From Easter Weekend to Existential Disruption
On Easter weekend 2025 — April 18 to 21 — Marks & Spencer’s operations began unravelling. The Scattered Spider hacking collective, the same group behind the 2023 MGM Resorts breach, had gained initial access through a social engineering attack targeting a third-party service provider. By exploiting helpdesk verification processes to reset privileged credentials, the attackers moved laterally across M&S’s network, ultimately deploying DragonForce ransomware across the retailer’s core infrastructure.
M&S CEO Stuart Machin described it plainly: “April started strong, continuing the momentum from last year. Then, over the Easter break holiday, it became clear we were facing a highly sophisticated and targeted attack.” The company proactively shut down systems to limit spread, triggering an immediate cascade: online clothing orders suspended for nearly seven weeks, food supply chains disrupted, shelves running low, and a 42.9% collapse in online fashion sales.
Days later, Co-op — the UK’s sixth-largest food retailer — was hit by the same group, suffering an 11% daily spend reduction in the first 30 days. Between mid-April and early May 2025, Scattered Spider had executed back-to-back precision strikes on two of the UK’s most recognisable retail brands.
The Financial Forensics: What a Cyber Hurricane Actually Costs
Twelve months later, M&S’s half-year results revealed figures that have since become the benchmark for enterprise cyber risk quantification. According to Cybersecurity Dive, the company warned that the attack would cut approximately £300 million — roughly $400 million — from operating profits. When full results landed, the picture was sharper and worse:
- £324 million in lost sales — slightly exceeding the earlier £300 million estimate
- £101.6 million in one-off recovery costs (system restoration, legal support, professional services, inhousing the tech team)
- £100 million insurance payout partially offsetting first-half losses
- £136 million total net profit impact across the full financial year (£102M first half + £34M second half)
- 55% drop in adjusted pre-tax profit — from £413.1 million to £184.1 million year-on-year
- 16.4% decline in fashion arm sales; in-store sales down 3.4%; online down 42.9%
The UK Cyber Monitoring Centre (CMC), an independent body backed by former NCSC leader Ciaran Martin, classified the combined M&S and Co-op incidents as a Category 2 “cyber hurricane” — a designation reserved for events with “substantial financial impact and economic reverberations across third-party suppliers, franchisees and supporting services.” Total estimated industry costs for both incidents combined: between £270 million and £440 million.
For context, the CMC’s Category 2 sits below Category 1 (“catastrophic, systemic”) but above Category 3 (“moderate, localised”). The fact that two targeted attacks on non-financial companies crossed into Category 2 territory signals a structural shift: retail has become as systemically vulnerable as banking in the minds of insurers and regulators.
The Five Structural Failures Exposed
The one-year postmortem published by Computer Weekly is unusually candid for corporate security analysis. Security experts and practitioners have converged on five systemic failures that explain why M&S suffered disproportionate damage compared to Co-op — which recovered significantly faster despite being struck by the same group.
Social engineering bypassed the technical perimeter. The initial breach did not exploit a software vulnerability — it exploited a human process. Helpdesk staff reset privileged credentials following a convincing vishing call. No firewall, no EDR, no SIEM catches this. By the time malware was deployed, the attackers had already owned identity.
Active Directory was the real kill switch. Once inside, Scattered Spider targeted domain controller databases — the master keys to an enterprise network. Treating AD security as routine rather than mission-critical meant that one compromised privileged account unlocked lateral movement at scale.
Technical debt amplified the blast radius. Legacy systems entangled with modern infrastructure prevented M&S from isolating compromised segments quickly. The retailer’s CEO acknowledged the need to “accelerate plans to upgrade infrastructure and network connectivity, store and colleague technology and supply chain systems” — language that implicitly confirms years of deferred modernisation.
Third-party risk was underscored as the entry vector. The attack originated through a third-party service provider, not a direct M&S employee. The forensics are consistent with a pattern seen across Scattered Spider’s prior campaigns: vendors with privileged access and lower security maturity are the easiest entry points.
Recovery speed, not just prevention, determined outcomes. Co-op’s faster recovery — driven by earlier containment decisions and more modular infrastructure — demonstrates that incident response architecture is as important as preventive controls. M&S’s online orders were suspended for seven weeks; Co-op’s equivalent disruption lasted a fraction of that time.
Advertisement
What Security and IT Leaders Should Do Differently
The £300M+ quantification finally gives CISOs and CFOs a shared language. Use it.
1. Harden the Helpdesk Before the Next Vishing Wave
The M&S breach began at a service desk, not a server. Every privileged credential reset — especially out-of-hours or for senior accounts — must require a second verification channel (manager confirmation, hardware token, live video ID). Retail cyber attacks increased 34% year-over-year following the M&S incident, and 80% of subsequent red team exercises now include helpdesk vishing simulations specifically because of this case. Organisations that haven’t run a vishing exercise against their own service desk in the past 12 months are operating blind.
2. Treat Active Directory as Crown-Jewel Infrastructure
Domain controllers require the same protection posture as payment card data environments. This means privileged access workstations (PAWs) for all AD administration, tiered administrative model enforcement, regular AD audit logs sent off-box to a SIEM that cannot be modified by compromised domain accounts, and a tested AD disaster-recovery runbook. If your AD goes down, your business goes down — the M&S case proves this is not theoretical.
3. Build and Test a Modular Recovery Architecture
Co-op recovered faster than M&S not because it had better perimeter defences — it faced the same attacker — but because its systems could be isolated and restored in smaller, independent segments. Review your network segmentation: can you restore e-commerce while keeping supply chain systems offline? Can you run stores manually while online is down? Documenting and practising these degraded-mode operating procedures is the difference between seven weeks of suspended online orders and two weeks.
4. Extend Vendor Security Requirements to Tier-2 Suppliers
Third-party risk assessments typically cover Tier-1 vendors. The M&S breach entered through a service provider whose own helpdesk was the vulnerable surface. Extend your vendor questionnaire to include: Does this vendor’s helpdesk require MFA for credential resets? Does their access to your environment expire automatically? Can their access be revoked in under 15 minutes? Make these contractual requirements, not voluntary best practices.
5. Put a Cyber Resilience ROI Figure in Every Board Pack
Before the M&S results, CISOs often struggled to quantify cyber investment against executive-acceptable terms. Now they don’t need to estimate: a £324M lost-sales event, a 55% profit drop, a £100M insurance recovery gap. These are audited public figures from a company similar in scale to thousands of global enterprises. The board conversation is now: “How much does it cost us to not have tiered AD protection? How much does a modular recovery architecture save us versus seven weeks of suspended online orders?” Frame every security investment as a fraction of the M&S counterfactual.
Where the Regulatory Landscape Lands
The CMC classification carries insurance implications that ripple beyond M&S. Category 2 events by definition generate “reverberations across third-party suppliers, franchisees and supporting services” — a signal to underwriters that retail cyber insurance must now price for systemic correlated risk, not just isolated incidents. Premiums in the UK retail sector are already moving.
In the UK, the National Cyber Security Centre (NCSC) has since published updated guidance specifically referencing social engineering attacks against service desks as a primary initial access vector. The EU’s NIS2 Directive, effective since October 2024, mandates that organisations in “important entities” categories — which includes large retailers — implement incident response procedures, supply chain security controls, and business continuity plans. The M&S breach is now cited in multiple NIS2 compliance briefings as the exemplary case for why these requirements exist.
For Singapore’s enterprise landscape — a useful benchmark given its small-country, high-digitisation profile — the Monetary Authority of Singapore’s Technology Risk Management Guidelines already require financial institutions to test helpdesk social engineering resistance. Non-financial enterprises are watching the M&S case as evidence that similar mandates may arrive in their sector.
The Category 2 designation also establishes a precedent: cyber events are now graded like hurricanes, with clear financial thresholds and associated regulatory scrutiny. Enterprises that fall into that range without demonstrable evidence of adequate controls face not just operational damage, but regulatory liability.
The Structural Lesson
The M&S and Co-op attacks are most usefully read not as a retail story but as a stress test of enterprise security assumptions that have persisted across industries for a decade. The assumption that perimeter defences catch most threats. The assumption that helpdesks are low-risk internal functions. The assumption that Active Directory is “just IT.” The assumption that technical debt can be managed indefinitely.
The £324 million lost-sales figure is the penalty for those assumptions remaining unchallenged. The 55% profit drop is the board-level consequence of treating cyber resilience as an IT cost rather than a business continuity investment. And the £100 million insurance recovery gap — the difference between what was insured and what was lost — is the clearest signal that cyber insurance is a supplement, not a substitute, for resilience architecture.
One year on, M&S reports recovery is “almost complete.” The companies that move fastest to internalise these lessons will not be the ones who avoided the M&S outcome by luck — they will be the ones who built the architecture to recover in two weeks instead of seven.
Frequently Asked Questions
Q: Who carried out the M&S and Co-op attacks?
The attacks are attributed to Scattered Spider, a financially motivated hacking collective known for social engineering and helpdesk vishing. They deployed DragonForce ransomware against M&S infrastructure.
Q: How much did the M&S cyber attack cost in total?
M&S lost £324 million in sales, with a net profit impact of approximately £136 million for the financial year after accounting for a £100 million insurance payout and the second-half recovery.
Q: What is the UK Cyber Monitoring Centre’s Category 2 classification?
Category 2 on the CMC’s cyber hurricane scale means “substantial financial impact with economic reverberations across third-party suppliers, franchisees and supporting services.” The combined M&S and Co-op costs are estimated at £270–£440 million.
Sources & Further Reading
- M&S Warns April Cyberattack Will Cut $400M from Profits — Cybersecurity Dive
- M&S Braces for £300 Million Cyber-Attack Costs — Infosecurity Magazine
- M&S, Co-op Attacks a ‘Category 2 Cyber Hurricane’, Say UK Experts — Computer Weekly
- One Year On from the M&S Cyber Attack: What Did We Learn? — Computer Weekly
- Cyberattack Fallout Hits M&S Hard: Profits Plunge 55% — CyberNews
- The £300 Million Aftermath: M&S’s Profit Collapse Reveals the True Cost of Cyber Resilience — Breached.Company
- M&S Cyber Update — Marks & Spencer Corporate














