Preventing Supply Chain Cyberattacks: Lessons from the Marks & Spencer Breach

Defending Against Cyber Threats Amid Israel-Iran Geopolitical Tensions. Get Insights
Get access to immediate incident response assistance.
Get access to immediate incident response assistance.
Defending Against Cyber Threats Amid Israel-Iran Geopolitical Tensions. Get Insights
As more details of the April ransomware attack on UK retailer Marks and Spencer are made public, we are directly witnessing the cascading repercussions that organizations face when victimized by a well-thought-out and properly executed attack.
In the specific case of M&S, the UK retailer is dealing with a supply chain attack, as M&S CEO Stewart Machin confirmed in a published report.
Machin noted that the unnamed M&S supplier itself was accessed when the IT staff was tricked into changing passwords and resetting authentication processes through a social engineering attack.
The end result, according to the news report, is operations are still being hampered; it is expecting a £300 million hit to operating profits, the attack wiped almost £750 million off its market capitalization, and the retailer has shut down some operations and leaving it unable to stock shelves in its food stores, according to the same news report.
Unfortunately, the complexity and opacity of modern supply chains leave businesses exposed to significant risks, all of which M&S is now experiencing.
While the attack was certainly well-conducted by a well-known threat group, Scattered Spider, multiple precautions can be put in place by organizations to mitigate any damage an attack might cause, allowing a business to recover quickly.
Let's run through each issue M&S is facing.
Scattered Spider used an entire arsenal of tools to finally gain access to and cripple its target, but let's look at the primary methods seemingly used to conduct this attack and a few mitigation recommendations:
Supply chain attacks often target weaker links within an organization's supply network. In software supply chains, for example, attackers can compromise software distributed by a legitimate vendor, affecting end users of that software. In the M&S case, the attacker convinced a supplier's IT team to make access management changes that allowed it to gain access and privileges.
This was likely instigated through a phishing attack, as the FBI has noted email is the top attack vector, responsible for 90% of phishing incidents. This means that a robust email security strategy, which includes a layered defense and a secure email gateway, is essential to protect against evolving phishing threats.
Top Email Security Recommendations:
The email attack, as Machin noted, was helped by the social engineering scheme the attacker used to con a supplier employee into doing something that damaged their organization, turning the person into an "innocent insider". Innocent Insiders, also known as the Well-Intentioned Misguided Person (WIMP), present an entirely different problem than those intentionally trying to do damage.
In many cases, innocent insiders are individuals who demonstrate an interest in solving complex issues or strive to become good corporate citizens. However, they often don't recognize that the request is coming from outside their organization or from a compromised account. In their attempt to contribute to the organization's success, they often share files or offer access to people who lack the necessary permission, or provide access to certain systems and resources by sharing passwords.
Preventative measures should include:
Since the M&S attack originated in its supply chain, a quick review of how to harden this attack surface is in order.
According to M&S, the attacker did inject ransomware into its network, resulting in all the above-mentioned ongoing issues. At this stage, it's too late to stop the ransomware, so the best that can be done is to halt its spread and eliminate it from your system.
After exploitation, efforts should focus on hunting for malware that may be sitting dormant, waiting for the right time to activate and causing further issues.
Having network segmentation and even microsegmentation in place will help limit the malware from spreading. Break your network into smaller, isolated segments (VLANs, firewalls, software-defined networking) based on function, department, or sensitivity.
Maintain multiple copies of your data, with one copy stored off-site or in an isolated environment (e.g., an immutable cloud storage service).
Trustwave is a globally recognized cybersecurity leader that reduces cyber risk and fortifies organizations against disruptive and damaging cyber threats. Our comprehensive offensive and defensive cybersecurity portfolio detects what others cannot, responds with greater speed and effectiveness, optimizes client investment, and improves security resilience. Learn more about us.
Copyright © 2025 Trustwave Holdings, Inc. All rights reserved.