BBC reporter on speaking to the hackers | EUROtoday
Cyber correspondent

Almost every day, my telephone pings with messages from hackers of all stripes.
The good, the unhealthy, the not-so-sure.
I’ve been reporting on cyber safety for greater than a decade, so I do know that a lot of them like to speak about their hacks, findings and escapades.
About 99% of those conversations keep firmly locked in my chat logs and do not result in information tales. But a current ping was inconceivable to disregard.
“Hey. This is Joe Tidy from the BBC reporting on this Co-op news, correct?” the hackers messaged me on Telegram.
“We have some news for you,” they teased.
When I cautiously requested what this was, the folks behind the Telegram account – which had no title or profile image – gave me the within monitor on what they claimed to have carried out to M&S and the Co-op, in cyber assaults that triggered mass disruption.
Through messages back-and-forth over the following 5 hours, it turned clear to me that these obvious hackers have been fluent English audio system and though they claimed be messengers, it was apparent they have been intently linked to – if not intimately concerned in – the M&S and Co-op hacks.
They shared proof proving that that they had stolen an enormous quantity of personal buyer and worker data.
I checked out a pattern of the info that they had given me – after which securely deleted it.

Messages that confirmed suspicions
They have been clearly annoyed that Co-op wasn’t giving in to their ransom calls for however would not say how a lot cash in Bitcoin they have been demanding of the retailer in alternate for the promise that they would not promote or give away the stolen information.
After a dialog with the BBC’s Editorial Policy crew, we determined that it was within the public curiosity to report that that they had offered us with proof proving that they have been answerable for the hack.
I rapidly contacted the press crew on the Co-op for remark, and inside minutes the agency, who had initially downplayed the hack, admitted to workers, prospects and the inventory market concerning the important information breach.
Much later, the hackers despatched me an extended indignant and offensive letter about Co-op’s response to their hack and subsequent extortion, which revealed that the retailer narrowly dodged a extra extreme hack by intervening within the chaotic minutes after its laptop programs have been infiltrated. The letter and dialog with the hackers confirmed what specialists within the cyber safety world had been saying since this wave of assaults on retailers started – the hackers have been from a cyber crime service referred to as DragonForce.
Who are DragonForce, you may be asking? Based on our conversations with the hackers and wider data, we have now some clues.
DragonForce gives cyber felony associates varied companies on their darknet website in alternate for a 20% reduce of any ransoms collected. Anyone can join and use their malicious software program to scramble a sufferer’s information or use their darknet web site for his or her public extortion.
This has turn into the norm in organised cyber crime; it is referred to as ransomware-as-a-service.
The most notorious of current occasions has been a service referred to as LockBit, however that is all however defunct now partly as a result of it was cracked by the police final 12 months.
Following the dismantling of such teams, an influence vacuum has emerged. Cue a tussle for dominance on this underground world, resulting in some rival teams innovating their choices.
Power wrestle ensues
DragonForce just lately rebranded itself as a cartel providing much more choices to hackers together with 24/7 buyer help, for instance.
The group had been promoting its wider providing since at the very least early 2024 and has been actively concentrating on organisations since 2023, in response to cyber specialists like Hannah Baumgaertner, Head of Research at Silobeaker, a cyber danger safety firm.
“DragonForce’s latest model includes features such as administration and client panels, encryption and ransomware negotiation tools, and more,” Ms Baumgaertner stated.
As a stark illustration of the power-struggle, DragonForce’s darknet web site was just lately hacked and defaced by a rival gang referred to as RansomHub, earlier than re-emerging a couple of week in the past.
“Behind the scenes of the ransomware ecosystem there seems to be some jostling – that might be for prime ‘leader’ position or just to disrupt other groups in order to take more of the victim share,” stated Aiden Sinnott, senior risk researcher from the cyber safety firm Secureworks.
Who is pulling the strings?
DragonForce’s prolific modus operandi is to submit about its victims, because it has carried out 168 occasions since December 2024 – a London accountancy agency, an Illinois metal maker, an Egyptian funding agency are all included. Yet to date, DragonForce has remained silent concerning the retail assaults.
Normally radio silence about assaults signifies {that a} sufferer organisation has paid the hackers to maintain quiet. As neither DragonForce, Co-op nor M&S have commented on this level, we do not know what may be occurring behind the scenes.
Establishing who the individuals are behind DragonForce is hard, and it is not recognized the place they’re positioned. When I requested their Telegram account about this, I did not get a solution. Although the hackers did not inform me explicitly that they have been behind the current hacks on M&S and Harrods, they confirmed a report in Bloomberg that spelt it out.
Of course, they’re criminals and might be mendacity.
Some researchers say DragonForce are based mostly in Malaysia, whereas others say Russia, the place many of those teams are regarded as positioned. We do know that DragonForce has no particular targets or agenda aside from being profitable.
And if DragonForce is simply the service for different criminals to make use of – who’s pulling the strings and selecting to assault UK retailers?
In the early phases of the M&S hack, unknown sources informed cyber information website Bleeping Computer that proof is pointing to a unfastened collective of cyber criminals referred to as Scattered Spider – however this has but to be confirmed by the police.
Scattered Spider shouldn’t be actually a bunch within the regular sense of the phrase. It’s extra of a neighborhood which organises throughout websites like Discord, Telegram and boards – therefore the outline “scattered” which was given to them by cyber safety researchers at CrowdStrike.
They are recognized to be English-speaking and possibly within the UK and the US and younger – in some circumstances youngsters. We know this from researchers and former arrests. In November the US charged 5 males and boys of their twenties and teenagers for alleged Scattered Spider exercise. One of them is 22-year-old Scottish man Tyler Buchanan, who has not made a plea, and the remaining are US based mostly.
Crackdowns by police appear to have had little impact on the hackers’ willpower, although. On Thursday, Google’s cyber safety division issued warnings that it was beginning to see Scattered Spider-like assaults on US retailers now too.
As for the hackers I spoke to on Telegram, they declined to reply whether or not or not they have been Scattered Spider. “We won’t answer that question” is all they stated.
Perhaps in a nod to the immaturity and attention-seeking nature of the hackers, two of them stated they needed to be referred to as “Raymond Reddington” and “Dembe Zuma” after characters from US crime thriller The Blacklist which entails a needed felony serving to police take down different criminals on a blacklist.
In a message to me, they boasted: “We’re putting UK retailers on the Blacklist.”

https://www.bbc.com/news/articles/cgr5nen5gxyo