Retail Watch
Delivery Drivers Targeted in New “Support Call” Scam Exploiting Food Delivery Platforms
Drivers working for food delivery apps such as CityDish, MetroMeals and more are being targeted by a new scam that exploits one of the platforms’ most basic safety features: the ability for customers to call drivers without revealing their personal phone numbers.
Security analysts say the scheme relies on social engineering rather than technical hacking, allowing attackers to impersonate company support staff and trick drivers into handing over account verification codes.
The scam begins with what appears to be a normal food order placed through a delivery platform. Shortly after a driver accepts the request, the customer uses the app’s “Call Driver” feature to contact them.
Because the call is routed through the platform’s masked communication system, the driver’s phone often displays a number associated with the service itself rather than the caller’s personal number. To the driver, the call appears legitimate.
When the driver answers, the caller claims to be from the platform’s support team and says the driver’s account requires immediate verification. The caller often begins by addressing the driver by name, information that is visible to customers inside most delivery apps, which helps establish credibility.
The conversation then shifts to urgency.
Drivers are told that their account has triggered a security check or is at risk of being temporarily suspended. To resolve the issue, they are asked to confirm a one-time verification code sent to their phone.
In reality, the code is generated when the attacker attempts to log into the driver’s account. By convincing the driver to read the code aloud, the scammer is able to bypass the platform’s authentication protections and gain access to the account.
Once inside, attackers can change payout details, redirect earnings, or lock drivers out of their own accounts.
The tactic has begun circulating among driver communities online, with several workers reporting similar experiences during active deliveries.
What makes the scam particularly effective is the way it leverages built-in platform features designed to protect users. Masked calling systems allow customers and drivers to communicate without exposing personal phone numbers, but the same system can also make calls appear to originate from the company itself.
According to cybersecurity analysts, the attackers are not exploiting a software vulnerability they are exploiting trust signals built into the platform’s design.
By combining an official-looking phone call, knowledge of the driver’s name, and a request involving a familiar security code, scammers create a convincing scenario that many drivers do not question until it is too late.
Gig economy platforms typically warn users that legitimate support representatives will never ask for authentication codes or passwords. Still, the fast-paced nature of delivery work where drivers are often navigating traffic while managing orders can make it easier for social engineering tactics to succeed.
Security professionals say the incident highlights a growing trend across digital platforms: attackers increasingly rely on manipulating platform features and human behaviour rather than breaking through technical defences.
Drivers are being urged to treat any unexpected request for verification codes with skepticism, even if the call appears to originate from the delivery platform itself.
In an industry built on speed and convenience, experts say the safest response may be the simplest one: hang up, and contact support directly through the app.
On the ground, where infrastructure meets everyday life. — Marcus Tran
Retail Watch
Calgary Small Business Hit by Sudden Payment Outage, Sparks Cybersecurity Concerns
ODTN News broadcaster Roshan Khan
CALGARY, AB —
August 7, 2025 — Shoppers at Prairie Fresh Market, a locally owned grocery store in Calgary’s Beltline district, were caught off guard this morning when every checkout lane abruptly stopped processing card payments.
Shortly after 9 a.m., debit and credit terminals across the store froze mid-transaction. No error codes appeared, no connection warnings flashed — the payment screens simply went silent.
“One minute we were ringing people through, the next minute… nothing,” said store manager Alex Moreno. “It wasn’t the network, it wasn’t the power — it was like someone just pulled the plug on every register at once.”
Officials Call It a Glitch, Experts See a Pattern
City officials were quick to call the outage an isolated technical disruption, adding that the systems were fully restored by early afternoon. But some cybersecurity experts are not convinced.
Dr. Karen Liu, a retail infrastructure specialist at the Western Cyber Institute, says the nature of the outage is “unusual” and mirrors tactics seen in probing attacks — small-scale disruptions designed to map vulnerabilities without triggering alarms.
“This wasn’t just a terminal freezing. The absence of error messages or connectivity alerts suggests something deliberately masking its footprint,” Liu explained.
Possible Connection to Larger Threats
Sources connected to ODTN News warn that incidents like this could be part of a broader pattern involving critical infrastructure and payment network stability. While there is no confirmed link between Prairie Fresh Market’s outage and larger cyber operations, the incident’s timing has raised eyebrows in the security community.
“A grocery store is a perfect test case — high transaction volume, constant connectivity, and a mix of cloud-based and local systems,” said one industry source who spoke on condition of anonymity. “If you can silently knock that offline, you can escalate to much bigger targets.”
Business Resumes — But Concerns Remain
By 1:45 p.m., card transactions were back online, and the store resumed normal operations. Still, Moreno says the incident has left staff uneasy.
“We rely on these systems for everything. To have them just… stop, without explanation, is unnerving,” he said.
For Prairie Fresh Market’s customers, the outage was little more than an inconvenience — but for cybersecurity watchers, it may be another data point in a growing list of unexplained disruptions.
ODTN News will continue to monitor developments as investigators work to determine whether Calgary’s grocery store blackout was a one-off glitch — or part of something much bigger.
On the ground, where infrastructure meets everyday life. — Marcus Tran
ODTN News’ Ayaan Chowdhury contributed to this report.
Cybersecurity
Highlighting Scattered Spider’s Marks & Spencer Attack: A Retail Nightmare and Warning for National Defence
August 1, 2025 — The cyberattack on Marks & Spencer has become more than a headline, it’s fast becoming a case study in how sophisticated threat actors map, infiltrate, and destabilize retail infrastructure. The assault, attributed to the notorious Scattered Spider collective, is a stark signal: no organization is immune from evolving supply-chain and identity attacks.
Scattered Spider, also known as UNC3944, Muddled Libra, and Octo Tempest, is a sophisticated hacker group known for social engineering and identity theft rather than traditional exploits. They often impersonate IT staff to trick employees into resetting passwords or granting access, and use SIM swapping or MFA fatigue attacks to bypass security controls. Instead of hacking systems directly, they infiltrate trusted vendors and managed service providers, gaining access through legitimate channels. Once inside, they use real IT tools to move quietly and steal data, later extorting victims by threatening to leak information. Scattered Spider doesn’t break in…they’re invited in by mistake.
Marks & Spencer (M&S) suffered a major cyberattack that caused weeks of disruption and significant financial losses. Online services were shut down for nearly six weeks, hitting clothing, home, and food sales and costing the company an estimated £300 million. The breach disrupted supply chains and order systems, forcing staff to rely on manual workarounds. Some customer data such as names and emails were accessed, though payment details remained secure. In response, M&S has moved to strengthen its systems and tighten vendor security, as the incident exposed a major vulnerability in modern retail: the risks hidden within third-party service providers that keep operations running.
The Marks & Spencer breach shows a growing pattern of attacks reaching far beyond retail, hitting sectors like energy, telecom, and finance. It’s a reminder that people, not just systems, are the new targets. Weak identity controls or simple human error can open the door to an entire network. The incident also exposed how third-party vendors and service providers have become prime attack routes, turning supply chains into gateways for hackers. Even strong, well-funded companies are vulnerable when trust is misplaced. And often, the real damage isn’t stolen data but the disruption; outages, delays, and lost confidence. As cyberattacks evolve into hybrid threats that blend hacking, misinformation, and legal pressure, organizations must focus on fast communication, strong partnerships, and resilience at every level.
The Marks & Spencer breach is more than a wake-up call, it is a warning shot to every enterprise, especially those reliant on vendor networks: be prepared, not reactive.
ODTN News will continue monitoring developments and publishing deeper analyses of the evolving threat landscape.
On the ground, where infrastructure meets everyday life. — Marcus Tran
ODTN News’ Ayaan Chowdhury contributed to this report.
Retail Watch
Understaffed and overwhelmed, IT teams face rising pressure as retail digitization accelerates
ODTN News broadcaster Roshan Khan
Toronto, ON — As Canada’s major retailers race toward full digital transformation, a new concern is surfacing from inside their own walls: burnout among IT professionals. And it’s growing faster than the infrastructure they’re being asked to maintain.
According to internal briefings and confidential interviews conducted by ODTN News, retail IT teams across the country are reporting unsustainable workloads, unrealistic upgrade timelines, and chronic understaffing — all while expected to fend off increasingly complex cyber threats.
“We’re getting new systems every quarter, but no new staff to support them,” said one infrastructure engineer at a national pharmacy chain, speaking on condition of anonymity. “We’re supposed to be innovating, defending, and scaling — but most days we’re just surviving.”
Burnout Becoming a Security Risk
While burnout is not new to the tech sector, experts warn the current combination of accelerated digital rollout and cybersecurity pressure is creating a dangerous inflection point.
“You can’t expect resilience from teams running on fumes,” said a senior systems architect from LogiSync Canada, a major retail logistics platform. “When we’re too tired to properly audit new code or track access logs, that’s when threat actors slip through.”
Multiple insiders confirmed that some scheduled patch cycles are being postponed or skipped due to personnel shortages — a short-term decision with potentially long-term consequences.
A Disconnect at the Top
Sources suggest that executive-level enthusiasm for emerging technologies — including AI-driven forecasting, smart shelves, and omnichannel integration — has outpaced the operational capacity of the teams tasked with implementation.
“Leadership wants retail to move at the speed of Silicon Valley,” said a backend specialist working on point-of-sale upgrades in British Columbia. “But they forget we’re doing this while keeping decades-old systems running in the background.”
What It Means for Customers
The effects of burnout don’t just stay behind the firewall. Delayed maintenance, rushed deployments, and gaps in monitoring can all increase the risk of outages, checkout disruptions, and data breaches.
“If defenders are stretched thin, customer data becomes the collateral damage,” said an analyst from the Canadian Consumer Cyber Alliance (CCCA).
No National Strategy… Yet
Despite growing industry concern, Canada currently lacks a federal strategy to support digital infrastructure workers in high-demand civilian sectors like retail and healthcare. Labor advocates say this omission must be addressed before cracks in the system become visible to the public.
As part of ODTN News’ continuing coverage of Canada’s digital transformation, our Retail Watch desk will monitor how retailers — and policymakers — respond to what many are calling a silent crisis at the heart of the modern economy.
On the ground, where infrastructure meets everyday life. — Marcus Tran
ODTN News’ Mira Evans contributed to this report.
-
Public9 months agoReddit Thread Over ‘Inventory Drift’ Surges as Canadians Vent Over Retail Glitches
-
Business8 months agoAre Canadian Companies Learning from Global Cyber Attacks? Insider Insights into the Secret Downfall of Canadian Businesses
-
Retail Watch7 months agoCalgary Small Business Hit by Sudden Payment Outage, Sparks Cybersecurity Concerns
-
Cybersecurity9 months agoCanadian Airline NorthSky Faces Cyberattack, Disrupting Online Services
-
Business11 months agoCanadian Software Vendor Breach Exposes Cloud Environments Across Energy Sector
-
Retail Watch8 months agoUnderstaffed and overwhelmed, IT teams face rising pressure as retail digitization accelerates
-
Politics7 months agoNationwide Government System Outage Paralyzes Public Services
-
Business7 months agoInsurance Without a Safety Net? Canadian Firms Face Premium Hikes Amid Cyber Liability Crisis
