Hackers tried to ‘destroy’ Marks & Spencer, chair tells MPs | EUROtoday
Business reporter, BBC News

Marks & Spencer’s chair has stated the hackers behind April’s cyber assault had been “trying to destroy” the enterprise.
The retailer halted on-line orders and prospects had been confronted with empty cabinets in outlets following the assault, which M&S has stated will proceed to have an effect on prospects till the top of this month.
M&S chair Archie Norman advised MPs at a Business Select Committee the corporate believed hacker group DragonForce was accountable.
He stated the group’s motives had been “not entirely clear but [were] partly, undoubtedly, ransom or extortion”.
“It’s very rare to have a criminal actor from another – or in this country, we’re never quite sure – seeking to stop customers shopping at M&S, essentially trying to destroy your business for purposes which are not entirely clear but are partly, undoubtedly, ransom or extortion,” he stated.
“It’s like an out of body experience.”
Mr Norman described the expertise as “traumatic” and stated “for a week probably, the cyber team had no sleep – three hours a night”.
He added that although prospects will see the enterprise operating as regular by the top of July “background systems – that hopefully customers don’t see – we will still be working on October or November.”
M&S has predicted the assault will hit this 12 months’s earnings by round £300m, although Mr Norman stated the agency hoped to recuperate some this value from insurance coverage payouts.
Asked about regulation, Mr Norman stated he felt massive corporations needs to be required to report “material” cyber assaults.
“We have reason to believe that there have been two major cyber attacks of large British companies in the last four months that have gone unreported,” he stated, although he didn’t present any proof for this.
‘That’s all Horlicks’
Mr Norman admitted that the retailer had “legacy systems” due to the retailer’s age. “We probably wish we didn’t,” he stated.
He added that “with the benefit of hindsight” the corporate would have introduced ahead its deliberate know-how funding to strengthen its cyber-security methods.
“Would it have prevented the attack? Not necessarily, but that’s not a reason for not doing it.”
However, he hit again on the suggestion M&S’s methods had been susceptible.
“Just to be clear, there have been media reports that M&S left the back door open… that’s all Horlicks,” he stated including that “the attacker only has to be lucky once”.
“Ultimately, can the attacker get in? They probably can if they try hard enough.”
Mr Norman additionally revealed the attacker gained entry to the system by way of “sophisticated impersonation”.
He stated the agency dealt with the assault quite a bit higher than it could have achieved when he joined in 2017. Back then, he stated the enterprise was “broken” and combating debt.
“If this had happened then, I think we would have been kippered,” he stated.
Mr Norman stated the agency had practise drills to arrange for a cyber assault however “nothing survives the first whiff of gunshot”.
“The simulation… was nothing like what happened, the intensity of it,” he stated.
https://www.bbc.com/news/articles/cvg81m2mdmjo