HomeMalware & ThreatsMark & Spencer Cyber Attack during Easter

Mark & Spencer Cyber Attack during Easter

Published on

spot_img

On April 21, 2025, British retail giant Mark and Spencer (M&S) faced a challenging situation when it confirmed a cyberattack that disrupted contactless payment terminals in over 1,400 of its UK stores. While the company assured customers that its physical and online sales platforms were not affected, behind the scenes, sources suggested that critical digital infrastructure, specifically servers related to payment gateways, had been impacted. This disruption led to issues with cardless payment processing, particularly on Easter Monday, a high-traffic shopping day for the retailer.

The extent of the breach and whether sensitive data was compromised or ransomware was deployed by the cybercriminals remains unclear. M&S has yet to confirm if data was stolen or if the servers were encrypted, indicating a potentially malicious attack. In response, the company has engaged third-party forensic experts to investigate the incident and assess the full impact on its operations.

Both the UK’s Information Commissioner’s Office (ICO) and the National Cyber Security Centre (NCSC) have been notified about the breach, with ongoing support being offered by these agencies. M&S has initiated a disaster recovery plan to contain any potential damage and restore full payment services to minimize the impact on its customers and operations.

This cyberattack on M&S reflects a concerning trend in the cybersecurity landscape, where hackers target organizations during holiday weekends when IT staff availability is limited. The reduced capacity for real-time monitoring and response during these periods makes businesses vulnerable, especially small and medium-sized enterprises without 24/7 IT support.

Cybersecurity experts emphasize the importance of adopting automated threat detection and monitoring systems to mitigate risks proactively. Implementing a zero-trust network model, multifactor authentication, and mobile endpoint detection can enhance network security and protect against unauthorized access and potential threats.

Regular penetration testing is another crucial recommendation to evaluate the strength of an organization’s cybersecurity defenses and identify vulnerabilities. Conducting these tests every three to six months ensures that businesses are prepared to combat the evolving cyber threat landscape effectively.

As demonstrated by the recent breach at M&S, cybersecurity is a paramount concern for all businesses, underscoring the significance of proactive security measures, continuous threat monitoring, and robust cybersecurity frameworks. Implementing these strategies can help organizations safeguard their operations and mitigate the risk of falling victim to sophisticated cyberattacks.

Source link

Latest articles

Only 30 Minutes per Quarter on Cyber Risk: The Shortcomings of CISO-Board Conversations

In a recent report, the significance of board involvement in the realm of cybersecurity...

ClickFix Attackers Employ New Tactic to Evade Detection, According to Microsoft

In light of recent cybersecurity threats, the significance of enforcing strict security measures on...

China-Linked Hackers Employ Trio of Malware for Telecom Espionage

Researchers Link UAT-9244 Intrusions to Notorious Cyberespionage Groups In a recent report, Cisco Talos researchers...

Iran-linked APT Attacks US Critical Sectors Using New Backdoors

Iran-Linked Hacking Group Targets U.S. Organizations Amid Rising Geopolitical Tensions An Iranian hacking group known...

More like this

Only 30 Minutes per Quarter on Cyber Risk: The Shortcomings of CISO-Board Conversations

In a recent report, the significance of board involvement in the realm of cybersecurity...

ClickFix Attackers Employ New Tactic to Evade Detection, According to Microsoft

In light of recent cybersecurity threats, the significance of enforcing strict security measures on...

China-Linked Hackers Employ Trio of Malware for Telecom Espionage

Researchers Link UAT-9244 Intrusions to Notorious Cyberespionage Groups In a recent report, Cisco Talos researchers...