Over the Easter weekend, M&S experienced a sophisticated ransomware attack attributed to the hacker group Scattered Spider, which deployed the “DragonForce” ransomware. Attackers exploited vulnerabilities in M&S’s systems, gaining unauthorised access to customer data, including names, addresses, dates of birth, and order histories. While payment details and passwords remained secure, the breach led to the suspension of online orders from 25 April and disrupted store operations. The company has faced significant financial losses, with estimates suggesting over £1.2 billion wiped from its market value.
Shortly after the M&S incident, the Co-op fell victim to a similar cyberattack. The ransomware attack compromised the Co-op’s ordering and logistics systems, leading to empty shelves and supply chain disruptions, particularly in rural areas. Customer and employee data, including contact information and birth dates, were accessed. Although payment systems remained mostly operational, the breach caused significant disruption.
Harrods, the luxury department store, reported an attempted cyberattack on its systems. While the attack was identified and mitigated promptly, it underscores the broader trend of cyber threats targeting UK retailers. The incident led to restricted internet access in stores as a precautionary measure.
The attacks on M&S and the Co-op involved social engineering, with hackers impersonating IT staff to deceive help desk personnel into resetting passwords. This granted them access to internal systems and allowed ransomware to be deployed.
The primary reason was financial extortion. By encrypting critical systems and threatening to release sensitive data, attackers attempted to force organisations into paying ransoms.
If you’re a small or medium-sized business, it’s easy to assume you’re not a target, but that’s no longer true. Around 1 in 5 UK businesses, including a quarter of small firms, suffered a cyberattack in the last year.
Preparation is the biggest difference between those that survive and those that don’t. Here are practical steps SMEs should take now:
Social engineering exploits human psychology to manipulate individuals into divulging confidential information or performing actions that compromise security. Common tactics include:
In the recent retail attacks, attackers used pretexting to impersonate IT staff, convincing help desk employees to reset passwords and grant system access.
To protect against social engineering attacks, organisations should implement the following measures:
By creating a culture of security awareness and implementing robust protocols, organisations can significantly reduce the risk of falling victim to social engineering attacks.
The recent cyberattacks on M&S, the Co-op, and serve as a stark reminder that no organisation is immune. As cybercriminals employ increasingly sophisticated tactics, it is critical for organisations to prioritise cybersecurity measures, employee training, and incident preparedness to safeguard their operations and customer trust. The earlier you act, the better protected your business will be.
Learn more about our cyber security services or reach out to our client support teams for advice on how to enhance your security posture today.