Skip to main content Skip to navigation

Information Security awareness blog

Welcome to the Information Security awareness blog, your go-to resource for the latest in cybersecurity awareness. This blog offers practical tips, expert advice, and up-to-date information to help you stay secure in the digital world. Whether you're a member of staff or a student, you'll find valuable content to enhance your cybersecurity knowledge and practices.

Get in touch

If you'd like to submit an article for the blog or suggest discussion topics, please contact us: .

Show all news items

Lessons from the M&S Cyber Attack

đź§  What Was the Human Error?

The breach occurred when cybercriminals, believed to be the group Scattered Spider, impersonated M&S staff and deceived IT help desk agents into resetting internal credentials. This manipulation granted the attackers unauthorized access to M&S’s systems. 

Additionally, reports suggest that the attackers stole an NTDS.dit file, a critical database containing encrypted employee passwords for M&S’s Windows network. If decrypted, these passwords could have allowed the attackers to move laterally across the network using legitimate-looking credentials. 

🔓 Why Was M&S Vulnerable?

Several factors contributed to the vulnerability:

· Third-Party Supplier Exploitation: The attackers targeted a third-party supplier, bypassing M&S’s internal security measures.

· Lack of Cyberattack Preparedness: An internal source revealed that M&S lacked a business continuity plan for such incidents, leading to a reactive response.

· Inadequate Email Security: M&S did not have a DMARC policy set to “quarantine” or “reject,” making their email domain more susceptible to spoofing and phishing attacks.

đź’Ą Impact of the Attack

· Operational Disruption: M&S’s online clothing business was shut down for over three weeks, and the breach also impacted the supply of food items.

· Financial Loss: The company anticipates a ÂŁ300 million hit to its operating profits due to the attack.

· Data Theft: Personal customer data, including names, email addresses, postal addresses, and dates of birth, were stolen.

🛡 Lessons Learned

This incident underscores the importance of:

· Robust Employee Training: Regular training to recognize and prevent social engineering attacks.

· Enhanced Security Protocols: Implementing strict verification procedures for system access and password resets.

· Third-Party Risk Management: Ensuring that suppliers and partners adhere to stringent cybersecurity standards.

· Proactive Incident Response Planning: Developing and regularly updating comprehensive cyberattack response plans.

By addressing these areas, organizations can better protect themselves against similar threats.

Wed 28 May 2025, 13:51 | Tags: News and updates Educational articles Case studies

Let us know you agree to cookies