M&S Cyber Drama: Ransomware Ruckus or Password Pandemonium?
M&S confirmed a DragonForce ransomware attack following a sophisticated impersonation breach. Despite the chaos, M&S kept their cool, leaving negotiations to the pros. Whether they paid the ransom remains a mystery, but one thing’s for sure: the hackers are no match for British resolve—or humor.

Hot Take:
When life gives you ransomware, hire professionals to deal with it! M&S shows us that even in the world of cybersecurity, it’s best to leave the messy drama to the experts. Nobody wants to negotiate with a digital dragon, after all. It’s like dealing with a tech-savvy dragon that has a thing for shopping sprees.
Key Points:
- M&S was breached through a sophisticated impersonation attack, leading to a DragonForce ransomware incident.
- The attack involved social engineering and tricked a third-party into resetting an employee’s password.
- The ransomware operation is believed to have links with a group named Scattered Spider.
- M&S shut down their systems to prevent further spread of the attack, but not before significant data was stolen.
- M&S decided not to handle ransom negotiations personally, leaving it to experienced professionals.
Already a member? Log in here