to keep up with the inner workings of Westminster and beyond.
Sharing the link – the hackers wrote: "let's get the party started. Message us, we will make this fast and easy for us."The criminals also appear to have details about the company's cyber insurance policy too saying "we know we can both help each other handsomely : ))".
if the company has paid a ransom to the hackers.DragonForce ended the email with an image of a dragon breathing fire.The email confirms for the first time the link between M&S's hack and the
, which DragonForce have also claimed responsibility for.The two hacks - which began in late April - have wrought havoc on the two retailers. Some Co-op shelves were left bare for weeks, while M&S expects its operations to be disrupted until July.
Although we now know that DragonForce is behind both, it is still not clear who the actual hackers are.
DragonForce offers cyber criminal affiliates various services on their darknet site in exchange for a 20% cut of any ransoms collected.Matthew started exchanging messages with two women who the site suggested were his father's cousins. All were confused about how they could possibly be related.
Working together, they eventually tracked down birth records from 1946, months after the end of World War Two.The documents showed that one day after his father was apparently born, another baby boy had been registered at the same hospital in east London.
That boy had the same relatively unusual surname that appeared on the mystery branch of the family tree, a link later confirmed by birth certificates obtained by Matthew.It was a lightbulb moment.