Lorem ipsum dolor sit amet, consectetur adipiscing elit. Cras in fringilla turpis, eu consequat ante.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Cras in fringilla turpis, eu consequat ante. Donec pellentesque, est non condimentum posuere, eros elit bibendum turpis, vel luctus elit erat in justo.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Cras in fringilla turpis, eu consequat ante. Donec pellentesque, est non condimentum posuere, eros elit bibendum turpis, vel luctus elit erat in justo. Integer ultrices dolor rutrum erat lacinia, ac tincidunt sapien viverra. Integer a ligula porttitor, porttitor nulla eu, laoreet erat. Etiam hendrerit consequat tellus. In ultrices porttitor luctus. Mauris at dolor id felis dictum commodo. Suspe
Lorem ipsum dolor sit amet, consectetur
What they did
Detected around the Easter weekend, the attack was both bold and damaging:
Ransomware strike: DragonForce encrypted servers across critical systems.
Data theft: Names, emails, dates of birth, order histories—and even masked customer account references—were stolen. Thankfully, no usable payment or password data was taken.
What was the impact
Financial punch: Losses were clocking in around £40 million per week, with a projected £300 million hit to annual profits.
Market shock: M&S’s valuation fell more than £700 million, a result of revenue loss and shaken consumer confidence.
Trust eroded: Customers were frustrated and wary—being unable to shop or redeem vouchers shook their faith in the brand.
Insurance puzzle: With a claim estimated at around £100 million, cyber-insurers may not cover everything—adding more uncertainty.
Some services still unavailableincluding click & collect, express delivery options and shipping outside of the UK.
What does this mean for your business
Lock down third-party access: Enforce MFA, strict access profiles, and regular vendor audits.
Out-of-band verifications: Never reset or disable MFA over email or a single phone call—always confirm credentials via established internal channels.
Fight social engineering: Regular phishing and vishing drills, paired with ongoing staff education, help strengthen the human firewall.
Detect lateral movement: Use SIEM/EDR tools to flag unusual activity like massive credential use or NTDS access.
Secure backups: Keep critical data offline and encrypted, and routinely test your recovery procedures.
This high profile breach serves as a wake-up call: no organisation is immune. It's not just about investing in technology, but building resilience in people and processes. Prevention doesn't require perfection, but vigilance - and readiness to respond when someone tries to tick you.
Lorem ipsum dolor sit amet, consectetur adipiscing elit.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Quisque nisi nunc, tincidunt non nibh non, ullamcorper facilisis lectus. Sed accumsan metus viverra turpis faucibus, id elementum tellus suscipit.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Quisque nisi nunc, tincidunt non nibh non, ullamcorper facilisis lectus. Sed accumsan metus viverra turpis faucibus, id elementum tellus suscipit.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Quisque nisi nunc, tincidunt non nibh non, ullamcorper facilisis lectus. Sed accumsan metus viverra turpis faucibus, id elementum tellus suscipit.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Quisque nisi nunc, tincidunt non nibh non, ullamcorper facilisis lectus. Sed accumsan metus viverra turpis faucibus, id elementum tellus suscipit.