Marks & Spencer’s Cybersecurity Snafu: Customer Data Encrypted and Exposed!

Marks and Spencer’s cyber drama unfolds as customer data takes an unauthorized vacation. While the hackers encrypted servers using ransomware, M&S reassures customers that no payment details were stolen. However, a password reset awaits anyone logging into the website. Beware of fake “we’re M&S” messages, and let the cyberthreat chuckles commence!

Pro Dashboard

Hot Take:

If M&S were planning on launching a new line of cybersecurity fashion, this could be their debut. “Ransomware Chic”—where your personal data is the latest accessory no one wanted to carry. If only DragonForce ransomware affiliates would stick to breathing fire in their own lairs instead of toasting retail networks. Who knew shopping could be such a dangerous sport?

Key Points:

  • M&S suffered a ransomware attack on April 22, 2025, halting online orders and encrypting servers.
  • DragonForce ransomware affiliates used Scattered Spider tactics to breach the network.
  • Customer data, excluding card details and passwords, was stolen but not shared.
  • Customers must reset passwords but should beware of phishing attempts.
  • Sparks offers are paused, and M&S is contacting affected customers.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?