Information Security awareness blog

Welcome to the Information Security awareness blog, your go-to resource for the latest in cybersecurity awareness. This blog offers practical tips, expert advice, and up-to-date information to help you stay secure in the digital world. Whether you're a member of staff or a student, you'll find valuable content to enhance your cybersecurity knowledge and practices.
Get in touch
If you'd like to submit an article for the blog or suggest discussion topics, please contact us:
.Lessons from the M&S Cyber Attack
đź§ What Was the Human Error?
The breach occurred when cybercriminals, believed to be the group Scattered Spider, impersonated M&S staff and deceived IT help desk agents into resetting internal credentials. This manipulation granted the attackers unauthorized access to M&S’s systems.
Additionally, reports suggest that the attackers stole an NTDS.dit file, a critical database containing encrypted employee passwords for M&S’s Windows network. If decrypted, these passwords could have allowed the attackers to move laterally across the network using legitimate-looking credentials.
🔓 Why Was M&S Vulnerable?
Several factors contributed to the vulnerability:
· Third-Party Supplier Exploitation: The attackers targeted a third-party supplier, bypassing M&S’s internal security measures.
· Lack of Cyberattack Preparedness: An internal source revealed that M&S lacked a business continuity plan for such incidents, leading to a reactive response.
· Inadequate Email Security: M&S did not have a DMARC policy set to “quarantine” or “reject,” making their email domain more susceptible to spoofing and phishing attacks.
đź’Ą Impact of the Attack
· Operational Disruption: M&S’s online clothing business was shut down for over three weeks, and the breach also impacted the supply of food items.
· Financial Loss: The company anticipates a £300 million hit to its operating profits due to the attack.
· Data Theft: Personal customer data, including names, email addresses, postal addresses, and dates of birth, were stolen.
🛡 Lessons Learned
This incident underscores the importance of:
· Robust Employee Training: Regular training to recognize and prevent social engineering attacks.
· Enhanced Security Protocols: Implementing strict verification procedures for system access and password resets.
· Third-Party Risk Management: Ensuring that suppliers and partners adhere to stringent cybersecurity standards.
· Proactive Incident Response Planning: Developing and regularly updating comprehensive cyberattack response plans.
By addressing these areas, organizations can better protect themselves against similar threats.