M&S stops online orders and issues refunds after cyber attack

  • 🏰 The Fediverse is up. If you know, you know.
  • Want to keep track of this thread?
    Accounts can bookmark posts, watch threads for updates, and jump back to where you stopped reading.
    Create account
Link: https://www.bbc.com/news/articles/cdxnkg7rln2o
Credit: Tom Gerken & Graham Frazer, BBC Technology Reporters, with additional reporting by Liv McMahon
Archive: https://archive.ph/KAZkq

8.webp

Marks & Spencer (M&S) says it has stopped taking online orders as the company struggles to recover from a cyber attack.

Customers began reporting problems last weekend, and on Tuesday the retailer confirmed it was facing a "cyber incident".

Now, M&S has entirely paused orders on its website and apps - including for food deliveries and clothes - and says it will refund orders placed by customers on Friday.

The firm's shares fell by 5% following the announcement.

"We are truly sorry for this inconvenience," the retailer wrote in a post on X.
"Our experienced team - supported by leading cyber experts - is working extremely hard to restart online and app shopping.

"We are incredibly grateful to our customers, colleagues and partners for their understanding and support."

It said its stores remain open despite the issues affecting online ordering.

Ongoing issues​

Previously, the firm was dealing with problems which affected people using contactless payments, Click & Collect, as well as those paying with gift cards.

Since it suspended online ordering, M&S has responded to social media posts advising customers that these problems persist.

"Gift cards, e-gift cards and credit receipts can't currently be used as a payment method in store or online," it said in response to one person on X.

But it told another that if people have already received an email telling them an item is ready to be collected, they should be able to go into the store and pick it up.

"We're holding all parcels in store until further notice, so there's no risk of it being sent back," it said.

But some people have criticised the firm for its handling of the outage, particularly around its messaging to customers.

"After being told yesterday in the evening the problem with gift cards was sorted, went in store today and was sent away again," one person told the firm in a post on X.

They said it was the fourth day in a row they had tried and failed to use their M&S gift card.

Meanwhile despite the frustrations, some people online have praised in-store staff over their service amid the problems, and called for customers not to take their frustrations out on workers.

But many still appear to have questions over how existing purchases, orders and returns will be impacted by the continued fallout from the cyber attack.

Online grocer Ocado, which sells M&S food on its platform, is unaffected by the problems as it runs on a totally separate system.

8a7104f0-21e7-11f0-9060-674316cb3a1f.jpg.webp

The M&S website is now informing customers it has stopped taking online orders.


Online disruption​

A spokesperson from the Information Commissioner's Office told the BBC M&S it was "assessing the information provided" after M&S told it about the incident.

The firm previously said on Tuesday it had reported the incident to the National Cyber Security Centre (NCSC), and the National Crime Agency told the BBC it was working with the NCSC to support the firm.

In an update to investors on Friday, M&S said its decision to pause online orders in the UK formed part of its "proactive management" of the incident.

"The M&S team - supported by leading experts - is working extremely hard to restore online operations and continue to serve customers well," it said.

Amid the continuing fallout of this week's cyber attack, however, experts are speculating around what may be behind it.

Nathaniel Jones, vice president of Security & AI Strategy at cyber security firm Darktrace, said M&S halting online sales shows "the cascading impact these attacks can have on revenue streams".

"It demonstrates how quickly cyber incidents can cripple retail operations across both digital and physical channels," he said.

And William Wright from cybersecurity firm Closed Door Security said he believed it could have a "material impact" on the firm.

"Data shows almost a quarter of the store's sales happen online, so no matter how long this pause is put in place, it will hurt M&S financially," he said.

The retailer is the latest major name to experience significant disruption to its online services in recent months.

Morrisons faced huge problems with its Christmas orders last year, with deliveries cancelled and discounts not applied.

This was followed by two major banking outages on what was pay day for many in the first two months of this year.

In January, serious IT problems at Barclays affected the bank's app and online banking. It was later disclosed Barclays could face compensation payments of £12.5m.

In February, several banks - notably Lloyds - faced outages, leaving businesses unable to pay staff.
 
There’s “haha” pranks, but this is just being a dick for no reason. Not to mention a portion of their inventory is food, which may go stale. Lost revenue and lost product.

UK kiwis (UKiwis) Why would someone do this?
 
There’s “haha” pranks, but this is just being a dick for no reason. Not to mention a portion of their inventory is food, which may go stale. Lost revenue and lost product.

UK kiwis (UKiwis) Why would someone do this?
Because M+S sold out their quality and British made products and sent them to be made in bangladesh, costing jobs, reducing quality, but keeping the high price.

Fuck em.
 
A bunch of assholes have your credit and debit card info now. Good luck with that.
 
but will I receive my full cotton briefs
 
Alright I didn’t know that

So are they like SHEIN with a ton of child labor involved?
M&S (Marks & Spencer) is a British company which began life as a Penny Bazaar back in Leeds during the late 1800s. It grew to become one of the top UK High Street stores, mainly selling clothes but also food, financial products, cosmetics, flowers/gifts and home goods/homeware.

However, M&S has recently been caught at both ends of the Culture Wars crossfires - they went Woke and were accused of 'Gaywashing' for Pride Parades by UK Comedian Joe Lycett, for selling LGBT sandwiches among other things (Lettuce, Gherkin, Bacon, Tomato - because nothing screams solidarity with the poofs than spending over £3 on sandwiches). More recently, however, they are alleged to have funded GB News advertising, which pissed off the eternally traumatised even more.

Therefore, they're a target for both sides.

As @Bog-standard Poster rightly points out, they also outsourced a lot of their work to Bangladesh and in doing so the quality of their goods took a tumble.
 
Update: https://www.bbc.co.uk/news/articles/crkx3vy54nzo

Co-Op, M&S and Harrods affected by this hack by a group called 'DragonForce'.

Oh dear....
Archive

Co-op hackers stole 'significant' amount of customer data​

1 hour ago

Joe Tidy
Cyber correspondent, BBC World Service

Cyber criminals have told BBC News their hack against Co-op is far more serious than the company has previously told the public.

Hackers contacted the BBC with proof they had infiltrated IT networks and stolen huge amounts of customer and employee data.

After being approached on Friday, a Co-op spokesperson said the hackers "accessed data relating to a significant number of our current and past members".

Co-op had previously said that it had taken "proactive measures" to fend off hackers and that it was only having a "small impact" on its operations.

It also assured the public that there was "no evidence that customer data was compromised".

The cyber criminals claim to have the private information of 20 million people who signed up to Co-op's membership scheme, but the firm would not confirm that number.

The criminals, who are using the name DragonForce, say they are also responsible for the ongoing attack on M&S and an attempted hack of Harrods.

The anonymous hackers showed the BBC screenshots of the first extortion message they sent to Co-op's head of cyber security in an internal Microsoft Teams chat on 25 April.

"Hello, we exfiltrated the data from your company," the chat says.

"We have customer database, and Co-op member card data."
They also showed screenshots of a call with the head of security which took place around a week ago.

The hackers say they messaged other members of the executive committee too as part of their scheme to blackmail the firm.

Co-op has more than 2,500 supermarkets as well as 800 funeral homes and an insurance business.
It employs around 70,000 staff nationwide.

The cyber attack was announced by the company on Wednesday.

On Thursday, it was revealed Co-op staff were being urged to keep their cameras on during Teams meetings, ordered not to record or transcribe calls, and to verify that all participants were genuine Co-op staff.

The security measure now appears to be a direct result of the hackers having access to internal Teams chats and calls.

DragonForce shared databases with the BBC that includes usernames and passwords of all employees.

They also sent a sample of 10,000 customers data including Co-op membership card numbers, names, home
addresses, emails and phone numbers.

The BBC has destroyed the data it received, and is not publishing or sharing these documents.

DragonForce​

The Co-op membership database is thought to be highly valuable to the company.

Since the BBC contacted Co-op about the hackers' evidence, the firm has disclosed the full extent of the breach to its staff and the stock market.

"This data includes Co-op Group members' personal data such as names and contact details, and did not include members' passwords, bank or credit card details, transactions or information relating to any members' or customers' products or services with the Co-op Group," a spokesperson said.

DragonForce want the BBC to report the hack - they are apparently trying to extort the company for money.
But the criminals wouldn't say what they plan to do with the data if they don't get paid.

They refused to talk about M&S or Harrods and when asked about how they feel about causing so much distress and damage to business and customers, they refused to answer.

DragonForce is a ransomware group known for scrambling victims' data and demanding a ransom is paid to get the key to unscramble it. They are also known to have stolen data as part of their extortion tactics.

DragonForce operates an affiliate cyber crime service so anyone can use their malicious software and website to carry out attacks and extortions.

It's not known who is ultimately using the DragonForce service to attack the retailers, but some security experts say the tactics seen are similar to that of a loosely coordinated group of hackers who have been called Scattered Spider or Octo Tempest.

The gang operates on Telegram and Discord channels and is English-speaking and young – in some cases only teenagers.

Conversations with the Co-op hackers were carried out in text form - but it is clear the hacker, who called himself a spokesperson, was a fluent English speaker.

Co-op says it is working with the NCSC and the NCA and said in a statement it is very sorry this situation has arisen.
 
Back
Top Bottom