Marks & Spencer Cyber Attack Highlights Need for Mandatory Reporting

In This Article
HIGHLIGHTS
- Marks & Spencer's chair, Archie Norman, described the April cyber attack as a "traumatic" event, with hackers aiming to "destroy" the business.
- The attack, attributed to hacker group DragonForce, forced M&S to halt online orders and is expected to impact profits by £300 million.
- Norman suggested mandatory reporting of major cyber attacks, noting two significant unreported incidents involving large UK firms.
- M&S has invested heavily in cybersecurity, yet the attack exploited vulnerabilities through impersonation and third-party contractors.
- The retailer has collaborated with UK and US authorities, including the National Cyber Security Centre and the FBI, to address the breach.
Marks & Spencer (M&S) faced a severe cyber attack in April, which its chair, Archie Norman, described as an attempt to "destroy" the business. The attack, attributed to the hacker group DragonForce, forced the retailer to suspend online operations and left customers facing empty shelves. The incident is projected to cost M&S around £300 million in profits, although the company hopes to recover some losses through insurance.
Impact and Response
The cyber attack, which began on April 17 and was detected two days later, involved sophisticated ransomware tactics. M&S's key online distribution center in Castle Donington remains offline, and the company is still in "rebuild mode." Norman told MPs that the attack felt like an "out of body experience" and left the cyber team working tirelessly with minimal rest.
Call for Cybersecurity Regulations
In his testimony to the Business Select Committee, Norman advocated for mandatory reporting of significant cyber attacks to the National Cyber Security Centre (NCSC). He revealed that two major cyber incidents involving large UK companies had gone unreported in recent months. Norman emphasized the importance of transparency in helping other businesses protect themselves from similar threats.
Cybersecurity Investments and Challenges
Despite investing hundreds of millions in cybersecurity and expanding its prevention team to 80 staff, M&S fell victim to the attack due to vulnerabilities exploited through impersonation and third-party contractors. Norman dismissed media claims that M&S had left its systems vulnerable, stating, "The attacker only has to be lucky once."
Collaboration with Authorities
M&S has been working closely with UK and US authorities, including the FBI and the Metropolitan Police, to address the breach. While Norman declined to comment on whether a ransom was paid, he noted that any business considering such a payment must weigh the potential outcomes, as "substantially the damage had been done."
WHAT THIS MIGHT MEAN
The M&S cyber attack underscores the growing threat of ransomware to major businesses and the need for robust cybersecurity measures. If mandatory reporting of cyber incidents is implemented, it could lead to greater transparency and collaboration among companies and authorities, potentially reducing the impact of future attacks. However, businesses must also invest in advanced security systems and employee training to mitigate risks. As cyber threats evolve, companies like M&S may need to continuously adapt their strategies to safeguard against increasingly sophisticated attacks.
Related Articles

UK Police Assess Epstein's Use of Private Flights Amid Trafficking Allegations

Allegations of Unlawful Reporting Methods in Stephen Lawrence Case Denied by Ex-Daily Mail Reporter

US Congress Seeks Testimony from Peter Mandelson Over Epstein Ties

Mountbatten-Windsor Under Scrutiny Amid Epstein Scandal Allegations

Noel Clarke Arrested Over 2007 Attempted Rape Allegation

UK Police Intensify Investigation into Andrew Mountbatten-Windsor Amid Misconduct Allegations
Marks & Spencer Cyber Attack Highlights Need for Mandatory Reporting

In This Article
Ethan Brooks| Published HIGHLIGHTS
- Marks & Spencer's chair, Archie Norman, described the April cyber attack as a "traumatic" event, with hackers aiming to "destroy" the business.
- The attack, attributed to hacker group DragonForce, forced M&S to halt online orders and is expected to impact profits by £300 million.
- Norman suggested mandatory reporting of major cyber attacks, noting two significant unreported incidents involving large UK firms.
- M&S has invested heavily in cybersecurity, yet the attack exploited vulnerabilities through impersonation and third-party contractors.
- The retailer has collaborated with UK and US authorities, including the National Cyber Security Centre and the FBI, to address the breach.
Marks & Spencer (M&S) faced a severe cyber attack in April, which its chair, Archie Norman, described as an attempt to "destroy" the business. The attack, attributed to the hacker group DragonForce, forced the retailer to suspend online operations and left customers facing empty shelves. The incident is projected to cost M&S around £300 million in profits, although the company hopes to recover some losses through insurance.
Impact and Response
The cyber attack, which began on April 17 and was detected two days later, involved sophisticated ransomware tactics. M&S's key online distribution center in Castle Donington remains offline, and the company is still in "rebuild mode." Norman told MPs that the attack felt like an "out of body experience" and left the cyber team working tirelessly with minimal rest.
Call for Cybersecurity Regulations
In his testimony to the Business Select Committee, Norman advocated for mandatory reporting of significant cyber attacks to the National Cyber Security Centre (NCSC). He revealed that two major cyber incidents involving large UK companies had gone unreported in recent months. Norman emphasized the importance of transparency in helping other businesses protect themselves from similar threats.
Cybersecurity Investments and Challenges
Despite investing hundreds of millions in cybersecurity and expanding its prevention team to 80 staff, M&S fell victim to the attack due to vulnerabilities exploited through impersonation and third-party contractors. Norman dismissed media claims that M&S had left its systems vulnerable, stating, "The attacker only has to be lucky once."
Collaboration with Authorities
M&S has been working closely with UK and US authorities, including the FBI and the Metropolitan Police, to address the breach. While Norman declined to comment on whether a ransom was paid, he noted that any business considering such a payment must weigh the potential outcomes, as "substantially the damage had been done."
WHAT THIS MIGHT MEAN
The M&S cyber attack underscores the growing threat of ransomware to major businesses and the need for robust cybersecurity measures. If mandatory reporting of cyber incidents is implemented, it could lead to greater transparency and collaboration among companies and authorities, potentially reducing the impact of future attacks. However, businesses must also invest in advanced security systems and employee training to mitigate risks. As cyber threats evolve, companies like M&S may need to continuously adapt their strategies to safeguard against increasingly sophisticated attacks.
Related Articles

UK Police Assess Epstein's Use of Private Flights Amid Trafficking Allegations

Allegations of Unlawful Reporting Methods in Stephen Lawrence Case Denied by Ex-Daily Mail Reporter

US Congress Seeks Testimony from Peter Mandelson Over Epstein Ties

Mountbatten-Windsor Under Scrutiny Amid Epstein Scandal Allegations

Noel Clarke Arrested Over 2007 Attempted Rape Allegation

UK Police Intensify Investigation into Andrew Mountbatten-Windsor Amid Misconduct Allegations
