Ransomware
Marks & Spencer ransomware attack (Scattered Spider / DragonForce)
Primary Source βIncident Details
Scattered Spider (UNC3944) gained initial access to M&S systems as early as February 2025 via social engineering of the third-party IT service desk (vishing/impersonation). Attackers exfiltrated the NTDS.dit Active Directory database, cracked hashes offline to obtain cleartext credentials, then deployed DragonForce ransomware against VMware ESXi hosts on 24 April 2025, encrypting VMs supporting e-commerce, payments, and logistics. Online sales suspended for ~5 days; estimated daily losses Β£3.8 million ($5.1 million). Total stock market value impact: Β£500+ million ($668+ million). Four suspects arrested by NCA 10 July 2025 in connection with M&S and Co-op attacks. M&S Chairman Archie Norman confirmed the social-engineering vector publicly. Sister attacks: Co-op and Harrods targeted in same campaign.
Technical Details
- Initial Attack Vector
- CWE-306: Missing Authentication for Critical Function / social engineering (attackers impersonated an M&S employee and called the third-party service desk to perform a password reset; obtained NTDS.dit to crack hashes offline)
- Vendor / Product
- Marks & Spencer (UK retailer) β VMware ESXi virtual machines; service desk identity management
- Malware Family
- DragonForce ransomware
Timeline
- 2025-02-01 Breach occurred
- 2025-04-25 Publicly disclosed
- 2025-05-01 Customers notified