Over the Easter weekend, news broke that M&S were experiencing disrupted operations across its UK network, including online services, supply chains and in-store systems due to a cyber incident.
The timing of the attack was particularly catastrophic, with Easter being a very popular time of the year for not only grocery shoppers but also back-to-school items and general spring-cleaning goods.
Little information has been released about the incident so far, with M&S having not officially disclosed the nature of the cyber attack as of yet. Some news outlets are reporting that they are experiencing a suspected ransomware attack, a form of malware deployed by cyber criminals which encrypts systems and/or data in exchange for a payment, from a well-known threat actor group called ‘Scattered Spider’. The group have been linked to over 100 targeted attacks across the telecoms, finance, retail, and gaming sectors.
With regards to the Co-op incident, it claims that the incident had a 'small impact' on its call centre and back office, however, it took proactive measures to shut down part of its IT systems to prevent hackers accessing them. Similarly, the impact of the Harrods incident has been limited so far. Despite this, the full extent of a cyber incident is often unknown in the early stages, and there is always a possibility that the hackers have infiltrated other areas of the business until a full forensic investigation is complete.
While at the time of writing – the impact on The Co-op and Harrods has been limited so far, M&S felt the full force of the attack, with multiple services being disrupted, including:
M&S were the unfortunate unsuspecting ‘first victims’ in this case. Often, it takes one organisation to get hit badly for others in the sector to take note; The Co-op and Harrods reacted quickly and proactively to shut down the potential threat, which is positive to see.
Unfortunately, incidents like this aren’t unusual. Vulnerabilities will always exist, and cyber criminals will always look to exploit them. Retailers, like businesses from many other sectors, will be struggling to keep on top of a myriad of cyber security issues and are often fighting to maintain security across a range of interconnected systems, which can often be legacy and highly customised. Nevertheless, if an incident does occur, how we manage and respond to it is entirely in our control.
No matter how secure retailers feel they are, the best organisations still comprehensively prepare for the potential impact of a cyber attack. Like The Co-op and Harrods have done, shutting down any potential vulnerable services (where possible) is a positive step. Your incident response team, including those in governance roles, must always be on standby and well-rehearsed. Preparing incident response procedures ahead of time is crucial while navigating attacks. A good incident response plan ensures that roles and responsibilities are clearly defined, and there are backup contacts in the event that individuals are unavailable. An understanding of what systems you can restore (and when) is also vital for resuming operations. From a communications perspective, having templates for internal and external stakeholders is beneficial to ensure a consistent and universal approach to incident handling. The latter being particularly important, as customer loyalty that has taken a lifetime to build can be lost quickly.
Times like these can be worrying for management but also crucially for those working in IT. If you would like some further advice or support, the Forensic Services team is always available for a conversation to ensure your organisation is suitably managing your cyber risks and prepared to respond effectively in the event of an incident.