Article Details
Scrape Timestamp (UTC): 2025-05-05 15:25:53.165
Original Article Text
Click to Toggle View
UK shares security tips after major retail cyberattacks. Following three high-profile cyberattacks impacting major UK retailers, the country's National Cyber Security Centre (NCSC) has published guidance that all companies are advised to follow to strengthen their cybersecurity defenses. The cybersecurity breaches that prompted NCSC's alert are the recent hacks at Marks & Spencer, Co-op, and Harrods, all multi-million British retailers. The attacks started with M&S, which suffered a DragonForce ransomware attack that utilized tactics associated with Scattered Spider. The attack disrupted online orders, contactless payments, and the company's Click & Collect service. Last week, Co-op reported another cyber incident, restricting VPN access as a precaution. While initially implying they fended off the breach, Co-op confirmed on Friday that "significant" amounts of customer data were stolen in the attack. On May 1, Harrods confirmed that threat actors tried to breach its network, prompting restrictions on internet access—suggesting an active response, though no breach was confirmed. All three breaches were claimed by the DragonForce operation, with BleepingComputer learning that the threat actors utilized the same social engineering attack to breach both M&S and Co-op. While ransomware was deployed at M&S, Co-op was able to detect and stop the attack before the encryptors could be deployed NCSC's security advisory comes shortly after the agency warned that these attacks should be taken as a "wake-up call" by all large businesses in the country, as they could be the next target in the hackers' crosshairs. Attribution murky At this time, the NCSC has opted not to speculate on who the attackers are and is still working with victims to determine that. "Whilst we have insights, we are not yet in a position to say if these attacks are linked, if this is a concerted campaign by a single actor, or whether there is no link between them at all," stated NCSC. "We are working with the victims and law enforcement colleagues to ascertain that." However, BleepingComputer has learned that both the M&S and Co-op attacks have been attributed to hackers utilizing tactics commonly associated with Scattered Spider, Lapsus$, and other threat actors who frequent the same Telegram channels, Discord servers, and hacking forums. The attacks on both Marks & Spencer and Co-op started with threat actors impersonating employees while contacting the company's IT help desk staff. They then used social engineering to convince the help desk to reset the impersonated employee's credentials so they could gain access to the network. This is why the NCSC recommends that all companies review their help desk process to detect and block these types of breaches. "Review helpdesk password reset processes, including how the helpdesk authenticates staff members credentials before resetting passwords, especially those with escalated privileges," advised the NCSC. Ultimately, the NCSC says there are still a lot of unknowns, but also a lot they know, so some information may be withheld from publication so as not to impact the ongoing investigations and/or response. Security recommendations The NCSC has published a list of security recommendations for UK businesses to follow and mitigate the risk. These can be summarized as follows: The agency urges organizations of all sizes to prepare for the worst, as attackers could test their defenses next. Cybersecurity experts Kevin Beaumont and Will Thomas, who have both been tracking these attacks, have also shared tips on detecting and blocking these types of threat actors. It is strongly advised that all companies, regardless of your country, follow this guidance to strengthen their cybersecurity posture. Top 10 MITRE ATT&CK© Techniques Behind 93% of Attacks Based on an analysis of 14M malicious actions, discover the top 10 MITRE ATT&CK techniques behind 93% of attacks and how to defend against them.
Daily Brief Summary
Following a series of cyberattacks on Marks & Spencer, Co-op, and Harrods, the UK’s NCSC issued new cybersecurity guidance.
Marks & Spencer experienced a disruptive ransomware attack by DragonForce, affecting online orders and payments.
Co-op faced a cyber incident that led to VPN restrictions and eventual confirmation of significant customer data theft.
Harrods reported an attempted breach, leading to increased network security measures, though no confirmed data breach.
All incidents involved social engineering tactics to infiltrate networks, primarily through help desk impersonation.
The NCSC refrained from speculating on the attackers’ identities but highlighted ongoing investigations with law enforcement.
Enhanced security recommendations include reviewing and strengthening helpdesk authentication processes.
Businesses nationwide are urged by NCSC to prepare for potential cyber threats by adopting recommended security measures.