In a striking series of events, a recent interaction between a BBC journalist and alleged hackers behind the cyberattacks on Marks & Spencer (M&S) and Co-op has unveiled unsettling details about the growing menace of ransomware in the retail sector. Joe Tidy, the journalist in question, reported receiving a Telegram message from hackers claiming responsibility for the disruption, which has left shoppers facing empty shelves and retailers scrambling to address significant data breaches.

The hackers revealed they had successfully infiltrated the systems of both retailers, stealing substantial amounts of private customer and employee information. This alarming disclosure aligns with broader reports that M&S has been grappling with a ransomware attack linked to a group known as ‘Scattered Spider’, which reportedly gained access as early as February 2025. According to expert analyses, this group has used the DragonForce encryptor, resulting in widespread operational chaos, severely impacting services such as online orders and contactless payments.

The urgency of the hackers’ efforts appeared to stem from frustration over Co-op’s handling of the ransom demands, suggesting that they had not relented in their claims. This interaction highlighted not just the technical prowess of the threat actors but also the psychological warfare employed in modern cybercrime, wherein conversations and negotiations can take a provocative turn, as evidenced by the hackers’ subsequent furious letter to Tidy.

Experts have noted that the DragonForce group, which has rebranded itself as a diversified cartel offering advanced tools for cybercriminals, embodies a new level of sophistication in ransomware operations. Their services include 24/7 support and customisation options for hackers, enhancing their already formidable reach. These innovations have emerged in a landscape marked by fierce competition among cybercriminal elements after police crackdowns on notorious groups like LockBit, which have left a power vacuum.

The ramifications of these attacks extend beyond the immediate operational disruptions; they reflect broader vulnerabilities within the retail sector and underscore an urgent need for enhanced cybersecurity measures. Estimates suggest that M&S has faced daily losses of around £30 million due to the attack, resulting in not just financial strain but operational disruptions, including significant food waste and clothing shortages.

In response to the recent spate of cyberattacks, the UK’s National Cyber Security Centre (NCSC) has issued guidance aimed at bolstering cybersecurity protocols across major retailers. This advisory highlights the necessity for robust password management practices and vigilant monitoring of systems to thwart such breaches in the future.

As the situation evolves, the complexities surrounding attribution in cybercrime remain a significant challenge. Cybersecurity experts are continuing to investigate the interplay among various groups, noting the characteristics that might indicate operational links between Scattered Spider and DragonForce. Understanding these dynamics is crucial, not just for national security, but for the integrity of consumer trust in digital retail environments.

In this era of heightened cybersecurity threats, the incident serves as a stark reminder of the need for vigilance and resilient security strategies in the face of a rapidly evolving landscape of cyber threats.


Reference Map

  • Paragraph 1: Sources [1], [3]
  • Paragraph 2: Sources [2], [4]
  • Paragraph 3: Sources [1], [6]
  • Paragraph 4: Sources [3], [5]
  • Paragraph 5: Sources [5], [6]
  • Paragraph 6: Sources [4], [7]

Source: Noah Wire Services