware incident at Marks and Spencer. It's pretty good, goes into their contain and eradicate focus.
"By shutting down parts of the IT estate, Higham’s team had worked to prevent the attack from spreading, but had also stopped parts of its digital operations from functioning. This was considered a worthy trade-off."
One error in the article - lack of recovery doesn't mean no ransomware paid. Paying is not quick restoration.
thetimes.com/business-money/co…
Icare4America reshared this.
Kevin Beaumont
in reply to Kevin Beaumont • • •Big Game Ransomware: the myths experts tell board members
Kevin Beaumont (DoublePulsar)Kevin Beaumont
in reply to Kevin Beaumont • • •Great NCSC piece by @ollie_whitehouse
I’d add - block by Entra policy specifically High risk logins (below is too FP prone), and SOC monitor them. SOC playbook = account probably compromised. How?
ncsc.gov.uk/blog-post/incident…
Kevin Beaumont
in reply to Kevin Beaumont • • •Sky News quote a source in M&S head office saying Marks and Spencer have no ransomware incident plan so they are making it up as they go along apparently, with staff sleeping in the office and communicating via WhatsApp.
M&S dispute this, saying they have robust business continuity plans.
news.sky.com/story/amp/mands-h…
M&S 'had no plan' for cyber attacks, insider claims, with 'staff left sleeping in the office amid paranoia and chaos'
Tom Cheshire (Sky News)Kevin Beaumont
in reply to Kevin Beaumont • • •Beware phony IT calls after Co-op and M&S hacks, says UK cyber centre
Joe Tidy (BBC News)Kevin Beaumont
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •Co-op Group appear to be trying to course correct with their cyber incident comms.
They’re calling it a cyber incident now, and have put a statement on the front page of their website, along with an FAQ. They haven’t yet emailed members (they should). Edit: they’ve started emailing members.
coop.co.uk/cyber-incident
Pardon Our Interruption
www.coop.co.ukKevin Beaumont
in reply to Kevin Beaumont • • •Co-op shops stop taking card payments amid cyber attack
Daniel Woolfson (The Telegraph)Kevin Beaumont
in reply to Kevin Beaumont • • •People are also taking to social media to post pictures of apparently emptying store shelves.
The Co-op website claims it is down to "technical issues".
Kevin Beaumont
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •Co-op Group are redirecting supplies from their urban stores to remote and island locations due to stock shortages.
The article mentions their EDI platform is suffering “technical issues”. retailgazette.co.uk/blog/2025/…
Co-op reroutes stock to rural stores amid cyber attack disruptions - Retail Gazette
Georgia Wright (Retail Gazette)Kevin Beaumont
in reply to Kevin Beaumont • • •I just did a Shodan Safari on Co-op - basically all their Windows and Linux systems in their core DCs at network boundary are down, it's not just EDI. It's been like that for just under a week, prior to that things were still online.
I feel really bad for them as it's a great org. Also their CEO is basically the only one who stood up like this for trans people.
telegraph.co.uk/business/2025/…
Co-op boss vows to ‘protect trans people to the end’
Hannah Boland (The Telegraph)Kevin Beaumont
in reply to Kevin Beaumont • • •If you're wondering about Marks and Spencer - I just did a Shodan Safari of their network boundary, Palo-Alto GlobalProtect VPN remote access access is still offline, 15 days later.
Online orders are still not working, and the store stock checker is disabled now.
Kevin Beaumont
in reply to Kevin Beaumont • • •Co-op pauses deliveries of non-essential items amid cyber attack - Retail Gazette
Eloise Hill (Retail Gazette)Kevin Beaumont
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •M&S online shopping outage enters third week
Sabina Weston (Drapers)Kevin Beaumont
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •The Grocer reports 4 regional Co-ops, who aren’t part of Co-op Group, are suffering stock shortages as they are supplied by Co-op Group.
They expect customers to start to see availability issues on shelves in the coming days.
thegrocer.co.uk/news/co-op-soc…
Co-op societies hit by availability issues amid cyberattack
Alice Leader (The Grocer)Kevin Beaumont
in reply to Kevin Beaumont • • •For orgs looking for defence tips for the attacks on UK retailers, this blog from 2022 about the UK teenagers in LAPSUS$ has relevance.
As a plot twist - not documented anywhere online, but LAPSUS$ first attacks in 2021 were against UK high street retailers.
microsoft.com/en-us/security/b…
DEV-0537 criminal actor targeting organizations for data exfiltration and destruction | Microsoft Security Blog
Microsoft Threat Intelligence (Microsoft Security Blog)Kevin Beaumont
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •Hack rocks Marks & Spencer bureau de change
John-Paul Ford Rojas (This Is Money)Kevin Beaumont
in reply to Kevin Beaumont • • •Co-op Group have provided some more detail about what it’s doing about remote lifeline stores (ones where they’re the main/only retailer on an island):
“From Monday, 12 of the most remote lifeline stores will receive treble the volume of available product, and another 20 lifeline stores will get double the volume.” bbc.com/news/articles/c071e7x8…
Co-op cyber attack: Islanders facing empty shelves say 'get the people fed'
Paul Ward and Lorna Gordon (BBC News)Kevin Beaumont
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •Home
jobs.marksandspencer.comKevin Beaumont
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •Fears 'hackers still in the system' leave Co-op shelves running empty across UK
Alexander Martin (The Record)Kevin Beaumont
in reply to Kevin Beaumont • • •Allianz leads cyber cover for M&S ransomware attack
Abbie Day (Insurance Insider)Kevin Beaumont
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •This ITV News report linking the Co-op and M&S breaches to SIM swapping is not accurate, no source given. itv.com/news/2025-05-12/sim-sw…
They also have a report today saying Co-op stores are restocked, which is also not accurate - that one is sourced from Co-op, but obviously doesn’t stack up to looking in Co-op stores.
Kevin Beaumont
in reply to Kevin Beaumont • • •If anybody is wondering, all of Marks and Spencer's Palo-Alto GlobalProtect VPN boxes are still offline, 3 weeks later. Pretty good containment method to keep attackers out.
Co-op's VDE environment is still down, too.
cyberplace.social/@GossiTheDog…
Kevin Beaumont (@GossiTheDog@cyberplace.social)
CyberplaceKevin Beaumont
in reply to Kevin Beaumont • • •M&S says personal customer data stolen in recent cyber attack
Michael Race & Joe Tidy (BBC News)Kevin Beaumont
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •Co-op's AGM is this weekend, and M&S yearly results and investor contact are next week.
Gonna be awkward for different reasons, e.g. Co-op is member (customer) owned, so the people's data Co-op had stolen are effectively the shareholders and are invited.
Kevin Beaumont
in reply to Kevin Beaumont • • •CI Coop secures local supplies amid stock shortages
Caitlin Klein (BBC News)Kevin Beaumont
in reply to Kevin Beaumont • • •The Grocer reports Nisa and Costcutter are running out of fruit & veg, fresh meat and poultry, dairy products, chilled ready meals, snacks and desserts.
Nisa and Costcutter are supplied by Co-op Wholesale, which is dependent on Co-op Group.
“It’s really poor. I feel bad for them but what makes it worse is their hush-hush mentality about it. There’s no proper level of communication and we get random updates.”
Co-op Wholesale claim there are no problems. thegrocer.co.uk/news/nisa-and-…
Nisa and Costcutter hit by Co-op cyberattack stock shortages
Alice Leader (The Grocer)Kevin Beaumont
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •Co-op Group have told their suppliers that "systemic-based orders will resume for ambient, fresh, and frozen products commencing Wednesday 14 May". They say forecasting system will still be impacted.
thegrocer.co.uk/news/co-op-to-…
Co-op to get systems back on track after cyberattack
Alice Leader (The Grocer)Kevin Beaumont
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •M&S cyber insurance payout to be worth up to £100mn
Laura Onita (Financial Times)Kevin Beaumont
in reply to Kevin Beaumont • • •Co-op Group say they have exited containment and begun recovery phase theguardian.com/business/2025/…
Marks and Spencer are still in containment
If you want figures for your board to set expectations in big game ransomware incidents, Co-op containment just over 2 weeks, M&S just over 3 weeks so far - recovery comes after.
In terms of external assistance, Co-op have Microsoft Incident Response (DART), KPMG and crisis comms. M&S have CrowdStrike, Microsoft, Fenix and crisis comms.
Co-op cyber-attack: stock availability in stores ‘will not improve until weekend’
Sarah Butler (The Guardian)Kevin Beaumont
in reply to Kevin Beaumont • • •The threat actor at Co-op says Co-op shut systems down, which appears to have really pissed off the threat actor. This was the right, and smart, thing to do.
While I was at Co-op we did a rehearsal of ransomware deployment on point of sale devices with the retail team, and the outcome was a business ending event due to the inability to take payments for a prolonged period of time. So early intervention with containment was the right thing to do, 100%.
bbc.co.uk/news/articles/cwy382…
'They yanked their own plug': How Co-op averted an even worse cyber attack
Joe Tidy (BBC News)Kevin Beaumont
in reply to Kevin Beaumont • • •Co-op External Career Section Careers
Co-op External Career SectionKevin Beaumont
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •M&S have finally told staff that data about themselves was stolen: telegraph.co.uk/business/2025/…
You may notice I said they had staff data stolen on May 9th in this thread.
M&S staff data stolen by hackers in cyber attack
Matthew Field (The Telegraph)Kevin Beaumont
in reply to Kevin Beaumont • • •For the record, the tools listed in this article aren't used by Co-op.
computing.co.uk/news/2025/secu…
The link in the article to Vectra Cognito AI has a Coop Sweden logo on it, and the Coop Sweden CISO is named. Coop Sweden is different company. Coop Sweden went on to have a ransomware attack that crippled the org, including point of sale, so I don't think it's a good sales point. Same with Silverfort.
Google AI has ingested the article and now uses it to claim Co-op Group use the tools.
Here are the cyber tools Co-op used to help defeat its recent ransomware attack
www.computing.co.ukKevin Beaumont
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •M&S chief executive faces £1.1mn pay hit after cyber attack
Laura Onita (Financial Times)Kevin Beaumont
in reply to Kevin Beaumont • • •The Times reports M&S were breached through a contractor and that human error is to blame. (Both M&S and Co-op use TCS for their IT Service Desk).
The threat actor went undetected for 52 hours. (I suspect detection was when their ESXi cluster got encrypted).
M&S have told the Times they had no “direct” communication with DragonForce, which is code for they’re using a third party to negotiate - standard practice.
thetimes.com/uk/technology-uk/…
Kevin Beaumont
in reply to Kevin Beaumont • • •M&S looks to be moving to reposition their incident as a third party failure, which I imagine will help redirect some of the blame (they present their financial results during the week to investors): bbc.co.uk/news/articles/cpqe21…
Both M&S and Co-op outsourced their IT, including their Service Desk (helpdesk), to TCS (Tata) around 2018, as part of cost savings.
M&S hackers believed to have gained access through third party
Emma Simpson (BBC News)Kevin Beaumont
in reply to Kevin Beaumont • • •There's nothing to suggest TCS itself have a breach btw.
Basically, if you go for the lowest cost helpdesk - you might want to follow the NCSC advice on authenticating password and MFA token resets.
I've put a 3 part deep dive blog series coming out probably next week called Living-Off-The-Company, which is about how teenagers have realised large orgs have outsourced to MSPs who follow the same format of SOP documentation, use of cloud services etc. Orgs have introduced commonality to surf.
Kevin Beaumont
in reply to Kevin Beaumont • • •M&S Hong Kong not responding to Privacy Commissioner's Office after online customer data breach
Tom Grundy (Hong Kong Free Press HKFP)Kevin Beaumont
in reply to Kevin Beaumont • • •"Cyber analysts and retail executives said the company had been the victim of a ransomware attack, had refused to pay - following government advice - and was working to reinstall all of its computer systems."
Not sure who those analysts are, but since DragonForce haven't released any data and M&S won't comment other than to say they haven't had any "direct" contact with DragonForce, I wouldn't make that assumption.
reuters.com/business/retail-co…
Kevin Beaumont
in reply to Kevin Beaumont • • •There's also a line in the article from an cyber industry person saying "if it can happen to M&S, it can happen to anyone" - it's ridiculous and defeatist given Marks and Spencer haven't shared any technical information about how it happened, other than to tell The Sunday Times it was "human error"
The Air Safety version of cyber industry would be a plane crashing into 14 other planes, and industry air safety people going "Gosh, if that can happen to British Airways it could happen to anybody!"
Kevin Beaumont
in reply to Kevin Beaumont • • •Tomorrow it’s one month since Marks and Spencer started containment, it’s also their financial results day.
Online ordering still down, all recruitment stopped, Palo-Alto VPNs still offline.
Kevin Beaumont
in reply to Kevin Beaumont • • •TCS have been linked to the Marks and Spencer breach, at least in part.
reuters.com/business/retail-co…
Kevin Beaumont
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •M&S cyber-attack disruption to last until July and cost £300m
Lucy Hooker (BBC News)Kevin Beaumont
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •The NCA has confirmed on the record that the investigation into the M&S and Co-op hack is focused on English teenagers. I could toot the names of the people I think they’ll pick up, but won’t.
bbc.co.uk/news/articles/ckgnnd…
M&S and Co-op hacks: Scattered Spider is focus of police investigation
Joe Tidy (BBC News)Kevin Beaumont
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •Newk
in reply to Kevin Beaumont • • •Ivor Hewitt
in reply to Kevin Beaumont • • •Alda Vigdís
in reply to Kevin Beaumont • • •This stuff is brilliant. Based on e-paper and runs on Zigbee.
And they can raise the prices between you picking things off the shelf and going through the checkout and you'll have no proof that it was offered at a lower price.
Simon Zerafa
in reply to Kevin Beaumont • • •Brian Smith
in reply to Kevin Beaumont • • •Has been done since the ransomware incident.
Philip Johansson 🏴☠️💜
in reply to Kevin Beaumont • • •pssscht. Like that would ever happen lol
bbc.com/news/technology-577075…
Swedish Coop supermarkets shut due to US ransomware cyber-attack
By Joe Tidy (BBC News)ISO8601
in reply to Kevin Beaumont • • •e-paper price labels are apparently extremely common in mainland Europe. The UK is extremely slow to adopt things like this.
*In theory*, during an incident, the labels would remain as-is until they receive a new price. So TAs would specifically need to target the pricing database prior to wiping.
b3lt3r
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •TCS has a security incident running around the M&S breach.
Interestingly the source claims TCS aren't involved in Co-op's IT - which is categorically false, they took over most of it while I worked there, including the helpdesk, and my team (SecOps) after I left.
ft.com/content/c658645d-289d-4…
Tata Consultancy Services carries out internal probe into M&S hack
Chris Kay (Financial Times)Dave 🐶
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •Insurance Insider say Co-op Group have no cyber insurance policy.
It’s got the insurance industry hard as they think they can ambulance chase other orgs with it.
insuranceinsider.com/article/2…
M&S attacks could be the key to winning new cyber business
Abbie Day (Insurance Insider)AnneH
in reply to Kevin Beaumont • • •musevg
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •cybernerd
in reply to Kevin Beaumont • • •DragonForce actors target SimpleHelp vulnerabilities to attack MSP, customers
Sophos NewsJP
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •While Co-op have restored every customer facing system and internal systems like recruitment and remote working, M&S still don't even have recruitment back.
I'm reliably told they paid the ransom, so they'll be target #1 basically forever with other ransomware groups now due to resiliency woes and willingness to pay.
Otte Homan - remember Geordie
in reply to Kevin Beaumont • • •Alan Miller 🇺🇦
in reply to Kevin Beaumont • • •groff
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •bbc.co.uk/news/articles/c23mz5…
M&S boss's pay hits £7m before cyber attack chaos
BBC Newsfuzzyfuzzyfungus
in reply to Kevin Beaumont • • •VessOnSecurity
in reply to Kevin Beaumont • • •sigi714
in reply to Kevin Beaumont • • •Joel Michael
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •M&S staging walk-in recruitment open days amid cyberattack disruption
Steve Farrell (The Grocer)Jason Stuart
in reply to Kevin Beaumont • • •David Penington
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •This Daily Mail piece about security leaders thinking work-from-home means they will be crippled is horseshit, I'm not linking it.
They've taken a survey about how security people think their businesses couldn't survive ransomware, and linked it to working from home. WFH isn't the problem: business IT and resilience being built on quicksand is the problem.
SecureWaffle🧇
in reply to Kevin Beaumont • • •fuzzyfuzzyfungus
in reply to Kevin Beaumont • • •Looks like a product of the "a good lie contains as much truth as possible" school.
The connection to WFH is spurious; but only two thirds sounds low for "We don't really understand our problems; but they are probably apocalyptic".
fuzzyfuzzyfungus
in reply to Kevin Beaumont • • •The 'WFH' allegations seem in especially bad faith given the suspected entry point for the M&S compromise: the outsourced helpdesk.
Those guys are even more compliant labor than work-not-from-home employees, so the Daily Heil isn't going to say anything; but lack even the (informal; but in practice often at least reasonably effective) "does the IT person you just poked recognize who is interrupting with a password question?" ID verification step with onsite workers and onsite IT.
VessOnSecurity
in reply to Kevin Beaumont • • •Alun Jones
in reply to Kevin Beaumont • • •It wouldn't be the whole story either, but it's just as true.
Pino Carafa
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •Co-op say they have largely completed recovery, and have removed the cyber attack banner and statement from their website
retailgazette.co.uk/blog/2025/…
I think they did a great job. They do call it a "highly sophisticated attack", which, frankly.. isn't true and may come out in open court later if the suspects are ever caught.
6 weeks from containment to "near full" recovery, for statto nerds like me who track this stuff.
Co-op nears ‘complete recovery’ from cyber attack - Retail Gazette
Aoife Morgan (Retail Gazette)Simon B
in reply to Kevin Beaumont • • •Jasper
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •M&S had their ransomware incident communicated via internal email - from the account of a staff member who works for TCS.
The way TCS work is you give them accounts on your AD.
bbc.co.uk/news/articles/cr58pq…
M&S hackers sent abuse and ransom demand directly to CEO
Joe Tidy (BBC News)fuzzyfuzzyfungus
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •Marks and Spencer have started partial online shopping again.
For statto nerds, around 7 weeks from containment to partial recovery
bbc.co.uk/news/articles/c4gevk…
M&S restarts online orders after cyber attack
Michael Race (BBC News)Martin Seeger
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •TCS have told shareholders their systems were not compromised in the hack of M&S.
As an explainer here (not in the article): TCS IT systems weren't compromised. Their helpdesk service (they're AD admins at M&S) was used to gain access to M&S. They manage M&S IT systems.
reuters.com/business/media-tel…
Kevin Beaumont
in reply to Kevin Beaumont • • •Latest Marks and Spencer update is pretty crazy.
M&S haven't been able to supply sales data - so the British Retail Consortium (BRC) - used by the UK government as as economic indicator - basically made up figures for M&S and didn't tell people they had done this.
telegraph.co.uk/business/2025/…
Retail lobby group accused of M&S cyber cover-up
Hannah Boland (The Telegraph)Kevin Beaumont
in reply to Kevin Beaumont • • •Reddit - The heart of the internet
www.reddit.comEstiqaatsi
in reply to Kevin Beaumont • • •AnneH
in reply to Kevin Beaumont • • •fuzzyfuzzyfungus
in reply to Kevin Beaumont • • •I'd be very curious to know what the breakdown is between TCS dropping the ball and lying about it and M&S/Co-op not actually insisting on adequate procedure.
It's not terribly uncommon for people to only care about time-to-resolution with some lip service to user satisfaction when it comes to helpdesk metrics; and tacitly discourage things that are slow and unpleasant like hassling people for ID, at least until that becomes a visibly terrible idea.
RichBartlett
in reply to Kevin Beaumont • • •Simon Zerafa
in reply to Kevin Beaumont • • •"M-SThrowaway" might indicate M&S?
Or is that too obvious or deliberate obfuscation? 🙂🤷♂️
RootWyrm 🇺🇦
in reply to Kevin Beaumont • • •as someone who has been subjected to Tata on multiple occasions going back over a decade?
This isn't nearly spicy enough. I don't even describe them as a 'body shop' because they'd gladly route you to a corpse and try to charge extra for '24x7 coverage.'
When one employer did a basic security audit of their helpdesk services, Tata failed so severely that the contract was pulled for cause before the audit was even completed. They moved it all back in-house.
Dave 🐶
in reply to Kevin Beaumont • • •The root problem here isn't that TCS are shockingly bad (they are, just about everyone knows that).
The root problem is that "management decisions" constantly overrule those that raise concerns about their service and tell any remaining internal IT and security staff to "deal with it as best you can."
I'm very much of the view that, yes, the outsourced provider can be the cause of an incident, they can provide a shockingly bad service, they can cost your business millions of pounds. But the decision to continue to use them when you already know this is a real possibility - that's a decision by senior management within the company. That's on you.
Tony
in reply to Kevin Beaumont • • •Mark T. Tomczak
in reply to Kevin Beaumont • • •Interesting. I don't have the background on this specific attack, but I'm reminded of the Target credit card theft. An HVAC company near me was the point of entry for the attackers; they had high-access keys to Target's intranet because they install and maintain shopping-mall-grade HVAC and can remote-override it for maintenance and schedule reasons (nation-scale chain stores with giant footprints save not-inconsequential money on things like "Don't power up the HVAC to normal capacity on days nobody is here").
They had the keys on the same machine running their webserver.
(Meanwhile, Target actually did get an SEC slap-on-the-wrist for one specific thing: the HVAC intranet piece wasn't firewalled from the financial transactions and cash register source code pieces).
Brian Clark
in reply to Kevin Beaumont • • •Colin Haynes
in reply to Kevin Beaumont • • •Einhörnchen
in reply to Kevin Beaumont • • •Mike
in reply to Kevin Beaumont • • •K. Krithivasan, also known as Krithi, aka the face of quality IT, that you can trust.
Hash tag
These Indian, "IT", call centers probably do double time as scamming operations.
Hilarious twist would be that it was an inside job, faked to look like a compromise.
Kevin Beaumont
in reply to Kevin Beaumont • • •Marks and Spencer’s CEO says half of their online ordering is still offline after their ransomware incident, they hope to get open in next 4 weeks.
They are also rebuilding internal systems and hope a majority of that will be done by August.
Lesson: mass contain early. M&S didn’t. Co-op did.
reuters.com/business/retail-co…
penguin42
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •17 and two 19 year old teens picked up over Co-op and M&S hacks, and a 20 year old woman.
Pretend to be surprised.
bbc.com/news/articles/cwykgrv3…
Four arrested in connection with M&S and Co-op cyber attacks
Joe Tidy (BBC News)Rocketman
in reply to Kevin Beaumont • • •ian
in reply to Kevin Beaumont • • •kids these days 🙄
Just stay away from my bins!
aliengasmask
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •Wouter Hindriks
in reply to Kevin Beaumont • • •Simon B
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •raspberryswirl
in reply to Kevin Beaumont • • •F4GRX Sébastien
in reply to Kevin Beaumont • • •AJCxZ0
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •. @briankrebs has broken the story that the key member (and teenager) of LAPSUS$ runs Scattered Spider
krebsonsecurity.com/2025/07/uk…
UK Charges Four in ‘Scattered Spider’ Ransom Group
krebsonsecurity.comGraham Sutherland / Polynomial
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •Co-op finally admitted the entire membership database was stolen
I had this in the thread months ago, they originally tried to deny it entirely then tried to say ‘some’ data was accessed when they knew it was the whole thing.
bbc.co.uk/news/articles/cql0pl…
Co-op boss says sorry to 6.5m people who had data stolen in hack
Joe Tidy (BBC News)Kevin Beaumont
in reply to Kevin Beaumont • • •Personally I think Co-op did a really good job getting out of that situation and minimising impact.
I definitely think if you have a LAPSUS$ style advanced persistent teenagers situation, tilt towards open and honest comms as those kids will use secrecy against ya. It’s 2025, it’s okay to say you got hacked, people largely understand. Also, in IR, lawyers are usually stuck in 1980 advice - it’s just advice, they ain’t yo boss.
Dave 🐶
in reply to Kevin Beaumont • • •David Chisnall (*Now with 50% more sarcasm!*)
in reply to Kevin Beaumont • • •Probably the most damning indictment of the entire computing industry that I've seen for a long time.
I don't disagree at all. But this absolutely should not be the case and wouldn't be if we weren't still building core infrastructure around ideas that were known to be bad by the mid 1980s.
AnneH
in reply to Kevin Beaumont • • •tomwilescx
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •The people arrested as part of the Co-op and M&S hack investigation have been released on bail.
nation.cymru/news/four-people-…
Previously when this happened with LAPSUS$, they just continued hacking stuff.
Four people bailed after arrests over cyber attacks on M&S, Co-op and Harrods
Emily Price (Nation.Cymru)Martin Seeger
in reply to Kevin Beaumont • • •Rairii
in reply to Kevin Beaumont • • •CyberFrog
in reply to Kevin Beaumont • • •at this point I'm much more surprised when someone over 25 gets picked up for hacking stuff, I think some dude was helping gangs smuggle drugs into Rotterdam via hacking into the port logistical systems, they were like 41 with kids, that was way more unexpected to me lol
occrp.org/en/project/narcofile…
Inside Job: How a Hacker Helped Cocaine Traffickers Infiltrate Europe’s Biggest Ports
OCCRPAndy Davies
in reply to Kevin Beaumont • • •@tdp_org
If it is the case then the leaders of businesses like M&S who outsource these services to the lowest cost providers should also be held to account
It’s typical of British business management to know the cost of technology but not the value of it
Resuna
in reply to Kevin Beaumont • • •Bert Driehuis
in reply to Kevin Beaumont • • •In other words, their wetware was targeted.
"Our staff is our most valued asset. We depreciate on it."
Michael Weiss
in reply to Kevin Beaumont • • •Adrian Sanabria
in reply to Kevin Beaumont • • •Dave 🐶
in reply to Kevin Beaumont • • •The term 'user' in "no TCS systems or users compromised" could be more interesting to argue on in a civil liabilities case.
If a TCS staff member falls for social engineering (even if the action they take is within an assigned M&S tenant account...), is that not the same as a TCS user being compromised?
Anyway... I'm sure that statement won't at all be like rubbing salt in M&S's wounds.
Ret
in reply to Kevin Beaumont • • •CryptoMoose
in reply to Kevin Beaumont • • •Pete
in reply to Kevin Beaumont • • •Craig Stewart
in reply to Kevin Beaumont • • •Bebadefabo
in reply to Kevin Beaumont • • •lfzz
in reply to Kevin Beaumont • • •wasn't there some event, maybe 5 years ago, that meant a lot of WFH? Or did I hallucinate those times.
Is it suddenly a problem now or this is the same RTO bullshit being peddled?
Martin Vermeer FCD
in reply to Kevin Beaumont • • •Merry Christmas
in reply to Kevin Beaumont • • •RichBartlett
in reply to Kevin Beaumont • • •Richard Bairwell
in reply to Kevin Beaumont • • •Rairii
in reply to Kevin Beaumont • • •Simon Zerafa
in reply to Kevin Beaumont • • •Jason Stuart
in reply to Kevin Beaumont • • •Flippin' 'eck, Tucker!
in reply to Kevin Beaumont • • •Flippin' 'eck, Tucker!
in reply to Flippin' 'eck, Tucker! • • •Simon Zerafa
in reply to Kevin Beaumont • • •Graham Sutherland / Polynomial
in reply to Kevin Beaumont • • •Fennix
in reply to Kevin Beaumont • • •Dave 🐶
in reply to Kevin Beaumont • • •Otte Homan - remember Geordie
in reply to Kevin Beaumont • • •Michael Kohlman
in reply to Kevin Beaumont • • •Want to guess how much of my IT leadership career has been focused on building in-house expertise and dialing back the presence of MSPs?
Enough that it's made for a pretty good living...
Indieterminacy
in reply to Kevin Beaumont • • •Joel Michael
in reply to Kevin Beaumont • • •Ray—Golden Retriever Whisperer—🔝Insights
in reply to Kevin Beaumont • • •when I got my business degree, one of my management profs said that the instant you outsource, you give up control. To the service provider, you move from income to liability on the balance sheet because you now are costing them money, and to eke out any profit they need to cut costs related to providing service to you.
Thus you get all this *gestures vaguely*
Colin Macleod
in reply to Kevin Beaumont • • •"paints a ticking timebomb" - bit of a mixed metaphor, could be "paints a target" or "plants a ticking timebomb" ? 😎
The shortsightedness of outsourcing everything is undeniable though!
O'Schell
in reply to Kevin Beaumont • • •JP
in reply to Kevin Beaumont • • •Alex
in reply to Kevin Beaumont • • •I would love for IT to publish accident investigation reports in the same way as aviation.
No blame, no liability, no finger pointing, just lessons for everyone to learn and hopefully avoid the same.
(I know there have been some like the Irish Health Service that were excellent.)
Misuse Case
in reply to Kevin Beaumont • • •*sigh*Ber nard
in reply to Kevin Beaumont • • •1. Personnel is not allowed to store passwords.
2. Must use unique passwords for every service.
3. Passwords must rotate every X days.
4. Only sanctioned apps are allowed.
5. No password manager is sanctioned or installed by default.
*sigh*Ber nard
in reply to Kevin Beaumont • • •I recall it was a "TCS_80_ip" list in Entra Id marked "Trusted"/"MFA exempt" that contained 80 ranges from /15 to /24...
Yet happily pivoting through 3 layer deep RDP to get to a system to manage
AnneH
in reply to Kevin Beaumont • • •Fritz Adalis
in reply to Kevin Beaumont • • •sunflowerinrain
in reply to Kevin Beaumont • • •⊥ᵒᵚ⁄Cᵸᵎᶺᵋᶫ∸ᵒᵘ ☑️
in reply to Kevin Beaumont • • •caskfan
in reply to Kevin Beaumont • • •MattChippytea
in reply to Kevin Beaumont • • •Joel Michael
in reply to Kevin Beaumont • • •“we aren’t a computer company, so off to India / China / Vietnam / Philippines / etc for all this non-core-business shit”
…
“Why company not run without computers? Who did this?”
Michael Weiss
in reply to Kevin Beaumont • • •Adrian Sanabria
in reply to Kevin Beaumont • • •to be fair, IIRC, Coop Sweden went down because their payment provider used Kaseya.
So, it was ransomware on a fourth party, nothing Coop Sweden had any direct control over
Rob\Viewdata UK
in reply to Kevin Beaumont • • •Gary Parker
in reply to Kevin Beaumont • • •Ben Hardill
in reply to Kevin Beaumont • • •VessOnSecurity
in reply to Kevin Beaumont • • •Philipp Blum
in reply to Kevin Beaumont • • •Ben Hammond
in reply to Kevin Beaumont • • •The quote
> They torched shareholder value
made me laugh
they have no idea what the Coop is
John Kelly
in reply to Kevin Beaumont • • •Just glad some of the lessons sank in....
Damien
in reply to Kevin Beaumont • • •Dave 🐶
in reply to Kevin Beaumont • • •Dr. Christopher Kunz
in reply to Kevin Beaumont • • •Ivor Hewitt
in reply to Kevin Beaumont • • •Dave 🐶
in reply to Kevin Beaumont • • •lambtor
in reply to Kevin Beaumont • • •thanne
in reply to Kevin Beaumont • • •lp0 on fire
in reply to Kevin Beaumont • • •@GossiTheDog, TP;DR.
(Too portrait; didn't watch.)
CabbageBeets
in reply to Kevin Beaumont • • •Dave 🐶
in reply to Kevin Beaumont • • •Phil
in reply to Kevin Beaumont • • •John Francis 🦫🇨🇦🍁💪⬆️
in reply to Kevin Beaumont • • •the thieves could probably show up at the AGM and present themselves as a member, since they have access to all the information the Co-Op has on it's membership...number, address, etc.
Short of checking govt. ID or requiring a hard copy of the meeting invite that was mailed to their address. Even then, the thieves might've gotten away with that too.
Hywel Mallett
in reply to Kevin Beaumont • • •Dave 🐶
in reply to Kevin Beaumont • • •Everyday.Human Derek
in reply to Kevin Beaumont • • •greem
in reply to Kevin Beaumont • • •greem
in reply to Kevin Beaumont • • •Incident response specialists the world over wince into their keyboards.
This is another object lesson in how not to do it. It'll be taught to students in future.
Darran Lofthouse
in reply to Kevin Beaumont • • •Andy Herd 🏳️🌈🌳
in reply to Kevin Beaumont • • •I can only hope this data breach is the kick up the arse needed to abolish the common practice of using date of birth as an (immutable!) security password. Once it’s public knowledge it’s beyond useless… it’s a liability. Especially in banks.
I will not be holding my breath on this one.
Mike Spooner
in reply to Kevin Beaumont • • •shoaibusman88
in reply to Kevin Beaumont • • •David Penfold
in reply to Kevin Beaumont • • •Dave 🐶
in reply to Kevin Beaumont • • •Simon Zerafa
in reply to Kevin Beaumont • • •raspberryswirl
in reply to Kevin Beaumont • • •w00p
in reply to Kevin Beaumont • • •Dave 🐶
in reply to Kevin Beaumont • • •Julia Rez
in reply to Kevin Beaumont • • •Damien
in reply to Kevin Beaumont • • •Eldeberen
in reply to Kevin Beaumont • • •I was on holidays in Brodick (Arran, Scotland) last sunday, I can confirm the Co-op was low on products, with only potatoes available as fresh vegetables 😬
I though it was because it was a sunday late afternoon, but reading your thread it was clearly linked to the cyber incident
Samofhearts
in reply to Kevin Beaumont • • •Carsten
in reply to Kevin Beaumont • • •AnneH
in reply to Kevin Beaumont • • •Co-op cyber attack leaves island shop shelves empty
BBC NewsAlex Pardoe
in reply to Kevin Beaumont • • •Jon PENNYCOOK
in reply to Kevin Beaumont • • •Interpipes 💙
in reply to Kevin Beaumont • • •Paul Chambers🚧
in reply to Kevin Beaumont • • •Not sure if it is related, but M&S shuttered a flag-ship store without notice and earlier than planned on May 7th.
🔗 Marks and Spencer suddenly closes Aberdeen’s flagship St Nicholas branch after more than 80 years in city centre pressandjournal.co.uk/fp/news/…
archive.ph/q8IqV
Andy D
in reply to Kevin Beaumont • • •They've now admitted it -
BBC News - Personal customer data stolen in M&S cyber attack
bbc.com/news/articles/c62v34zv…
M&S says personal customer data stolen in recent cyber attack
Michael Race & Joe Tidy (BBC News)Dave Dustin
in reply to Kevin Beaumont • • •TrimTab 🇺🇦
in reply to Kevin Beaumont • • •Ghostrunner
in reply to Kevin Beaumont • • •Paul_IPv6
in reply to Kevin Beaumont • • •Anthropy
in reply to Kevin Beaumont • • •Dave 🐶
in reply to Kevin Beaumont • • •Simon Zerafa
in reply to Kevin Beaumont • • •w00p
in reply to Kevin Beaumont • • •ian
in reply to Kevin Beaumont • • •stony kark
in reply to Kevin Beaumont • • •Landwomble
in reply to Kevin Beaumont • • •Tom DB 🦣
in reply to Kevin Beaumont • • •Klaus Frank
in reply to Kevin Beaumont • • •Clemens Zauner
in reply to Kevin Beaumont • • •Well, that's an easy one. Just say that you are calling regarding the reported problem with Outlook.
On the one hand you have a ~90% Chance, that the called person had.a Problem in the last Week, and on the other hand will hand you over the username as well as the password immediately.
I'm somewhat surprised, that this had not been tried earlier.
C-rich
in reply to Kevin Beaumont • • •Phil Moss
in reply to Kevin Beaumont • • •◄◄ ► █ ►►
in reply to Kevin Beaumont • • •R.C.
in reply to Kevin Beaumont • • •C-rich
in reply to Kevin Beaumont • • •Gary Parker
in reply to Kevin Beaumont • • •Danny Palmer
in reply to Kevin Beaumont • • •Huh, might also explain why some of the shelves were so bare at my local yesterday.
(Also, it was a Bank Holiday Monday, but still)
v
in reply to Kevin Beaumont • • •groff
in reply to Kevin Beaumont • • •Gary Parker
in reply to Kevin Beaumont • • •Landwomble
in reply to Kevin Beaumont • • •Tom
in reply to Kevin Beaumont • • •Elias Mårtenson
in reply to Kevin Beaumont • • •R.C.
in reply to Kevin Beaumont • • •While in #BandQ today, the staff said they'd been having "some IT Issues like M&S"
Not sure if this was the staff just making a parallel of "generic IT issues" or if there has been some incident they haven't admitted yet
SensibleOtter
in reply to Kevin Beaumont • • •Can also confirm, from several years ago, that sometimes there is also an Executive Assistant with a flag in some systems to ‘call on behalf of’ C-Suite/VPs.
It’s like a privilege escalation on people exploit 🤣😂
Richard Stocks
in reply to Kevin Beaumont • • •The cult of “it’s an exec!” and thus able to bypass normal protocols has always made me cry - especially seeing as how they’re the ones with access to the juicy stuff and (usually) have low IT literacy and awareness.
Often, when I’ve worked with an org to help strengthen the help desk, the push back has been from the service desk management (scared that they’ll been seen as impeding the exec in the course of Important Work). Usually asking the question “would you rather be responsible for an extra 60 seconds on a call, or for the entire company being breached?” helps them to see the light.
The other source of friction is from the admin assistants of the execs who seem even more entitled than the execs themselves. An appeal to vanity (“we have to be extra careful when you call in because you’re in a very privileged position”) can work wonders.
Every time I’ve spoken directly with said execs and explained exactly why they are going to be asked to positively ID themselves for any interaction they have been 100% supportive.
kwayk42
in reply to Kevin Beaumont • • •Chester Wisniewski
in reply to Kevin Beaumont • • •Alesandro Ortiz 🇵🇷🏳️🌈
in reply to Kevin Beaumont • • •Kevin Riggle
in reply to Kevin Beaumont • • •wrosecrans
in reply to Kevin Beaumont • • •This is basically the plan for most businesses in reality.
It's fine to talk about stuff being "widely known best practice," but when IT shows up with big expenses for backups and security, the MBA's always decide it's more important to rightsize the headcount and operate lean. Many IT departments report up through an MBA and not a technical person, and many IT people are terrible at communicating risk dramatically enough to get money.
Matt Palmer
in reply to Kevin Beaumont • • •Floating Onion
in reply to Kevin Beaumont • • •StaffSRE1138
in reply to Kevin Beaumont • • •The thing that gets me is that the two statements are probably true for the people who said them. The Security group may have wargamed and prepared for malware attacks, and done so in a way that no one else in the technical stack even noticed happening (beyond some new agent installs being requested). So when the attack comes, the Security plan swings into action and no one outside of Security knows what it is or has practiced it.
This is high visibility. Executives step in to make Declarations, complicating the response. This is an incident big enough to need sub-commands to track various workflows, reporting up to a rotating incident command. Everyone wants to help, the workflows aren't well defined yet, and people help on their own authority (thanks to Command not having a clear picture yet and guiding where help would be good) and maybe make things worse in a few spots.
We had a plan.
It is chaos.
Both are true.
Dave 🐶
in reply to Kevin Beaumont • • •vampirdaddy
in reply to Kevin Beaumont • • •@ollie_whitehouse
Do egress filtering (esp. for servers) with alerting.
If there is unknown communication, then you have either a misconfiguration or a problem.
Keep critical IT infrastructure (network, firewalls, SAN/NAS, virtualisation, backups) separated from Active Directory.
Do not couple internet-facing systems (including VPN and M365) with your local AD.
Brian Clark
in reply to Kevin Beaumont • • •VessOnSecurity
in reply to Kevin Beaumont • • •I agree with most of your arguments. (In fact, the only one I take exception with is comparing ransomware with climate change. Ransomware is a much more real and urgent problem.) Those are pretty much arguments I've used myself when advising customers hit by ransomware not to pay.
But, ultimately, it's the company's decision. Even if the company makes the wrong decision, the government shouldn't be the one who decides for them.
See also this:
coveware.com/blog/2025/4/29/th…
"Decryption tools are worse than they’ve ever been."
The organizational structure of ransomware threat actor groups is evolving before our eyes
Bill Siegel (Coveware: Ransomware Recovery First Responders)Ivor Hewitt
in reply to Kevin Beaumont • • •dave
in reply to Kevin Beaumont • • •When the first indication appears, shut everything down. I have seen banks do this, and watched tellers calmly tell customers "I'm sorry, but the system is temporarily shut down" and start from there.
If the breach is stopped quickly enough, you may have a chance.
Also, what about off site storage, that would not be accessible to the attacker?
Ultimately, the decision is a risk management decision, to evaluate as quickly as you can
dave
in reply to Kevin Beaumont • • •"Travelex aren’t alone. When I covered the Capita ransomware, they paid quietly paid"
maybe delete one of the "paid"s
Gabriel Pettier
in reply to Kevin Beaumont • • •Jim Salter
in reply to Kevin Beaumont • • •OnlyMe
in reply to Kevin Beaumont • • •Inside the M&S meltdown: 3am meetings and £40m a week in lost sales — The Times and The Sunday Times
apple.newsResuna
Unknown parent • • •ian
Unknown parent • • •