DragonForce Goes Retail: Inside the Cyber Siege of M&S, Co-op, and Harrods

DragonForce Goes Retail: Inside the Cyber Siege of M&S, Co-op, and Harrods
The DragonForce ransomware group has shifted from hacktivism to a profit-driven Ransomware-as-a-Service model, impacting major UK retail organizations. Recent attacks on M&S, Co-op, and Harrods demonstrate their growing capabilities and the serious cybersecurity risks they pose.

Affected: M&S, Co-op, Harrods

Keypoints

  • DragonForce has transformed from hacktivists into a profit-driven Ransomware-as-a-Service (RaaS) operation, expanding their reach and impact.
  • The group employs social engineering, including phishing, impersonation, and SIM swapping, to gain initial access to targeted organizations.
  • Major UK retailers such as M&S, Co-op, and Harrods have been targeted, resulting in significant financial losses and operational disruptions.
  • Victims face threats of data exfiltration and leakage through a double extortion strategy, increasing pressure to pay ransoms.
  • Cyberattacks have led to online service disruptions, data breaches affecting millions, and restrictions on internet access in retail stores.
  • Organizations are advised to strengthen verification protocols, train employees, conduct regular security audits, and develop incident response plans.
  • Proactive cybersecurity measures and staff awareness are crucial to defending against evolving ransomware threats like DragonForce.

Read More: https://medium.com/@irembezci/dragonforce-goes-retail-inside-the-cyber-siege-of-m-s-co-op-and-harrods-0c02c927ad75

Views: 27