<
div style=”text-align: justify;”>
Marks & Spencer (M&S), one of the largest and most established retailers in the United Kingdom, has confirmed that a highly targeted social engineering operation triggered the ransomware attack in April 2025. This breach, which is associated with DragonForce ransomware, points to a disturbing trend in the cybersecurity landscape, namely that human manipulations are increasingly becoming a way to access large-scale digital networks.
Several preliminary findings suggest that the attackers deceived individuals within or connected to the organisation, possibly by posing as trusted employees or partners, to gain unauthorised access to M&S’s internal systems. Once they gained access, the attackers deployed ransomware that crippled the organisation’s operations and led to the theft of approximately 150 GB of sensitive information.
It is important to note that not only did the attack disrupt critical business functions, but it also exposed the weakness in the company’s dependence on third-party vendors, whose vulnerabilities may have contributed to the intrusion. While the company is actively regaining control of its infrastructure as a result of the breach, the incident is a clear warning to organisations across many sectors about the growing threat of social engineering as well as the urgent need for more robust human-centred cybersecurity defences to protect against it.
A public hearing was held on July 8, held at Parl
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.