Image Credit - The Telegraph Online

M&S Recovers From Recent Cyber Attack

June 13,2025

Business And Management

High Street Under Siege: How a Cyber Attack Brought M&S to Its Knees

Marks and Spencer, a cornerstone of British retail, finds itself in a protracted battle against the consequences of a highly sophisticated digital assault. The incident, which unfolded during the Easter holiday, has paralysed key operations, exposed customer data, and is projected to inflict a staggering £300 million blow to the company's profits. This infiltration has not only tested the resilience of a beloved high street institution but has also served as a stark warning to the entire retail sector about the pervasive and evolving nature of digital threats. The company's journey to recovery is proving to be a complex and arduous process, with the full impact still unfolding.

The event has thrown a harsh light on the vulnerabilities inherent in modern, interconnected retail ecosystems. From digital storefronts to intricate supply chains, the infiltration has demonstrated how a single breach can cascade into widespread chaos. As M&S navigates this crisis, its response is under intense scrutiny from customers, regulators, and industry peers, all seeking lessons from what may become one of the UK's costliest supply chain cyber incidents in history.

An Easter Ambush

The timing of the digital breach appeared maliciously strategic, launched during the Easter holiday weekend when many businesses operate with reduced staff. Initial signs of trouble emerged as customers in stores encountered problems with contactless payments and the click-and-collect service. These early disruptions were the first public indications of a much deeper issue brewing within the retailer’s digital infrastructure. The company’s teams quickly identified suspicious activity, but the criminals had already begun their assault.

Stuart Machin, the chief executive of M&S, later confirmed that the company was managing a significant "cyber incident". To protect its network and customers, the business made the difficult but necessary decision to proactively take some of its critical systems offline. This defensive manoeuvre, while crucial for containment, inevitably triggered the start of what would become weeks of severe operational disruption across the iconic British brand, affecting both its online presence and physical stores.

Digital Doors Slam Shut

Within days of the initial breach, the severity of the situation compelled Marks and Spencer to take a drastic step: it suspended all online orders. The company’s website and popular app, which together handle millions in daily sales, were effectively shut down for new purchases. This move highlighted the complexity of the interconnected systems that power a modern retail giant. Stuart Machin noted the intricate nature of the company’s digital estate, comprising over 30 critical systems and more than 600 applications, explaining that bringing them back online safely required a careful and controlled process.

The decision to halt web sales was a crucial part of the company's containment strategy. It prevented further infiltration while experts worked to secure the network. However, it also severed a vital revenue stream and a primary channel for customer interaction. The M&S app, a key part of its digital strategy, displayed a message apologising to users, stating it was unavailable while the company worked to improve the experience. This digital blackout marked the beginning of a challenging period for the business and its millions of loyal customers.

M&S

Image Credit - Tech Shots

The £300 Million Price Tag

The financial consequences of the cyber infiltration have been severe. M&S leadership has estimated the incident will reduce this year’s operating profits by approximately £300 million, a figure representing about one-third of its projected profit and surpassing initial analyst expectations. This staggering sum encapsulates the multifaceted costs of the breach, including lost online sales, increased logistical expenses from manual workarounds, and significant waste, particularly in the food division.

The company plans to mitigate some of these losses through diligent cost management, other trading actions, and any potential payouts from its cyber insurance policy. However, reports suggest that insurance may only cover a portion of the total damages, with some citing a potential recovery of around £100 million. The assault has also had a tangible impact on the company's market value, which saw a decline of more than one billion pounds in the weeks following the incident. This financial toll underscores the devastating economic power of a single, well-executed cyber offensive.

A Painfully Slow Restart

The road to recovery for M&S has been methodical and slow, reflecting the complexity of safely restoring compromised systems. In early June, the company announced it was once again accepting some online orders, a significant development in its recuperation efforts. This initial phase was limited, focusing on a group of bestselling fashion items like apparel and shoes. Furthermore, the service was restricted to home shipment for customers with addresses located in England, Wales, and Scotland.

The retailer informed shoppers that home goods and beauty items would follow in the subsequent days. However, it also stated that shipment options for Northern Ireland and the popular in-store pickup option would not resume for several more weeks. To manage the anticipated demand on its recovering systems, M&S extended its standard delivery times to ten days. This cautious, phased approach highlights the immense challenge of rebuilding operations while ensuring the network remains secure against further threats.

Widespread Customer Frustration

While the resumption of some online services was a positive step, the customer experience remained far from its usual standard, leading to significant frustration. Shoppers encountered an extremely limited offering of available products, particularly in menswear. A patron named Andrew Ruddle reported to BBC Your Voice that almost any item he wanted was unavailable in his preferred size and colour. He concluded that M&S must make substantial progress before its service could be considered restored to its usual state.

Another patron, Gill Watkins, noted she only discovered the website was back online by coincidence, having received no official communication from the retailer. After finally being able to complete the purchase for products that had remained in her online cart for weeks, she expressed disappointment that M&S did not waive delivery charges as a gesture of goodwill for the trouble this situation has created for its patrons. These experiences illustrate the gap between a technical recovery and the restoration of customer trust and satisfaction.

Empty Shelves and Broken Chains

The impact of the digital assault extended far beyond the digital realm, crippling the retailer’s intricate supply chain and leading to tangible consequences in its physical stores. In the days and weeks following the breach, shoppers were greeted with empty shelves and handwritten signs apologising for product availability issues. The disruption to core IT systems meant logistics and inventory management were severely hampered, impacting the flow of goods from suppliers to store floors, particularly affecting food items and popular meal deals.

This incident highlights how modern retail relies on a seamless connection between digital infrastructure and physical operations. Key suppliers, such as the sandwich-maker Greencore, were reportedly forced to revert to pen-and-paper systems to manage orders, demonstrating the cascading effect of the breach. The infiltration served as a powerful reminder that a compromised IT network can paralyse the entire supply chain, directly affecting the customer experience at the shelf edge.

M&S

Image Credit - Retail Gazette

Personal Data Compromised

Adding to the operational and financial turmoil, M&S confirmed that the criminals had stolen certain private customer details. In a message to customers, the company acknowledged that compromised information could include names, home and email addresses, telephone numbers, and birth dates. The retailer sought to reassure its patrons by stating that the theft did not compromise any usable payment card information or account passwords, which would have posed a more direct financial threat.

Despite this, the exposure of personal information creates significant risks for customers, including the potential for sophisticated phishing scams and identity fraud. In response, M&S prompted all users to reset their passwords as a precautionary measure and advised them to be cautious of any suspicious communications claiming to be from the company. The data compromise has triggered an investigation by the Information Commissioner’s Office (ICO) and has exposed M&S to potential group action lawsuits from affected individuals.

The Attackers Reveal Themselves

The identity of the culprits behind the M&S crisis became clear when a hacker group known as DragonForce claimed responsibility. The group made its claim in a gloating, abuse-filled email sent straight to the chief of M&S, Stuart Machin, on April 23. Written in fractured English, the message originated from a hijacked employee email account and taunted the company, boasting that they had "mercilessly raped your company and encrypted all the servers".

The email demanded a ransom payment and included a link to a darknet portal for negotiations, confirming the incident was a ransomware campaign. This direct communication from the criminals provided M&S and investigators with clear, albeit unsettling, evidence of who was behind the assault. The audacity of the message, which was also copied to other senior executives, underscored the brazen nature of the criminal enterprise the retailer was confronting.

Enter DragonForce and Scattered Spider

The infiltration of M&S has been linked to DragonForce, a group operating a Ransomware-as-a-Service (RaaS) model. This illegal business framework involves developers creating and maintaining ransomware tools, which they then lease to affiliate criminal groups, retaining a percentage of any ransom collected, typically around 20%. This model dramatically lowers the technical barrier for entry into cybercrime, allowing less skilled individuals to launch devastating campaigns.

While DragonForce provided the malicious software, investigations suggest the digital breach itself was carried out by an affiliate group known as Scattered Spider. This decentralised collective is believed to consist of mainly young, English-speaking individuals from the UK and the US. They are known for their proficiency in social engineering—tricking employees into giving up credentials—which M&S confirmed was the entry point for this breach. This collaboration between RaaS providers and skilled affiliates represents a potent and growing threat.

The Human Element of the Breach

Stuart Machin confirmed that the criminals did not breach M&S’s systems through a direct assault on its digital defences. Instead, they gained entry via "social engineering". This technique involves manipulating people to bypass security protocols. The infiltration was traced back to a third-party IT supplier, where an employee was tricked into giving out their login credentials. This single point of human error provided the hackers with the foothold they needed to infiltrate the retailer’s network.

This method highlights a critical vulnerability that many organisations face: the human factor. The National Cyber Security Centre (NCSC) has issued warnings about criminals impersonating IT help desks to steal passwords, a tactic frequently used by groups like Scattered Spider. The M&S incident serves as a sobering example that even with robust technical defences, a company’s security is only as strong as its most vulnerable employee or external partner.

A Taunting Ransom Note

The email sent by DragonForce to the M&S leadership was more than just a claim of responsibility; it was a disturbing ransom demand filled with racist and abusive language. The message, dispatched from the compromised email account of an IT worker associated with Tata Consultancy Services (TCS), the long-term IT support provider for M&S, laid bare the hackers' malevolent intentions. The criminals boasted about their success and urged the company to contact them via a darknet portal to make the process "fast and easy".

The message also revealed that the criminals had knowledge of M&S’s cyber-insurance policy, a tactic used to apply psychological pressure during ransom negotiations. It ended with an image of a fire-breathing dragon, the group's calling card. TCS has stated it is investigating but distanced itself from the message, asserting it was not sent from its own systems. The aggressive and personal nature of the note illustrates the psychological warfare that is often a key component of modern ransomware campaigns.

M&S

Image Credit - Mirror

The Thorny Ransom Dilemma

Following the ransom demand, M&S faced a difficult choice. The company has steadfastly declined to reveal if it has paid any money to the attackers, a position maintained by Stuart Machin during questioning. This silence is typical for organisations in this situation, as admitting to a payment can encourage future attacks and create legal and reputational complications. The official guidance from law enforcement and cybersecurity agencies is not to pay ransoms, as it funds criminal activity and offers no guarantee of data recovery.

However, many businesses find themselves in an impossible position, weighing the official advice against the potentially catastrophic costs of prolonged disruption. The decision often depends on the quality of data backups, the potential for recovery, and the scale of the financial damage being inflicted daily. While the attackers have yet to leak any stolen M&S data on their darknet site, the threat remains a powerful bargaining chip. The retailer's silence on the matter keeps the criminals, and the public, guessing.

Regulators and Legal Fallout

The compromise of customer data immediately brought M&S under the scrutiny of regulatory bodies. The company fulfilled its legal obligation by reporting the incident to the Information Commissioner's Office (ICO), the UK's data protection authority, within the required 72-hour window. The ICO, which enforces UK GDPR, has the power to investigate the circumstances of the breach and can impose significant fines if a company is found to have had inadequate security measures.

Penalties can reach up to 4% of a company’s annual global turnover, a potentially massive sum for a retailer of M&S’s size. The ICO's investigation will likely focus on whether M&S implemented "appropriate technical and organisational security measures" to safeguard the data it held. Beyond regulatory fines, the breach has also opened the door to civil litigation, with law firms already organising group action claims for customers whose data was compromised, seeking compensation for the potential misuse of their information.

A Wave of Retail Attacks

The infiltration of Marks and Spencer was not an isolated incident. It occurred amid a surge of similar cyber assaults targeting major UK retailers, indicating a coordinated campaign by threat actors. Within weeks of the M&S breach, both the Co-operative Group and the luxury department store Harrods reported facing similar incidents, with DragonForce and Scattered Spider linked to all three. This pattern suggests that criminals have identified the retail sector as a lucrative and vulnerable target.

Analysts note several factors that make retailers attractive targets: they process high volumes of financial transactions, hold vast stores of sensitive customer data, and rely on complex, interconnected supply chains that offer multiple entry points for hackers. The wave of infiltrations has prompted warnings from the National Cyber Security Centre and has led to parliamentary scrutiny, with the Business and Trade Select Committee seeking assurances from CEOs that the incidents are being managed effectively.

Leadership Through Crisis

In the face of what Stuart Machin described as the "most challenging situation" he and his team have ever encountered, leadership has been critical. The CEO communicated that the company had a pre-existing business continuity plan, which was activated immediately upon detection of the breach. M&S swiftly assembled a team of internal and external experts, including specialists from Microsoft and CrowdStrike, and notified the relevant authorities to manage the crisis.

Machin has attempted to frame the incident as a "bump in the road" and an opportunity to accelerate the company’s technological transformation. The retailer is now bringing forward a two-year investment programme into a six-month timeframe, aiming to upgrade its infrastructure, improve operational resilience, and reduce the interdependency of its systems. While the crisis communication has received mixed reviews from customers, the leadership's focus on a forward-looking solution demonstrates a commitment to emerging from the disruption in a stronger position.

Rebuilding Trust and Technology

The path forward for M&S involves a dual challenge: restoring its complex technological infrastructure and rebuilding the trust of its customers. The technical recovery is a painstaking process of cleansing the entire digital estate, which includes thousands of servers, before bringing systems back online in a controlled manner. The company expects this disruption to its online operations to continue into July, a longer timeline than initially hoped.

On the customer front, the revelation of a data compromise is a significant blow to a brand built on reliability. Analysts have noted that while shoppers have been largely supportive, their patience is finite. The recovery now depends not just on fixing technical problems but on transparent communication and demonstrating a profound commitment to protecting customer information. How M&S handles this emotional dimension of the customer experience will be remembered long after the systems are fully restored.

Lessons for the Retail Industry

The M&S cyber incident serves as a critical case study for the entire retail industry. It underscores the necessity for robust, multi-layered cybersecurity that goes beyond technical firewalls. A key lesson is the importance of comprehensive third-party risk management, as the breach originated with an external supplier. Companies must rigorously assess the security posture of all partners within their supply chain, as a vulnerability in any single link can compromise the entire network.

Furthermore, the incident highlights the critical need for continuous employee training on security best practices, particularly regarding phishing and social engineering. Finally, having a well-rehearsed incident response plan is paramount. M&S's ability to enact its pre-prepared protocol allowed for a swift initial response, even if the recovery has been prolonged. For other retailers, the question is not if they will be targeted, but when, making preparation an essential cost of doing business in the digital age.

Do you want to join an online course
that will better your career prospects?

Give a new dimension to your personal life

whatsapp
to-top