Severity
critical
Records
Unknown
Vector
Social Engineering — vishing to third-party service desk for password reset
Organization
Marks & Spencer
Incident Date
2025-02-01

Executive summary

British retail giant Marks & Spencer (M&S) suffered a devastating ransomware attack in April 2025 when threat actors from Scattered Spider social-engineered a third-party service desk into resetting an employee password. The attackers exfiltrated the Active Directory database, deployed DragonForce ransomware across VMware infrastructure, and forced M&S to suspend online sales for 46 days—causing an estimated £300 million ($400 million) in lost profit.

Incident overview

AttributeDetails
Victim organizationMarks & Spencer plc
IndustryRetail
HeadquartersLondon, United Kingdom
Employees64,000+
Attack startFebruary 2025 (initial access)
Ransomware deploymentApril 24, 2025
Online sales restoredJune 10, 2025
Downtime46 days
Financial impact£300 million (~$400 million) lost profit
Stock impact£500 million+ market cap loss
Threat actorsScattered Spider, DragonForce

Timeline

DateEvent
February 2025Initial breach; NTDS.dit file stolen
April 19-21, 2025Easter Weekend - In-store payment glitches begin
April 23, 2025CEO Stuart Machin receives ransom message via employee email
April 24, 2025DragonForce ransomware deployed on VMware ESXi hosts
April 25, 2025M&S suspends online shopping
April 29, 2025M&S confirms cybersecurity incident
May 2, 2025Harrods and Co-op report similar attacks
May 13, 2025M&S confirms customer data was breached
June 10, 2025Online clothing orders resume after 46-day hiatus
July 2025Full online operations expected to resume

Attack methodology

Stage 1: Social engineering

TacticDetails
TargetThird-party service desk
MethodPhone call impersonating M&S employee
RequestPassword reset for employee account
OutcomeAttackers obtained valid credentials

M&S Chairman Archie Norman confirmed:

“Attackers impersonated an M&S employee and called the service desk run by a third party, who carried out a password reset for them.”

Stage 2: Active Directory compromise

ActionImpact
Credential useLogged into M&S network
AD exploitationExfiltrated NTDS.dit file
NTDS.dit contentsAll domain password hashes
Lateral movementFull domain compromise

The NTDS.dit file contains password hashes for all Active Directory accounts, enabling attackers to crack credentials offline and move laterally throughout the environment.

Stage 3: Ransomware deployment

TargetDetails
PlatformVMware ESXi hosts
RansomwareDragonForce
ImpactVirtual machines encrypted
Systems affectedE-commerce, payments, logistics

Business impact

Operational disruption

SystemImpact
Online shoppingSuspended 46 days
In-store paymentsContactless failures
Click & CollectService unavailable
LogisticsFulfillment disrupted
Food supplySome shortages reported

Financial impact

MetricAmount
Lost profit£300 million (~$400 million)
Daily online sales loss£3.8 million (~$5.1 million)
Stock market cap loss£500 million+ (~$668 million)
Recovery costsNot disclosed

Customer impact

EffectDetails
Shopping disruptionUnable to order online
Payment failuresIn-store contactless issues
Data exposurePersonal information confirmed breached
Click & CollectOrders unfulfillable

Data exposed

Confirmed breached

Data typeStatus
Customer namesConfirmed
Contact detailsConfirmed
Dates of birthSome customers
Order historyLikely

Confirmed NOT breached

Data typeStatus
Payment card detailsNot stored on M&S systems
Account passwordsNot compromised
Financial dataProtected

M&S statement:

“Importantly, the data does not include useable payment or card details, which we do not hold on our systems, and it does not include any account passwords.”

Threat actor profiles

Scattered Spider

AttributeDetails
Also known asUNC3944, Octo Tempest, 0ktapus
OriginPrimarily US/UK English speakers
TacticsSocial engineering, SIM swapping, MFA bombing
Notable targetsMGM Resorts, Caesars, Twilio, Okta
StructureLoosely organized collective

Scattered Spider specializes in social engineering attacks against help desks and IT support, often impersonating employees to obtain password resets or MFA bypass.

DragonForce

AttributeDetails
First observedDecember 2023
ModelRansomware-as-a-Service (RaaS)
Recent developmentWhite-label service for affiliates
EncryptionTargets VMware ESXi environments

DragonForce has begun offering a white-label ransomware service, allowing affiliates like Scattered Spider to use their infrastructure and malware.

The M&S attack was part of a broader campaign against UK retailers:

TargetDateThreat actor
Marks & SpencerApril 2025Scattered Spider/DragonForce
Co-opMay 2025Similar tactics
HarrodsMay 2025Similar tactics

Security lessons

What failed

ControlGap
Service desk verificationSocial engineering succeeded
Third-party securityOutsourced desk lacked rigor
AD monitoringNTDS.dit theft not detected
Network segmentationLateral movement to ESXi hosts

What should have been in place

ControlPurpose
Callback verificationVerify password reset requests
Privileged access managementLimit AD admin access
AD monitoringAlert on NTDS.dit access
Network segmentationIsolate critical infrastructure

Recommendations

For retail organizations

PriorityAction
CriticalImplement callback verification for password resets
CriticalMonitor Active Directory for NTDS.dit access
HighSegment VMware infrastructure from corporate network
HighDeploy EDR on all ESXi hosts
MediumRequire video verification for high-risk requests

For organizations using third-party service desks

PriorityAction
CriticalEstablish identity verification protocols
HighAudit third-party security practices
HighRequire security awareness training
MediumImplement tiered request verification

For IT service desk teams

PriorityAction
CriticalNever reset passwords based on phone requests alone
HighUse callback to known numbers for verification
HighEscalate unusual requests to security team
MediumDocument all verification steps taken

Context

The M&S breach illustrates how sophisticated threat actors exploit the human element of security. Despite whatever technical controls M&S had in place, a single phone call to a third-party service desk bypassed them entirely.

Scattered Spider has refined social engineering to an art form. Their members—often young, native English speakers—can convincingly impersonate employees and manipulate help desk staff into providing access. The group’s success against MGM Resorts, Caesars, and now M&S demonstrates that social engineering remains one of the most effective attack vectors.

The £300 million business impact underscores the catastrophic potential of ransomware against retail operations. M&S’s 46-day online sales suspension during peak shopping season caused damage that will take years to fully recover from—both financially and reputationally.

For defenders, this incident reinforces that identity verification for password resets must be rigorous. Callback verification to known phone numbers, manager approval, and video verification for sensitive accounts are no longer optional luxuries—they’re essential controls against social engineering.

The involvement of DragonForce as the ransomware payload highlights the RaaS ecosystem’s evolution. Scattered Spider’s social engineering expertise combined with DragonForce’s encryption capabilities created a devastating attack that neither group could have executed alone.