
Marks & Spencer’s Chief Resigns Following Devastating Ransomware Attack
A few weeks ago, UK retail giant Marks & Spencer (M&S) fell victim to a significant ransomware attack that severely disrupted its IT infrastructure, leading to substantial financial losses across various sectors.
In the wake of this cyber incident, Rachel Higham, the company’s Chief Technology Officer, has announced her decision to step down. Her departure paves the way for Sacha Berendji, the Operations Director, to take over her responsibilities. Early estimates suggest the attack could have wiped out as much as $300 million from M&S’s profits.
In situations like these, the technology heads often face intense scrutiny and blame for digital security breaches. Resigning after such incidents can be seen as an attempt to shield oneself from ongoing negativity, but it also leaves a lasting mark on one’s career. On the other hand, choosing to stay and weather the storm can offer a chance to clear one’s professional reputation and emerge stronger.
Higham has decided to take some time off after her resignation to focus on her personal life and recharge.
For context, M&S was targeted by a ransomware group called Scattered Spider, which operates under the alias DragonForce. This group is believed to be composed of English teenagers from the United States and the UK. After rebranding as Scattered Lapsus Hunters, the group also struck at Jaguar Land Rover, forcing a production halt that could last until October 2025.
US Government Offers $11 Million Bounty for Ukrainian Ransomware Criminal
In other cybercrime news, the US government has announced an $11 million reward for information leading to the capture of Volodymyr Tymoshchuk, a notorious Ukrainian hacker responsible for spreading ransomware across more than 250 companies. Over a span of just three years, Tymoshchuk is believed to have generated $18 billion in illicit profits.
Tymoshchuk is thought to be the mastermind behind high-profile ransomware attacks, including MegaCortex, LockerGaga, and Nefilim, which targeted major businesses in sectors like healthcare and finance. He operated between December 2018 and October 2021, and is currently believed to be hiding in an Asian country. If captured, he could be extradited to the US and face severe legal consequences, including life imprisonment.
Meanwhile, the US Department of State has also placed a $10 million bounty on the heads of three Russian cybercriminals as part of its Rewards for Justice program. The trio—Marat Valeryevich Tyukov, Pavel Aleksandrovich Akulov, and Mikhail Mikhailovich Gavrilov—are accused of launching devastating attacks on the US’s critical infrastructure, making them prime targets for law enforcement.
Join our LinkedIn group Information Security Community!
















