Cybercrime rocks the high street – what (or who) is next?

23/05/25 Wavenet
Cybercrime rocks the high street – what (or who) is next? placeholder thumbnail

Picture waking up to headlines revealing your business has been targeted by a sophisticated cyber-attack. This recent harsh reality, of stolen customer data and significant operational disruption, faced by UK retail giants Marks & Spencer and Co-op, has exposed the extreme vulnerability of retail cyber security.

So, what is the story behind these attacks, and how can you protect your business from becoming the next headline in cybercrime news?

The breaches brought to light exhibit the rising threat from organised cybercrime groups like Scattered Spider and DragonForce. While the full scope is still unravelling, what is clear is that these incidents emphasise that businesses can no longer afford insufficient cyber security measures.

While publicly available technical insights about these attacks remain sparse, our security teams have put together a high-level overview based on our experiences with similar incidents and our threat intelligence regarding the known threat actor.

What do we know so far?

Scattered Spider, notorious for its sophisticated social engineering and sky-high ransom demands against high revenue European and US companies, in exchange for not leaking sensitive company and customer data, allegedly orchestrated the attacks. Yet, newer ransomware group DragonForce has publicly claimed responsibility.

Reports from both BBC and the National Cyber Security Centre suggest that social engineering (hacking through human error) was the gateway, with crafty manoeuvres like smishing (SMS) or vishing (voice phishing), bypassing defences and gaining access to C-suite, IT, or security roles.

Both M&S and Co-op have suffered significant operational and reputational damage as a result of the attacks. And the M&S share price has dropped by over 14%, wiping more than £1 billion from its market capitalisation. Fully recovering from this cyber attack will be a lengthy and challenging process – if it’s even achievable at all.

Who is most under threat?

Major enterprises in sectors such as retail, finance, telecommunications, hospitality, and cloud services are prime targets for these cyber predators. Why? Their operational complexity and high value data make them especially tempting for Scattered Spider. While patterns of behaviour exist for this most disruptive and innovative cybercriminal collective, it continually adapts tactics, techniques, and procedures (TTPs) to bypass security controls, so unpredictability remains their powerful weapon. The question isn’t “if” but “when” they will strike again.

"Protecting data is not a luxury - it's a fundamental necessity. Cyber threats are evolving rapidly, and organisations of all sizes are at risk. Insider knowledge confirms that cyber security must be embedded into your core business strategy - it's not optional.” - Paul Colwell, Chief Information Security Officer, Wavenet.

What can you do to protect your business?

These recent attacks aren’t isolated incidents; they’re part of a broader surge in targeted, sophisticated cybercrime. But – have no fear – proactive measures can drastically reduce your risk:

Deploy phishing-resistant multi-factor authentication (MFA)

Secure your access points with advanced MFA solutions including hardware security keys (such as YubiKey) and modern app-based number matching.

Enforce strict call-back verification for password resets

Enhance your password reset procedures and instate strict call-back verification protocols. This ensures the identity is thoroughly confirmed before any sensitive account changes are made.

Implement network segmentation

Implement VLANs, firewalls, and access controls, and regularly test segmentation effectiveness to isolate critical systems and limit lateral movement by attackers.

Patch business-critical systems in a timely manner

Stay updated, monitor for new vulnerabilities, schedule and deploy patches, and verify successful updates to minimise the window of exposure to known exploits.

Regularly test your data backups, failover and failback

Schedule and conduct regular backup tests, including failover and failback exercises, to ensure data can be restored quickly and reliably in a crisis.

Monitor security logs for suspicious activity

Implement 24/7 security monitoring with a Security Operations Centre (SOC) across your environment, using advanced SIEM (Security Information and Event Management) tools. This detects, investigates, and responds to suspicious activity in real time.

Perform regular penetration tests including social engineering assessments

Engage in regular testing with CHECK and CREST-accredited penetration testers that will conduct regular technical and social engineering assessments (such as phishing simulations and vishing) and provide detailed reports and actionable recommendations to address weaknesses.

Create and rehearse business continuity & incident response plans

Regularly rehearse Business Continuity and Incident Response Plans and facilitate tabletop exercises and live simulations to ensure your team is prepared for incidents.

Prepare and protect your data using the 3-2-1 strategy

Regularly review backup strategies to ensure compliance and resilience and follow the 3-2-1 rule: three copies of your data, on two different types of storage, with one copy off-site (or in the cloud).

Ensure your data is immutable or air-gapped

Configure immutable backups (that can’t be altered or deleted, even by attackers) and set up air-gapped storage solutions, providing maximum protection against ransomware and insider threats.

All of these measures will help. The key question is - are you confident that your organisation can withstand such organised cyber onslaughts?

Paul Colwell continues: “Every employee and every process must treat security as a vital requirement, because if human error or complacency creates vulnerabilities, it could cost your organisation greatly. It's not just prevention; it's safeguarding!".

Is your business prepared for what’s next?

These disruptive organised attacks are increasing and other major UK retailers such as Harrods have already become victims. But this isn’t the only type of threat that is intensifying.

Ransomware, AI-driven attacks, phishing, DDoS, supply chain compromises, insider threats, and vulnerabilities in cloud, containers, and emerging technologies are all increasing in frequency and sophistication.

Businesses must evolve, too, bolstering detection, response and resilience strategies to stay ahead.

Our Cyber and Operational Resilience expert Martin Lewis, adds a cautionary word to make sure your approach to backup and recovery is part of your cyber resilience and not an afterthought. “Effective data protection strategies are not just compliance checkboxes, they are critical controls that can protect your sensitive data and help to contain the blast radius of a cyber incident.”

With our comprehensive suite of cyber security services you gain a trusted partner equipped to navigate these challenges. To explore how we can help, visit the CyberGuard homepage.

 

Cyber Security, Retail, CyberGuard

Latest blogs

See all posts
wavenet IT support
How we support our customers | Managed IT services UK

We support organisations by bringing together the core building blocks of modern IT - secure, resilient networking; flexible cloud and data platforms; and collaboration tools that help people work from anywhere. As the UK’s most trusted managed service and security provider, we combine a broad portfolio across connectivity, cloud, communications and cyber security with deep technical expertise to design solutions that fit each customer’s goals, not a one-size-fits-all template. From connecting people and places to applications and data, to optimising Microsoft services and costs, enabling AI-driven productivity, and protecting environments with proactive security and incident response, We help customers stay secure, agile and focused - while building the operational resilience needed to anticipate, respond to, and recover from disruption. Watch this video to find out more Transcript: 0:05 Wavenet is the UK's most trusted managed service and security provider with a broad portfolio in connectivity, cloud, communications and cybersecurity. 0:15 We employ 1700 brilliant people with over 950 of those being highly skilled technologists. 0:22 So how do we use our broad portfolio, market leading partnerships and deep technical expertise to support our customers? 0:30 Intelligent networks are the foundation upon which everything else is built. 0:34 If the network is not robust, secure and scalable then anything that's connected to it will be affected. 0:40 From supplying broadband to designing networks from scratch, we connect people and places to data and applications. 0:46 As an ISP, we know there is no one-size-fits-all when it comes to network connectivity, so we take the time to assess the situation and goals before making a recommendation. 0:56 With the intelligent network in place, we make applications and data accessible. 1:00 These can reside anywhere within the Wavenet cloud, whether that be public, private, community or SAS based services unique to the market on demand. 1:09 Azure provides you with access to technical change and run squads for transformation, engineering and support, aligned with your own initiatives and priorities and as scalable as you need. 1:21 In public services such as Azure and Microsoft 365, financial management is a critical component and we have the tools that can effectively review consumption and make recommendations to streamline costs by effective use of licences, application of Azure services and 365 subscriptions. 1:39 Modern Workplace provides secure access for colleagues to the applications and data they need, regardless of location, whether they're in the office, at home, or working remotely. 1:49 They can access their apps and data from the Wavenet cloud, or they can be delivered as SAS services over the Intelligent network. 1:56 Our Copilot adoption and readiness packages unlock productivity, making your people more efficient. 2:02 Our Desktop as a service offering manages the full life cycle of consumer devices from provision, iMac management, recovery and recycle. 2:10 Bundled with complementary services such as End User Service Desk and Customer Site Tech Desk to support your staff and colleagues, ensuring that they're able to use the technology efficiently. 2:20 Our mobile services offer cost effective connectivity and airtime plans from all the UK's mobile network providers. 2:28 IoT services can be described as modern workplace with cameras, sensors, scanners and other devices providing data and insight over the foundation network. 2:37 Once we have connected users to your business applications and data, we help them communicate and collaborate with colleagues, suppliers and customers. 2:45 We empower sales and contact centre users with generative and agentic AI tools, pulling real time data information from your systems before, during and after customer interactions to deliver outstanding customer experiences. 2:59 We protect your environment with a range of proactive security services including security testing, managed detection and response. 3:06 Seem security awareness training and cyber certifications. 3:10 Providing reassurance in the event of an attack through fast and effective cyber incident response. 3:16 Underpinned by our highly skilled people, modern platforms and ITIL aligned processes. 3:22 Our advisory, monitoring, support and manage services simplify technology management, enhance user experience and control complex environments. 3:31 Helping you stay secure, agile and focused. 3:35 From supporting your in house IT teams to fully outsourced infrastructure and end user support across connectivity, cloud, communications and cybersecurity, we scale our services to support your business needs. 3:48 Wavenet has a long heritage in delivering operational resilience services and business continuity management consultancy. 3:54 With services that have evolved to meet the growing demands of UK organisations and new technology, we deliver the ability to anticipate, prepare for, respond to and recover from disruptive events or challenges that could impact your operations. 4:09 The goal is not just to survive disruptions, but to be able to maintain critical operations and recover quickly when things go wrong. 4:16 This is especially important in a fast-paced, interconnected world where businesses faced increased vulnerabilities. 4:23 As you can see, using our economies of scale, diverse vendor relationships and cutting edge expertise, we empower customers to make their technology work smarter.

Read more

Stay service-savvy

Get all the latest news and insights straight to your inbox.