The cyberattacks on Marks and Spencer (M&S), the Co-op and Harrods demonstrate the escalating cyber threats retail businesses face today. No matter the size and sophistication of a business, the weakest link remains the same: people. The tactics used by Scattered Spider (the organisation responsible for these attacks) reveal just how exploiting the ‘human’ aspect of cyber security can be catastrophic for a business.
Now the dust has settled and the facts of the incidents have been established, we examine the learnings you can take and apply to your organisations, helping you to improve your resilience to cybercrime.
Scattered Spider is a decentralised global cybercriminal group, primarily composed of young, native English speakers. Motivated by financial gain, the group typically conducts ransomware attacks and data extortion against large organisations across various industries and countries. Their attacks often involve double extortion – first encrypting a victim’s data, then threatening to publish it on the dark web unless the ransom is paid on time.
Unlike many cybercriminals who rely on technical exploits to gain access to systems and networks, Scattered Spider expose the ‘human’ element of cyber security, in the form of social engineering. Social engineering involves the criminal manipulating an end user (often via impersonation or creating a false sense of urgency) into revealing confidential information or performing actions that compromise their security. This approach is particularly effective because it allows them to bypass technical controls by exploiting human behaviour.
Scattered Spider’s tactics pose a difficult question: how can staff be sure the person on the other end of the call is who they claim to be? With the prevalence of remote work and AI-generated deepfakes set against a backdrop of urgency, identity checks - like seeing the caller in-person, voice familiarity, or personal details - are no longer reliable.
The recent attack on the retail sector present both a warning and opportunity for improving businesses’ cybersecurity. Below are the key lessons from the attacks. Applying the learnings from this should help to mitigate similar attacks in the future.
While the modus operandi employed by Scattered Spider is nothing new, it does provide us with a reminder that staff can unwittingly provide access to your organisation if there are controls missing. Defending against social engineering requires more than strong technical measures; it demands effective governance, regular staff training, and third-party oversight. As recent incidents have shown, a single breach can trigger widespread operational, financial, and reputational damage.
At Crowe we offer a range of services from cyber governance and employee training to supply chain resilience and vulnerability testing. If you would like further advice or support, our Forensic Services team is always available for a no obligation conversation to help ensure your organisation is effectively managing cyber risks and is prepared to respond in the event of an incident.