Cyber Fiends Battering Uk Retailers Now Turn To Us Stores

Interview The same miscreants behind recent cyberattacks on British retailers are now trying to dig their claws into major American retailers’ IT environments – and in some cases even deploying ransomware, according to Google.

The cloud giant’s threat-intel nerve-center Mandiant suspects the Scattered Spider (aka UNC3944) gang is behind these recent digital intrusions following a long hiatus and multiple arrests.

Scattered Spider had been relatively quiet until mid-April when it launched a series of attacks that claimed victims including retailers Marks & Spencer, Co-op, and Harrods

“About a week ago, we saw the expansion of the targeting to US-based retailers,” Charles Carmakal, chief technology officer of Mandiant Consulting, told The Register.

A lot of the disruption is caused by the company making changes to prevent Scattered Spider from being able to move across the network

“Now a number of organizations are actively defending against Scattered Spider intrusions, or they’re trying to recover environments because they had some level of impact,” Carmakal continued, putting the number of US retailers that have been targeted by the group at “under 10.”

Carmakal won’t say which companies have been affected, but noted that they are “bigger-name retail organizations,” not mom-and-pop stores.

“That impact could have been directly caused by the threat actor deploying across the environment, or it could just be self-inflicted because the company is taking actions to prevent the actors from stealing data or deploying encryptors, so they had to break things themselves,” he added.

That might mean companies have frozen authentication servers or taken down virtual private networks to keep intruders out — in the process preventing employees from authenticating or remotely accessing IT systems.

“Not all the downtime that’s caused by these incidents is directly related to Scattered Spider,” Carmakal said. “A lot of the disruption is caused by the company making changes to prevent Scattered Spider from being able to move across the network.”

Indeed, the BBC reports Co-op yanked its systems offline before too much damage could be done.

Ransomware du jour: DragonForce

Carmakal confirmed the criminals deployed DragonForce ransomware in some of the UK and US attacks.

“I’ve never seen them develop their own encryptor and deploy it across enterprises,” he noted. 

Previously, Scattered Spider members used ALPHV/BlackCat extortionware, until that group disbanded. Then they moved on to RansomHub, “and now we see them using DragonForce,” Carmakal said.

The loosely knit gang of cybercriminals, whose members are thought to include males in their teens and early 20s located primarily in the US and UK, scattered into the shadows following at least seven arrests last year.

“That spooked some core members of Scattered Spider, and they went on a hiatus for many months,” Carmakal said. “And then all of a sudden, about a month ago we started seeing this uptick in attacks against UK retailers. The trade craft looked very similar to what we’d seen in the past by previous Scattered Spider intrusion activity.”

The gang tends to focus their intrusions on a single sector at a time — remember the casino and resort capers in 2023? — and now retailers are taking the brunt. But, according to Carmakal, “the important thing to note about these folks is they’ve got shiny object syndrome. My guess is this adversary will pivot to the next sector in a few weeks, once they feel like they’ve gotten all they needed out of retail.”

In the meantime, the criminals have put another big target on their backs. 

“Anytime you have high profile cyber security events that are attributed to known groups, you could expect that there will be law enforcement action,” Carmakal said. “I can’t comment on the timing, but threat actors really do need to take note that there’s a good chance that more actions will be taken.” ®


Original Source


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.