BBC, British Airways and Boots staff data compromised by alleged Russian cyberhack

BBC, British Airways and retailer Boots said their staff were among those hit by a cyberattack on Zellis, a payroll provider used by hundreds of companies in Britain. (Reuters/File Photos)
Short Url
Updated 05 June 2023
Follow

BBC, British Airways and Boots staff data compromised by alleged Russian cyberhack

  • British Airways, owned by IAG, said it had notified affected employees and was providing them with support
  • The attack has been linked to a Russian cyber gang called Clop by experts

LONDON: British Airways and retailer Boots said their staff were among those hit by a cyberattack on Zellis, a payroll provider used by hundreds of companies in Britain.

The BBC also suffered a data breach, it said.

British Airways, owned by IAG, said it had notified affected employees and was providing them with support.

“We have been informed that we are one of the companies impacted by Zellis’ cybersecurity incident which occurred via one of their third-party suppliers called MOVEit,” BA said in a statement on Monday.

Part of the Walgreens Boots Alliance, Boots said the attack had included some of its employees’ personal details.

“Our provider assured us that immediate steps were taken to disable the server,” Boots said.

Boots employs over 50,000 people in Britain, while British Airways has about 30,000 staff.

A BBC a spokesperson said: “We are aware of a data breach at our third-party supplier, Zellis, and are working closely with them as they urgently investigate the extent of the breach.”

“We take data security extremely seriously and are following the established reporting procedures.

The attack has been linked to a Russian cyber gang called Clop by experts, who suggest the group gained access through a backdoor in a file transfer software used by Zellis.

The software in question is called MOVEit and is owned by Progress Software.

US security researchers warned on Thursday hackers had stolen data from the systems of a number of users of the file transfer tool MOVEit Transferone one day after the maker of the software disclosed that a security flaw had been discovered.

The compromised data includes names, addresses and national insurance numbers, said the Daily Telegraph newspaper, which first reported which companies had been affected by the breach.

* With Reuters


Iran hacking group claims attack on US medical company

Updated 6 sec ago
Follow

Iran hacking group claims attack on US medical company

  • It issued an open warning to what it described as “Zionist leaders and their lobbies,” adding: “This is only the beginning of a new chapter in cyber warfare.”

WASHINGTON: An Iran-linked hacking group claimed responsibility on Wednesday for a sweeping cyberattack on US medical technology giant Stryker, saying it had wiped more than 200,000 systems and extracted 50 terabytes of data in retaliation for military strikes on Iran.

“Our major cyber operation has been executed with complete success,” Handala said in a statement, describing the attack as retaliation for what it called “the brutal attack on the Minab school” and for “ongoing cyber assaults against the infrastructure of the Axis of Resistance.”

The group said it had shut down Stryker offices in 79 countries and that all extracted data was “now in the hands of the free people of the world.”

It issued an open warning to what it described as “Zionist leaders and their lobbies,” adding: “This is only the beginning of a new chapter in cyber warfare.”

Founded in Kalamazoo, Michigan, Stryker is a global medical device giant with some 56,000 employees and $25.12 billion in 2025 revenues, making everything from orthopedic implants and surgical instruments to hospital beds and robotic surgery systems.

The Handala group later posted that it had also carried out an attack on Verifone, which specializes in electronic and point-of-sale payments.

The outages began shortly after 0400 GMT on Wednesday, the Wall Street Journal reported, citing people familiar with the matter. Windows devices — including laptops and mobile phones connected to Stryker’s networks — were remotely wiped.