Marks & Spencer cyber attack

Author
Discussion

Franco5

Original Poster:

398 posts

72 months

Tuesday 29th April
quotequote all
Is there anyone with cyber security knowledge that could guess at the details of what they are currently dealing with?

Natpen79

62 posts

31 months

Tuesday 29th April
quotequote all
I thought my missus was joking when she said she couldn’t return the clothes she was taking back an hour ago so came home with them. blabla

thetapeworm

12,435 posts

252 months

Tuesday 29th April
quotequote all
It's hard to know currently but as someone working in IT (inc security) for a retail business I'm frustrated by the lack of information being shared biglaugh

They're sticking with "cyber incident" but sources like BleepingComputer are saying it's a ransomware attack by Scattered Spider:

https://www.bleepingcomputer.com/news/security/mar...

There was talk of a breach back in February where the Active Directory NTDS.dit file was supposedly taken. This potentially gives someone able to decipher it access to pretty much every account.

M&S have seemingly just isolated as many systems as they can to prevent access so remote workers can't work and distribution hubs etc are cut off from systems and data.

A few years ago M&S outsourced over half of their IT to Tata Consultancy in India.

My assumption based on working with them on other accounts is they've promised the world, and charged accordingly, not delivered and nobody at M&S really checked so disaster recovery hasn't gone to plan.

Edited by thetapeworm on Tuesday 29th April 20:18

Alex Z

1,712 posts

89 months

Tuesday 29th April
quotequote all
As above, it looks like a ransomware attack. We won’t know for sure until they share more details, and that won’t happen till they are sure they have everything back under their control.

Lots of the warehouse staff are told to stay home, as are the dev teams.

Jimbo.

4,065 posts

202 months

Tuesday 29th April
quotequote all
This is not just any IT outage…

RobB_

1,070 posts

201 months

Tuesday 29th April
quotequote all
thetapeworm said:
A few years ago M&S outsourced over half of their IT to Tata Consultancy in India.
Don't TCS have most of UK retail sewn up? King of race to the bottom!

Might be few RFP's coming out hehe

eharding

14,425 posts

297 months

Tuesday 29th April
quotequote all
Alex Z said:
As above, it looks like a ransomware attack. We won’t know for sure until they share more details, and that won’t happen till they are sure they have everything back under their control.

Lots of the warehouse staff are told to stay home, as are the dev teams.
Imagine being the poor sod running the new M&S store in Madrid yesterday, although it might have been some form of blessed relief not being able to partake in the company's complete fustercluck on an IT infrastructure on account of there being no bleedin' electricity for the store's systems either.

768

16,245 posts

109 months

Tuesday 29th April
quotequote all
Azure tenant compromised through phishing attack, data exfiltrated subject to (time limited) ransom, bunch of next.js devs stting themselves. Possibly.

It's weird to me that, AIUI, they closed the checkout functionality themselves but left the site up. I assume they didn't think the actual website was compromised therefore, just the payment processing somehow. Doesn't quite add up to me, unless they've left their customers further exposed. I assume they've got external support in, NCSC have probably offered their advice too, not least on aspects like 2FA or what a Content-Security-Policy header is.

Quite a long time now to have not figured out the mechanism and stood up a fresh stack elsewhere.

vaud

54,331 posts

168 months

Tuesday 29th April
quotequote all
RobB_ said:
Don't TCS have most of UK retail sewn up? King of race to the bottom!

Might be few RFP's coming out hehe
To be fair to TCS, they are pretty good. The top of the India heritage service providers. They aren't cheap and increasingly like IBM (fixed terms, no flexibility). Nobody choose TCS for cost (pick HCL/Wipro if you just want cost arbitrage)

Cheap offshore IT as a mechanism from 10-15 years ago, all service providers use India for 60-90% offshore, depending on sector and countries being delivered to.

.:ian:.

2,522 posts

216 months

Tuesday 29th April
quotequote all
RobB_ said:
thetapeworm said:
A few years ago M&S outsourced over half of their IT to Tata Consultancy in India.
Don't TCS have most of UK retail sewn up? King of race to the bottom!

Might be few RFP's coming out hehe
Lots of doing the needful going on now I suspect... laugh

vaud

54,331 posts

168 months

Tuesday 29th April
quotequote all
.:ian:. said:
RobB_ said:
thetapeworm said:
A few years ago M&S outsourced over half of their IT to Tata Consultancy in India.
Don't TCS have most of UK retail sewn up? King of race to the bottom!

Might be few RFP's coming out hehe
Lots of doing the needful going on now I suspect... laugh
Most IT services providers have incidents. From Accenture to the smallest providers. They bring scale and a lot of systems for security, etc at a scale that a client can't do on their own.

However, no system is perfect and often it is the human squishy thing that opens a highly targeted payload that breaks the system, regardless of the service being insourced or outsourced.

I've seen some incredible attacks, including one at a major insurer who spent a lot on internal security (not outsourced) and still got breached. They estimated that the development for the package was several $m.

eharding

14,425 posts

297 months

Tuesday 29th April
quotequote all
vaud said:
They estimated that the development for the package was several $m.
Sorry, the budget for implementing the breach was $m?

What did the hackers do - find an administrator with all of the required credentials, and offer them the choice of $1m in cash in a brown paper bag after handing over the necessary authentication, or having their entire family fed to the pigs?

vaud

54,331 posts

168 months

Tuesday 29th April
quotequote all
eharding said:
Sorry, the budget for implementing the breach was $m?

What did the hackers do - find an administrator with all of the required credentials, and offer them the choice of $1m in cash in a brown paper bag after handing over the necessary authentication, or having their entire family fed to the pigs?
Implementing the breach. It was super complex and very, very smart in using compromised updates for a software package to create backdoors.

I'd share the details, but I need to check if it ever went public.

asfault

13,048 posts

192 months

Wednesday 30th April
quotequote all
Jimbo. said:
This is not just any IT outage…
This deserves more recognition.





However on a more serious note targeting a few big supermarkets like this would cause real problems in the country if more were affected at the same time.

Carl_VivaEspana

14,224 posts

275 months

Wednesday 30th April
quotequote all
Franco5 said:
Is there anyone with cyber security knowledge that could guess at the details of what they are currently dealing with?
My speculative guess is that it's a ransomware attack that encrypted their card payments system and all historical data.

It's also possible that the fire (ransomware) then spread when the ransom wasn't paid.



vaud

54,331 posts

168 months

Wednesday 30th April
quotequote all
asfault said:
However on a more serious note targeting a few big supermarkets like this would cause real problems in the country if more were affected at the same time.
Fortunately, while they often use the same back end systems (e.g. SAP) their individual architectures and security layers will be quite different, so unless the vulnerability is a common one it would be (very) hard to launch a multiple attack.

Interestingly a lot of sectors collaborate on security data - as it's not in the interest for the sector to be damaged, and as everyone is always being attacked, it's better to share confidentially - the sharing of attack data among SOCs and competitors is a strategic practice aimed at strengthening cybersecurity defenses across the board...

carl_w

9,780 posts

271 months

Wednesday 30th April
quotequote all
.:ian:. said:
Lots of doing the needful going on now I suspect... laugh
This deserved a laugh

Sheets Tabuer

20,154 posts

228 months

Wednesday 30th April
quotequote all
I'd imagine there's some long hours being put in by the IT department, it would also be interesting to know their rebuild strategy, you'd hope for air gapped backups but I'd imagine they'd be closely working with outside response teams and they may decide to go with a full rebuild.

Worked on two incidents and both avenues were taken by the respective organisations.

Actual

1,173 posts

119 months

Wednesday 30th April
quotequote all
Carl_VivaEspana said:
It's also possible that the fire (ransomware) then spread when the ransom wasn't paid.
Even if there was no widespread impact across different systems it would be cautious to shut everything down to limit potential damage and gradually reinstate. It's possible that the supply chain systems causing warehouse staff to be sent home are not affected but have been isolated as a precaution. The cure could be worse than the disease but for good reason.

White-Noise

5,086 posts

261 months

Wednesday 30th April
quotequote all
carl_w said:
.:ian:. said:
Lots of doing the needful going on now I suspect... laugh
This deserved a laugh
clap

And revert.

I quite liked working with TCS in the past compared to others