Anatomy of a Breach

Anatomy of a Breach: Marks & Spencer — DragonForce Ransomware Costs £1.9 Billion and Hits UK GDP

> series: anatomy_of_a_breach —— part: 196 —— target: marks_&_spencer —— cost: £1,900,000,000 —— impact: uk_gdp —— attacker: dragonforce<span class="cursor-blink">_</span>_

Hedgehog Security 30 April 2025 16 min read

Marks & Spencer. £1.9 billion. The most expensive cybersecurity breach in British history.

In April 2025, Marks & Spencer — one of the UK's most beloved and iconic retailers — was hit by a devastating ransomware attack that disrupted every aspect of its operations. Online ordering was suspended for weeks. In-store contactless payments failed. Click-and-collect services were halted. Gift cards could not be processed. Supply chain operations were severely disrupted, with empty shelves appearing in stores. The attack, attributed to the DragonForce ransomware group using social engineering techniques associated with Scattered Spider, became the defining UK cybersecurity incident of 2025.

The scale of the impact was unprecedented for a UK retail breach. The Bank of England confirmed the attack had impacted UK GDP growth. With over 33,000 direct employees and an estimated 200,000 more in M&S's supply chain, the economic ripple effects extended far beyond the company itself. The estimated total cost exceeded £1.9 billion ($2.5 billion) — making it, by a significant margin, the most expensive cybersecurity breach in British history. The attack was reportedly linked to outsourced IT service dependencies, reinforcing the supply chain vulnerability pattern documented throughout this series.


Recommended

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

£1.9 billion. UK GDP impacted. The benchmark has changed forever.

Impact Area Consequence
Financial cost Estimated £1.9 billion ($2.5 billion) — most expensive UK cyber breach ever
UK GDP Bank of England confirmed impact on national GDP growth
Online sales Online ordering suspended for weeks — significant revenue loss
In-store operations Contactless payments, gift cards, click-and-collect all disrupted
Supply chain Warehouse and logistics disruption — empty shelves in stores
Employment 33,000 direct employees + 200,000 supply chain workers affected
Outsourced IT Attack reportedly linked to dependencies on outsourced IT services

M&S was not alone. The entire UK retail sector was under coordinated attack.

The M&S attack was part of a broader campaign targeting UK retailers in early 2025 — with the Co-op Group and Harrods also targeted in the same period. The concentration of attacks against UK retail demonstrated that the sector was being specifically targeted by ransomware groups, likely using similar social engineering techniques to compromise IT help desks and outsourced service providers.

£1.9 Billion — A New Benchmark
The M&S breach cost exceeded every previous UK cyber incident by an order of magnitude — dwarfing <a href="/blog/anatomy-of-a-breach-british-airways-magecart">British Airways'</a> £20M fine, <a href="/blog/anatomy-of-a-breach-hackney-council">Hackney Council's</a> recovery costs, and even <a href="/blog/anatomy-of-a-breach-wannacry">WannaCry's</a> NHS impact. <a href="/cyber-essentials">Cyber Essentials</a> and <a href="/penetration-testing">penetration testing</a> cost a fraction of £1.9 billion.
Social Engineering — The Consistent Entry Vector
Like <a href="/blog/anatomy-of-a-breach-mgm-caesars">MGM/Caesars</a> (2023) and <a href="/blog/anatomy-of-a-breach-uber-2022">Uber</a> (2022), the attack reportedly used social engineering techniques associated with Scattered Spider. Our <a href="/penetration-testing/social-engineering">social engineering assessments</a> test the human defences that technology cannot replace.
Outsourced IT as Attack Surface
The attack was reportedly linked to outsourced IT service dependencies — the same pattern from <a href="/blog/anatomy-of-a-breach-kaseya-vsa">Kaseya</a> (2021), <a href="/blog/anatomy-of-a-breach-nhs-advanced-lastpass">NHS Advanced</a> (2022), and <a href="/blog/anatomy-of-a-breach-blue-yonder">Blue Yonder</a> (2024). <a href="https://www.socinabox.co.uk">SOC in a Box</a> provides monitoring independent of outsourced IT providers.
GDP Impact — National Significance
The Bank of England's confirmation that the M&S breach impacted UK GDP growth established that individual corporate cyber incidents can have macroeconomic consequences. Cybersecurity is national economic security. <a href="https://www.cyber-defence.io/services/incident-response">UK Cyber Defence</a> provides the crisis management capability for incidents of national significance.

£1.9 billion. GDP impact. Empty shelves. The consequences of inadequate security at the UK's most iconic retailer.

The Marks & Spencer breach is the single most consequential cybersecurity incident in UK history. For every UK business, the message is unmistakable: ransomware can cause damage measured in billions of pounds, can impact national economic output, and can disrupt the daily lives of millions of consumers. The controls that prevent this are the same controls this series has advocated for seventeen years: penetration testing, Cyber Essentials certification, social engineering testing, SOC in a Box monitoring, and incident response capability. £1.9 billion. The cost of not implementing these controls has never been higher.


Marks & Spencer: £1.9 billion. The most expensive UK breach ever. The controls cost a fraction of this. Invest now.

<a href="/penetration-testing">Test</a>. <a href="/cyber-essentials">Certify</a>. <a href="/penetration-testing/social-engineering">Test your people</a>. <a href="https://www.socinabox.co.uk">Monitor</a>. <a href="https://www.cyber-defence.io">Prepare</a>. Because £1.9 billion is the cost of not doing so.

Next Step

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Related Articles