
Investigations continue into the circumstances surrounding the death of a girl who was struck by a car while riding an e-scooter
Inquiries are continuing into how a schoolgirl lost control of her e-scooter and was tragically killed during the Easter long weekend.
Initial reports suggested Summah Richards, 12, was walking her scooter along a road in Laidley, west of Brisbane before she was struck by a car about 3pm on Saturday.
Investigations have since indicated she was riding the scooter when she fell into the path of a Holden Barina heading in the same direction.
Summah died at the scene, despite the efforts of emergency responders to revive her.
The driver and passenger in the grey hatchback were uninjured.
An investigations into the tragedy is still in its early stages.
'To lose a young person like that to a fatal traffic crash is really tragic and my heart goes out to the family and the friends of that young person who has been taken away from the family much too early,' Road Policing and Regional Support Command Acting Chief Superintendent Garrath Channells told the ABC.
'It would appear that the child has lost control of the e-scooter … [resulting] in the individual falling off the scooter and coming to the ground in front of a moving vehicle, which has collided with the child.
'Our specialist investigative unit from the forensic crash unit will work through the full investigation, but at this early date that is what appears to have occurred.'
Summah's death has rocked the local community who have rallied behind her devastated parents and brothers.
She had just started high school and been remembered as a remarkable young girl with a vibrant spirit.
'Summah was out in the world living her best life doing what children do,' family friend Stacey Ardrey wrote.
'Summah was the kind of soul who could light up any room simply by being in it. Her playful nature was contagious, always ready to laugh, and bring joy to those around her,' she wrote in a tribute online.
'Whether she was popping up from behind a corner which she did often and with a mischievous grin or throwing herself into an adventure with pure excitement, Summah's bright energy was boundless.'
'Her love wasn't just seen, it was felt. With her big brown eyes, full of wonder and kindness, she made everyone feel special.
'She had a heart that cared deeply, always looking out for others with a tenderness beyond her years.
'Summah's ability to show love so freely and authentically left a lasting impact on all who were lucky enough to know her.'
The community has raised nearly $15,000 on GoFundMe.
Flowers and toys were seen left in a touching memorial near to the crash site over the weekend.
One note, left by a friend, accompanied flowers and a packet of Summah's favourite gum read: 'in memory of you, missed 4ever by all your friends and family'.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Scottish Sun
16 hours ago
- Scottish Sun
Terrifying message sent by ‘Chinese hackers' to M&S boss after crippling cyber attack on British retailer is revealed
The blackmail message is believed to have included a racist term RANSOM DEMAND Terrifying message sent by 'Chinese hackers' to M&S boss after crippling cyber attack on British retailer is revealed Click to share on X/Twitter (Opens in new window) Click to share on Facebook (Opens in new window) 'CHINESE hackers' allegedly sent a terrifying message to the boss of Marks & Spencer following a crippling cyber-attack on the British retailer. Fraudsters, believed to be from the hacking group DragonForce, are said to have emailed the company's chief executive Stuart Machin and seven other key executives. Sign up for Scottish Sun newsletter Sign up 2 High street retailer Marks & Spencer was hit by a cyber attack over the Easter holiday Credit: Alamy 2 M&S boss Stuart Machin, pictured, along with seven other company executives were emailed by the hackers, believed to be DragonForce Credit: PA The message, written in broken English, was sent on April 23, indicated that M&S was hacked by the ransomware group, although the retailer has not acknowledged this. 'We have marched the ways from China all the way to the UK and have mercilessly raped your company and encrypted all the servers,' the hackers wrote, according to the BBC. 'The dragon wants to speak to you so please head over to [our darknet website].' The link to the darknet shared in the email led to a portal for victims of DragonForce to negotiate a ransom fee. The hackers added: 'Let's get the party started. Message us, we will make this fast and easy for us.' DragonForce's attack during the Easter holiday has been hugely damaging for one of Britain's best-known retailer and is thought to have cost the firm an estimated £300million. After six weeks on from the attack, the retailer is still unable to process online orders. The email was sent to Mr Machin along with seven other top executives, according to the corporation. A racist term is also said to have been included in the blackmail message and also ended with an image of a fire-breathing dragon. Along with installing ransomware in order to cripple M&S's IT system the hackers are also believed to have stolen private data from millions of customers. The £3.50 M&S buy that'll make your whole house smell like a 'boujee candle' Three weeks on from the attack, M&S informed customers that contact details and dates of birth from some shoppers had been obtained by a suspected cyber cartel. M&S also admitted other personal details, including customers' order histories, had also been pilfered by online criminals. Bosses though have stressed that no data relating to shoppers' payment, card details or account passwords had been obtained. It is unclear how many customers have been affected by the data breach. According to the company's full-year results, it had 9.4million active online customers in the year up to March 30. The email apparently sent by DragonForce is thought to have bene sent using the account of an employee from IT company Tata Consultancy Services (TCS), which has provided IT services to the retailer for more than a decade. The Indian IT worker, who is based in London, had an M&S email address but is paid employee of TCS. Timeline of the attack Saturday, April 19: Initial reports emerge on social media of problems with contactless payments and click-and-collect services at M&S stores across the UK. Customers experience difficulties collecting online purchases and returning items due to system issues. Initial reports emerge on social media of problems with contactless payments and click-and-collect services at M&S stores across the UK. Customers experience difficulties collecting online purchases and returning items due to system issues. Monday, April 21: Problems with contactless payments and click-and-collect persist. M&S officially acknowledges the "cyber incident" in a statement to the London Stock Exchange. CEO Stuart Machin apologises for the disruption and confirms "minor, temporary changes" to store operations. M&S notifies the National Cyber Security Centre (NCSC) and the Information Commissioner's Office (ICO) and engages external cybersecurity experts. Problems with contactless payments and click-and-collect persist. M&S officially acknowledges the "cyber incident" in a statement to the London Stock Exchange. CEO Stuart Machin apologises for the disruption and confirms "minor, temporary changes" to store operations. M&S notifies the National Cyber Security Centre (NCSC) and the Information Commissioner's Office (ICO) and engages external cybersecurity experts. Tuesday, April 22: Disruptions continue. M&S takes further systems offline as part of "proactive management". Disruptions continue. M&S takes further systems offline as part of "proactive management". Wednesday, April 23: Despite earlier claims of customer-facing systems returning to normal, M&S continues to adjust operations to maintain security. Contactless payments are initially restored, but other services, including click-and-collect, remain affected. Despite earlier claims of customer-facing systems returning to normal, M&S continues to adjust operations to maintain security. Contactless payments are initially restored, but other services, including click-and-collect, remain affected. Thursday, April 24: Contactless payments and click-and-collect services are still unavailable. Reports surface suggesting the attackers possibly gained access to data in February. Contactless payments and click-and-collect services are still unavailable. Reports surface suggesting the attackers possibly gained access to data in February. Friday, April 25: M&S suspends all online and app orders in the UK and Ireland for clothing and food, although customers can still browse products. This decision leads to a 5% drop in M&S's share price. M&S suspends all online and app orders in the UK and Ireland for clothing and food, although customers can still browse products. This decision leads to a 5% drop in M&S's share price. Monday, April 28: M&S is still unable to process online orders. Around 200 agency workers at the main distribution centre are told to stay home. M&S is still unable to process online orders. Around 200 agency workers at the main distribution centre are told to stay home. Tuesday, April 29: Information suggests that the hacker group Scattered Spider is likely behind the attack. Shoppers spot empty shelves in selected stores. Information suggests that the hacker group Scattered Spider is likely behind the attack. Shoppers spot empty shelves in selected stores. Tuesday, May 13: M&S revealed that some customer information has been stolen. M&S revealed that some customer information has been stolen. Wednesday, May 21: The retailer said disruption from the attack is expected to continue through to July. The retailer said disruption from the attack is expected to continue through to July. It's thought the worker was among the victims hacked. The company had previously said it is investigating if it was a gateway for the cyber attack. It has since informed the BBC the email was not sent from its system and had nothing to do with the security breach. M&S has declined to comment on the latest revelations. A spokesperson for the company told The Sun Online: 'We cannot comment on details of or speculation on the cyber incident, and we have been advised not to.'


The Sun
16 hours ago
- The Sun
Terrifying message sent by ‘Chinese hackers' to M&S boss after crippling cyber attack on British retailer is revealed
'CHINESE hackers' allegedly sent a terrifying message to the boss of Marks & Spencer following a crippling cyber-attack on the British retailer. Fraudsters, believed to be from the hacking group DragonForce, are said to have emailed the company's chief executive Stuart Machin and seven other key executives. 2 2 The message, written in broken English, was sent on April 23, indicated that M&S was hacked by the ransomware group, although the retailer has not acknowledged this. 'We have marched the ways from China all the way to the UK and have mercilessly raped your company and encrypted all the servers,' the hackers wrote, according to the BBC. 'The dragon wants to speak to you so please head over to [our darknet website].' The link to the darknet shared in the email led to a portal for victims of DragonForce to negotiate a ransom fee. The hackers added: 'Let's get the party started. Message us, we will make this fast and easy for us.' DragonForce's attack during the Easter holiday has been hugely damaging for one of Britain's best-known retailer and is thought to have cost the firm an estimated £300million. After six weeks on from the attack, the retailer is still unable to process online orders. The email was sent to Mr Machin along with seven other top executives, according to the corporation. A racist term is also said to have been included in the blackmail message and also ended with an image of a fire-breathing dragon. Along with installing ransomware in order to cripple M&S's IT system the hackers are also believed to have stolen private data from millions of customers. Three weeks on from the attack, M&S informed customers that contact details and dates of birth from some shoppers had been obtained by a suspected cyber cartel. M&S also admitted other personal details, including customers' order histories, had also been pilfered by online criminals. Bosses though have stressed that no data relating to shoppers' payment, card details or account passwords had been obtained. It is unclear how many customers have been affected by the data breach. According to the company's full-year results, it had 9.4million active online customers in the year up to March 30. The email apparently sent by DragonForce is thought to have bene sent using the account of an employee from IT company Tata Consultancy Services (TCS), which has provided IT services to the retailer for more than a decade. The Indian IT worker, who is based in London, had an M&S email address but is paid employee of TCS. Timeline of the attack Saturday, April 19: Initial reports emerge on social media of problems with contactless payments and click-and-collect services at M&S stores across the UK. Customers experience difficulties collecting online purchases and returning items due to system issues. Monday, April 21: Problems with contactless payments and click-and-collect persist. M&S officially acknowledges the "cyber incident" in a statement to the London Stock Exchange. CEO Stuart Machin apologises for the disruption and confirms "minor, temporary changes" to store operations. M&S notifies the National Cyber Security Centre (NCSC) and the Information Commissioner's Office (ICO) and engages external cybersecurity experts. Tuesday, April 22: Disruptions continue. M&S takes further systems offline as part of "proactive management". Wednesday, April 23: Despite earlier claims of customer-facing systems returning to normal, M&S continues to adjust operations to maintain security. Contactless payments are initially restored, but other services, including click-and-collect, remain affected. Thursday, April 24: Contactless payments and click-and-collect services are still unavailable. Reports surface suggesting the attackers possibly gained access to data in February. Friday, April 25: M&S suspends all online and app orders in the UK and Ireland for clothing and food, although customers can still browse products. This decision leads to a 5% drop in M&S's share price. Monday, April 28: M&S is still unable to process online orders. Around 200 agency workers at the main distribution centre are told to stay home. Tuesday, April 29: Information suggests that the hacker group Scattered Spider is likely behind the attack. Shoppers spot empty shelves in selected stores. Tuesday, May 13: M&S revealed that some customer information has been stolen. Wednesday, May 21: The retailer said disruption from the attack is expected to continue through to July. It's thought the worker was among the victims hacked. The company had previously said it is investigating if it was a gateway for the cyber attack. It has since informed the BBC the email was not sent from its system and had nothing to do with the security breach. M&S has declined to comment on the latest revelations.


The Courier
16 hours ago
- The Courier
Daughter's tribute to Dundee mum who suddenly died in front of family on Perthshire holiday
A Dundee woman has paid tribute to her 'superwoman' mum after she suddenly died on a family holiday. Louise Beattie tragically passed away in front of her two youngest kids and partner Steven Milne at Tummel Valley Holiday Park, in Perthshire, on Tuesday afternoon. The 45-year-old leaves behind three children: Euan Shaw, 13, Eliana Shaw, 14 and 24-year-old Emily Mather. The family was celebrating Steven's upcoming birthday at the Parkdean resort near Pitlochry when the tragedy unfolded. It is understood that Louise had a seizure in the pool at the holiday park. She was pronounced dead at the scene, and the exact cause of her death is unknown. Police say there are no suspicious circumstances. Emily, who is from Dundee but now lives in Manchester, told The Courier: 'She was always caring and had so much time for those around her. 'My mum was always a giver, and never a taker, and would go out of her way for anyone. 'Many people will remember my mum as the 'stamp lady' outside Deja Vu nightclub. 'She was a real superwoman of a mum, she had a heart of gold and was some character.' Former Baldragon Academy pupil Emily previously told of how pole fishing saved her life after she lost her gran in 2021. She added: 'We're not sure what caused her death yet, but it was a medical incident. 'A biopsy will take place at the beginning of next week. 'It's been a difficult few days, but I just want to make sure I'm there for the kids. We're all pulling together.' Family friend Hollie has set up a GoFundMe page to help the family give Louise the 'send-off she deserves'. It's already raised thousands of pounds. Speaking to The Courier, Hollie said: 'Louise laughed her way through life, everything was funny to her and she was a very good friend to have. 'She was always the first person at your door when something was up. 'It's been a really challenging time for the family, and the fundraiser will help them all out. 'She was the best mum and she deserves the best send-off ever, for the kids too. 'Sleep tight Louise, we will miss you forever.' Emily added: 'Every donation means a lot and is very much appreciated.' A spokesperson for Tummel Valley Holiday Park said: 'Our thoughts are with the deceased, and we would like to send our deepest sympathies and condolences to their family and friends during this difficult time.' A Police Scotland spokesperson said: 'Around 3.40pm on Tuesday we were called to Main Road, Tummel Bridge, Pitlochry, following a report of concern for a woman. 'Emergency services attended and the 45-year-old was pronounced dead at the scene. 'There are no suspicious circumstances and her family are aware. 'A report will be submitted to the Procurator Fiscal.' A spokesperson for the Scottish Ambulance Service said: 'We received a call at 3:30pm on Tuesday to attend an incident at Tummel Bridge, Pitlochry. 'We dispatched one ambulance, a paramedic response unit (PRU), a BASICS Scotland doctor and an air ambulance to the scene.'