Back to blogs
Insights

Marks & Spencer cyberattack: Scattered Spider

August 12, 2025

|

8

min read

Follow me on Linkedin as

Highlights

Marks & Spencer suffered a major cyberattack by Scattered Spider, involving credential theft, data exportation, and ransomware. This breach breakdown outlines what happened and what could have helped prevent the attack.

Breach breakdown

In April 2025, Marks & Spencer (M&S) was hit by a serious cyberattack, and not by amateurs. The group behind it, known as Scattered Spider (also known as UNC3944 or Octo Tempest) has a track record. They’ve already taken on major U.S. giants like Caesars Entertainment and MGM Resorts.

Our 40Fi DFND team has done a deep dive into what happened and, more importantly, how businesses like yours can stay protected.

Figure 1: M&S store front

Want practical, jargon-free cybersecurity advice tailored for your business?
Join our free workshop with the City of London Police. Register now.

How they got in

Scattered Spider used smart, targeted phishing emails and impersonated IT staff to trick people into handing over their credentials. They even used a tactic called "MFA fatigue", which consisted of spamming employees with repeated login requests until one was mistakenly approved.

Threat intelligence researcher, Lontz reported on suspected Scattered Spider infrastructure (see figure 2), involving fake domains designed to mimic legitimate login pages of well-known websites. A spoofed company login page could have been created to get access to M&S employee login details.

Figure 2: Lontz malicious domain post via X

What happened after they got in

Initial access to M&S systems is believed to have been as early as February. Once in, the attackers used stolen administrative credentials to deploy legitimate remote administration tools (RATs). This gave them ongoing control over key systems (including employee devices), helping them stay hidden while moving through the network.

Here's what they did:
  • Installed remote desktop access tools like AnyDesk and TeamViewer - the same kind real IT teams would use
  • Moved around through different M&S’s internal systems to grab as much data as possible
  • Targeted critical assets like password databases and user credentials

Finally, they created secret access points, hidden accounts, and scheduled tasks to make sure they could stay inside the company's network without getting noticed.

The attack

On April 24, Scattered Spider launched the DragonForce ransomware attack on M&S’ VMware ESXi servers, encrypting virtual machines that powered key systems for e-commerce, payment processing, and logistics (see figure 3).

Figure 3: DragonForce ransom note and negotiation software

As a result, M&S had no choice but to shut down key systems entirely (including online orders and contactless payments), and call in top cybersecurity experts from CrowdStrike, Microsoft, and Fenix24 to contain the damage and start the recovery process (see figure 4).

Figure 4: M&S online website having paused online orders

What this means for you

While M&S is a major player, the tactics used in this breach aren’t just for corporations, they work just as well against small businesses. Groups like Scattered Spider rely on common tools and stolen identities to gain trust and slip past normal security. The key lesson? Always verify the people and systems you rely on, whether they’re inside your team or external partners.

What you can do to improve cybersecurity for your business

5 quick wins to protect your business
  1. Train your team – teach employees to spot dodgy emails, spoofed links, and sketchy login pages.
  2. Use strong passwords – create long, complex passwords that include a mix of uppercase and lowercase letters, numbers, and special characters. Never reuse passwords across different accounts.
  3. Enable multi-factor authentication (MFA) – this adds an extra layer of security beyond just a password.
  4. Stay vigilent – do not open email attachments or click on links unless you are certain of their legitimacy. If you have any doubts, report the email to your security team immediately.
  5. Report suspicious activity fast – if you receive unexpected MFA prompts, suspicious login alerts, or calls requesting your credentials, report them to your security team as soon as possible.

Additional information

Get in touch.

Tell us about yourself so we can serve you best.

Got a question?

No items found.