REPORTAGE: M&S Crisis – £700M Lost Yet Britain’s Retail Giant Remains Dangerously Exposed
June 14, 2025Helping Keep Small Business CYBERSafe
Málaga: Saturday, 14 June 2025 at 12:00 CEST
REPORTAGE: M&S Crisis – £700M Lost Yet Britain’s Retail Giant Remains Dangerously Exposed
By Iain Fraser/Reportage & Andy Jenkinson CIP
SMECyberInsights.co.uk – First for SME Cybersecurity
#SMECyberInsights #SMECyberSecurity #SMECyberAwareness #CyberSafe #SME #SmallBusiness
Executive Summary
Seven weeks after the devastating cyber attack that crippled Marks & Spencer‘s operations, Britain’s retail giant remains fundamentally insecure, leaving millions of customers exposed to ongoing cyber threats. Despite £300 million in direct operating losses and over £700 million wiped from market value, M&S continues to chase attribution shadows rather than addressing core security vulnerabilities that enabled the breach.
The Staggering Financial Carnage
The numbers tell a devastating story. The “highly sophisticated and targeted” cyberattack will cost Marks & Spencer about £300 million in lost operating profit, with disruption to online services likely until July. When combined with the £700 million market value destruction, total losses exceed £1 billion – making this potentially the costliest retail cyber incident in UK history.
The attack’s scope was comprehensive: stolen customer information could include basic contact details, dates of birth and online order histories, with payment information potentially compromised. M&S serves 32 million customers annually, meaning the breach’s impact reaches unprecedented scales.
The Uncomfortable Truth: Nothing Has Changed
Despite attribution, aka finger pointing, being placed on Tata Consultancy Services and a rogue email, Marks and Spencer continue to overlook and ignore all basic Internet security preferring to chase shadows. This does absolutely nothing for millions of Marks and Spencer customers’ security who will potentially be exposed for many years to come to cyber crime and fraud.
Immaterial of any, and every narrative of how, and why Marks and Spencer‘s basic security negligence was exploited – why are Marks and Spencer still woefully and wholly unacceptably exposed, insecure, and vulnerable and by default, forcing their customers to be? Although an uncomfortable question, until these issues are addressed and remediated, Marks and Spencer and their millions of customers continue to be extremely exposed and extremely vulnerable.
The fundamental issue remains: while M&S executives focus on blame attribution and damage control narratives; the underlying security architecture that enabled this breach remains largely unchanged. The Ransomware attack by an unnamed criminal gang, although all avenues point to the “Scattered Spider” hacker group exploited basic security oversights that, seven weeks later, appear to remain unaddressed.
Expert Analysis: The Path Forward
Andy Jenkinson, cybersecurity expert at CIP (Cybersec Innovation Partners), emphasizes that post-breach remediation requires a complete security transformation, not superficial patches. “The M&S incident demonstrates the catastrophic cost of treating cybersecurity as an afterthought rather than a foundational business requirement,” Jenkinson notes. “Seven weeks post-breach, the focus should be on comprehensive security architecture rebuilding, not finger-pointing exercises.”
Jenkinson‘s expertise highlights critical gaps in M&S’s approach: “Effective cyber resilience demands zero-trust architecture implementation, comprehensive employee security training beyond basic awareness, and proactive threat hunting capabilities. The fact that basic security oversight failures enabled this breach suggests these fundamentals were never properly established.”
Cyber Insurance: A £300M Question Mark
With direct losses exceeding £300 million, M&S‘s cyber insurance coverage faces intense scrutiny. Industry analysts suggest that comprehensive cyber policies typically cover £50-100 million for retailers of M&S‘s scale, potentially leaving hundreds of millions in uninsured losses. The attribution blame game with Tata Consultancy Services may be driven by Cyber Insurance requirements rather than genuine security improvement efforts.
Critical Customer Protection Measures
For M&S customers affected by this breach, immediate protective actions are essential:
Immediate Actions:
* Change all passwords associated with M&S accounts and any sites using similar credentials
* Enable two-factor authentication on all financial and retail accounts
* Monitor bank and credit card statements weekly for unauthorized transactions
* Consider credit monitoring services given the scale of data compromised
Long-term Vigilance:
* Remain alert to sophisticated phishing attempts using your compromised personal data
* Be sceptical of unsolicited communications claiming to be from M&S or financial institutions
* Regularly review credit reports for unauthorized accounts or inquiries
* Consider identity theft protection services for ongoing monitoring
Financial Protection:
* Contact your bank to discuss transaction monitoring enhancements
* Review and understand your bank’s fraud protection policies
* Document any suspicious activity immediately with timestamps and screenshots
The Wider Implications
This incident represents more than corporate embarrassment – it’s a fundamental failure of duty of care to customers. With hackers also hitting Co-op and Harrods in Britain, retailers worldwide are racing to boost security, yet M&S appears to be lagging behind this urgent industry response.
The extended timeline of impact – with disruption expected until July – suggests either inadequate incident response capabilities or more extensive compromise than publicly acknowledged.
Conclusion: Accountability Deficit
Seven weeks after one of Britain’s costliest retail cyber attacks, M&S customers deserve better than blame games and damage control narratives. The uncomfortable reality is that basic security failures enabled this breach, and those fundamental vulnerabilities appear to remain unaddressed.
Until M&S demonstrates genuine commitment to comprehensive security transformation rather than attribution exercises, millions of customers remain unnecessarily exposed to ongoing cyber threats. The £700 million market value destruction should serve as a wake-up call – customers and investors are losing patience with cybersecurity negligence.
The question remains: How many more weeks will pass before M&S prioritizes customer security over corporate damage control?
UK Small Business Owner? Join SMECyber Free Now! & Access the SME Cyber Forum – Read, Learn, Engage, Share …
The Latest SME Cybersecurity News, Threat Intelligence & Analysis, Timely Scam Alerts, Best-practice Compliance, Mitigation & Resources specifically curated for UK Based SMEs in a Single Weekly Email direct to your Inbox or Smart Device together with Unrestricted Free Access to our entire SME Cyber Knowledge & Tutorial Library.

About Andy Jenkinson
Group CEO CIP. Fellow Cyber Theory Institute. Director Fintech & Cyber Security Alliance (FITCA) working with Governments. Recognised Expert in Internet Asset & DNS Vulnerabilities.
Andy Jenkinson is a senior and seasoned innovative Executive with over 30 years’ experience as a hands-on lateral thinking CEO, coach, and leader.


















