Celebrity data leaked after ransomware attack on London's Graff jewellers
Russia-based Conti ransomware group is demanding tens of millions in cryptocurrency


London-based diamond specialist Graff has reportedly been hit by a ransomware attack, prompting an investigation from the Information Commissioner's Office (ICO).
The attack is believed to have been carried out by Conti, an infamous Russia-based ransomware group that has also been blamed for a recent uptick in attacks across the US.
A total of 69,000 documents have been leaked on the dark web already, a number which represents just 1% of the total files Conti has stolen, the hacking group claimed. The list of victims includes high-profile names such as ex-footballers David Beckham and Frank Lampard, former president Donald Trump, actors Tom Hanks and Samuel L Jackson, and disgraced businessman Sir Philip Green, according to the Mail on Sunday, which first reported the story.
“We have received a report from Graff Diamonds Limited regarding a ransomware attack," said the ICO, in an email to IT Pro. "We will be contacting the organisation to make further enquiries in relation to the information that has been provided."
It's believed 11,000 of the company's customers may be affected, 600 of which are UK nationals, according to the Mail on Sunday. Information such as client lists, invoices, receipts, and credit notes were included in the hack.
In some cases, customer names and addresses used for billing and shipping were included, and in other cases details of what the customer bought - and the cost of said items - were leaked online.
Conti is believed to be demanding a sum in the tens of millions in order to prevent the further release of customer information, however Graff has said it has been able to rebuild and restart its systems with no permanent loss of customer data.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
"Regrettably we, in common with a number of other businesses, have recently been the target of a sophisticated – though limited – cyber attack by professional and determined criminals," said Graff in a statement. 'We were alerted to their intrusive activity by our security systems, allowing us to react swiftly and shut down our network. We notified, and have been working with, the relevant law enforcement agencies and the ICO.
RELATED RESOURCE
How to reduce the risk of phishing and ransomware
Top security concerns and tips for mitigation
'We have informed those individuals whose personal data was affected and have advised them on the appropriate steps to take."
Conti's recent surge in activity prompted the US' CISA, FBI, and NSA to release a joint advisory to US and international businesses alerting them to the group's most common attack methods.
These include spearphishing campaigns, exploiting stolen or weak remote desktop protocol (RDP) credentials, fake software promoted though web adverts, and common vulnerabilities in external assets.
The attack follows a string of major raids on international businesses attributed to Conti. Nokia subsidiary SAC Wireless said it had become victim to a Conti ransomware attack in June, while 16 US healthcare and first responder organisations were also targeted just one month prior.

Connor Jones has been at the forefront of global cyber security news coverage for the past few years, breaking developments on major stories such as LockBit’s ransomware attack on Royal Mail International, and many others. He has also made sporadic appearances on the ITPro Podcast discussing topics from home desk setups all the way to hacking systems using prosthetic limbs. He has a master’s degree in Magazine Journalism from the University of Sheffield, and has previously written for the likes of Red Bull Esports and UNILAD tech during his career that started in 2015.
-
Using DeepSeek at work is like ‘printing out and handing over your confidential information’
News Thinking of using DeepSeek at work? Think again. Cybersecurity experts have warned you're putting your enterprise at huge risk.
-
Can cyber group takedowns last?
ITPro Podcast Threat groups can recover from website takeovers or rebrand for new activity – but each successful sting provides researchers with valuable data
-
Average ransom payment doubles in a single quarter
News Targeted social engineering and data exfiltration have become the biggest tactics as three major ransomware groups dominate
-
BlackSuit ransomware gang taken down in latest law enforcement sting – but members have already formed a new group
News The notorious gang has seen its servers taken down and bitcoin seized, but may have morphed into a new group called Chaos
-
Google cyber researchers were tracking the ShinyHunters group’s Salesforce attacks – then realized they’d also fallen victim
News In an update to an investigation on the ShinyHunters group, Google revealed it had also been affected
-
Nearly one-third of ransomware victims are hit multiple times, even after paying hackers
News Many ransomware victims are being hit more than once, largely thanks to fragmented security tactics
-
75% of UK business leaders are willing to risk criminal penalties to pay ransoms
News A ransom payment ban is a great idea - until you're the one being targeted...
-
The Scattered Spider ransomware group is infiltrating Slack and Microsoft Teams to target vulnerable employees
News The group is using new ransomware variants and new social engineering techniques - including sneaking into corporate teleconferences
-
Hackers breached a 158 year old company by guessing an employee password – experts say it’s a ‘pertinent reminder’ of the devastating impact of cyber crime
News A Panorama documentary exposed hackers' techniques and talked to the teams trying to tackle them
-
The ransomware boom shows no signs of letting up – and these groups are causing the most chaos
News Thousands of ransomware cases have already been posted on the dark web this year