Marks & Spencer (M&S)

Marks & Spencer (M&S)

British retail giant **Marks & Spencer (M&S)** suffered a devastating **cyberattack in April 2025**, orchestrated by the **Scattered Spider** group via **third-party vendor impersonation**, exploiting credentials from **TCS help-desk employees**. The breach forced M&S to **shut down its online shopping platform**, suspend **click-and-collect services**, and disrupt **supply chain operations**, leading to **empty shelves in physical stores**. The financial impact was severe, with **£300 million in lost operating profit** and **£1 billion wiped from market capitalization**. The attack **damaged M&S’s reputation**, eroded customer trust, and prompted the **termination of its long-standing IT support contract with TCS**. The incident underscored vulnerabilities in **outsourced vendor access**, **social engineering risks**, and **supply chain cybersecurity**, causing **operational paralysis** and **competitive disadvantage** as rivals gained market share during the outage.

Source: https://www.linkedin.com/pulse/marks-spencer-cuts-ties-tata-consultancy-services-acvke

TPRM report: https://www.rankiteo.com/company/marks-and-spencer

"id": "mar3792037102625",
"linkid": "marks-and-spencer",
"type": "Cyber Attack",
"date": "4/2025",
"severity": "100",
"impact": "5",
"explanation": "Attack threatening the organization's existence"
{'affected_entities': [{'customers_affected': 'Millions (online shoppers, '
                                              'in-store customers)',
                        'industry': 'Retail (Clothing, Food, Home Goods)',
                        'location': 'United Kingdom',
                        'name': 'Marks & Spencer (M&S)',
                        'size': 'Large (Multinational, FTSE 100)',
                        'type': 'Retailer'},
                       {'industry': 'Information Technology',
                        'location': 'India (HQ: Mumbai)',
                        'name': 'Tata Consultancy Services (TCS)',
                        'size': 'Large (Multinational, 600,000+ employees)',
                        'type': 'IT Services Provider'}],
 'attack_vector': ['Sophisticated Impersonation',
                   'Third-Party Vendor Compromise (TCS Help-Desk Access)',
                   'Credential Theft'],
 'customer_advisories': ['M&S notifications about service disruptions',
                         'Apologies for order delays and stock shortages'],
 'date_detected': '2025-04',
 'date_publicly_disclosed': '2025-04',
 'description': 'British retail giant Marks & Spencer (M&S) suffered a '
                'high-profile cyberattack in April 2025, exploited through a '
                'third-party vendor (Tata Consultancy Services - TCS). The '
                'attack, attributed to the Scattered Spider group, used '
                'sophisticated impersonation of TCS help-desk staff to gain '
                "access to M&S systems. The breach disrupted M&S's digital "
                'infrastructure, halted online shopping, and caused supply '
                'chain disruptions, resulting in an estimated £300M in '
                'financial losses and over £1B wiped from market '
                'capitalization. M&S subsequently terminated its help-desk '
                'contract with TCS in July 2025, though both companies '
                'maintain the decision was unrelated to the breach. The '
                'incident highlights risks in third-party vendor access, '
                'social engineering, and outsourcing ecosystems in '
                'cybersecurity.',
 'impact': {'brand_reputation_impact': 'Severe (damaged reliability '
                                       'perception, competitive disadvantage)',
            'conversion_rate_impact': 'Significant (customers unable to place '
                                      'orders)',
            'customer_complaints': 'Widespread (due to unfulfilled orders and '
                                   'stock shortages)',
            'downtime': ['Extended suspension of online orders (weeks)',
                         'Partial halt of click-and-collect services'],
            'financial_loss': '£300 million (estimated lost operating profit)',
            'operational_impact': ['Empty shelves in physical stores',
                                   'Supply chain disruptions',
                                   'Inventory mismanagement',
                                   'Loss of customer trust'],
            'revenue_loss': '£1 billion+ (market capitalization wiped out)',
            'systems_affected': ['Online Shopping Platform',
                                 'Click-and-Collect Operations',
                                 'Supply Chain Systems',
                                 'Inventory Management',
                                 'Store Stocking Systems']},
 'initial_access_broker': {'entry_point': 'TCS help-desk staff credentials '
                                          '(impersonation/social engineering)',
                           'high_value_targets': ['M&S online shopping '
                                                  'platform',
                                                  'Supply chain systems',
                                                  'Inventory management']},
 'investigation_status': 'Ongoing (as of July 2025; TCS maintains no '
                         'compromise of its systems)',
 'lessons_learned': ['Vendor access equals attack surface; third-party '
                     'personnel and processes must be treated as part of the '
                     'cyber footprint.',
                     'Social engineering (e.g., impersonation of help-desk '
                     'staff) remains a critical vulnerability, bypassing '
                     'technical defenses.',
                     'Outsourcing does not absolve the client of '
                     'accountability for cybersecurity, regulatory compliance, '
                     'or business continuity.',
                     'Contract renewal timelines should account for cyber risk '
                     'assessments, especially for high-access vendors.',
                     'Transparency in incident communication is essential to '
                     'mitigate reputational damage and stakeholder '
                     'speculation.',
                     "Retailers must map 'critical vendors' and integrate them "
                     'into cybersecurity strategies, not treat them as '
                     'peripheral suppliers.',
                     'Disruptions to digital platforms (e.g., online shopping) '
                     'can have immediate bottom-line impacts, including market '
                     'share loss to competitors.'],
 'motivation': ['Financial Gain', 'Disruption', 'Data Theft (Presumed)'],
 'post_incident_analysis': {'corrective_actions': ['Termination of TCS '
                                                   'help-desk contract (though '
                                                   'M&S claims unrelated to '
                                                   'breach).',
                                                   'Likely review of all '
                                                   'third-party access '
                                                   'controls and '
                                                   'authentication mechanisms.',
                                                   'Potential adoption of '
                                                   'zero-trust architecture '
                                                   'for vendor access.',
                                                   'Enhanced monitoring of '
                                                   'help-desk activities for '
                                                   'anomalous behavior.',
                                                   'Reevaluation of '
                                                   'outsourcing strategies to '
                                                   'balance cost savings with '
                                                   'cyber risk.'],
                            'root_causes': ['Over-reliance on third-party '
                                            'vendor (TCS) for critical '
                                            'help-desk access without '
                                            'sufficient safeguards.',
                                            'Lack of robust authentication '
                                            '(e.g., MFA) for vendor logins, '
                                            'enabling credential theft via '
                                            'impersonation.',
                                            'Inadequate segmentation between '
                                            'M&S systems and TCS help-desk '
                                            'access, allowing lateral '
                                            'movement.',
                                            'Social engineering '
                                            'vulnerabilities in help-desk '
                                            'processes (e.g., scripted '
                                            'password resets).',
                                            'Complex outsourcing ecosystem '
                                            'with elevated third-party access, '
                                            'increasing attack surface.']},
 'recommendations': ['Implement stricter authentication for third-party vendor '
                     'access (e.g., MFA, behavioral biometrics).',
                     'Conduct regular audits of vendor cybersecurity '
                     'practices, especially for help-desk and privileged '
                     'access roles.',
                     'Develop incident response playbooks specifically for '
                     'third-party breaches, including clear communication '
                     'protocols.',
                     'Integrate vendor risk management into enterprise '
                     'cybersecurity frameworks, treating critical suppliers as '
                     'extensions of internal systems.',
                     'Enhance training for help-desk staff to detect and '
                     'resist social engineering attacks (e.g., impersonation, '
                     'phishing).',
                     'Review outsourcing contracts to include cybersecurity '
                     'SLAs, liability clauses, and breach response '
                     'obligations.',
                     'Adopt zero-trust principles for vendor access, '
                     'minimizing standing privileges and enforcing '
                     'least-privilege access.',
                     'Monitor dark web and underground forums for signs of '
                     'compromised vendor credentials or targeted attacks.'],
 'references': [{'source': 'Media reports on M&S cyberattack and TCS contract '
                           'termination'},
                {'source': 'Statements from M&S CEO Stuart Machin to UK '
                           'Parliament'},
                {'source': 'TCS public statements on the incident'}],
 'response': {'communication_strategy': ['Public disclosure of incident',
                                         'Statements to MPs (UK Parliament)',
                                         'Investor updates',
                                         'Media responses'],
              'containment_measures': ['Suspension of online orders',
                                       'Partial halt of click-and-collect '
                                       'services',
                                       'Isolation of compromised systems '
                                       '(presumed)'],
              'enhanced_monitoring': 'Likely (though not explicitly stated)',
              'incident_response_plan_activated': 'Yes (though details '
                                                  'undisclosed)',
              'recovery_measures': ['Restoration of online shopping platform',
                                    'Rebuilding supply chain operations',
                                    'Customer communication campaigns'],
              'remediation_measures': ['Contract termination with TCS for '
                                       'help-desk services',
                                       'Review of third-party access controls',
                                       'Enhanced authentication for vendor '
                                       'logins (presumed)']},
 'stakeholder_advisories': ['M&S updates to investors and MPs',
                            'TCS communications to clients and media'],
 'threat_actor': 'Scattered Spider',
 'title': 'Marks & Spencer (M&S) Cyberattack via Third-Party Vendor (TCS) '
          'Leading to £300M Loss and Contract Termination',
 'type': ['Cyberattack',
          'Third-Party Breach',
          'Social Engineering',
          'Supply Chain Attack'],
 'vulnerability_exploited': ['Human Trust in Help-Desk Processes',
                             'Weak Authentication for Third-Party Access',
                             'Lack of Multi-Factor Authentication (MFA) for '
                             'Vendor Logins']}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.