A blog from our Managing Director, Rick Norgate
For our global readers, let me set the scene. Marks & Spencer, or M&S, is more than just a retailer in the UK. It’s a national institution. Think tea, crumpets and politely saying sorry when someone bumps into you. It’s part of our cultural fabric.
So when M&S was hit by a major cyberattack over the Easter break, it didn’t just rattle the markets. It rattled the nation. As someone who spends every day thinking about how to make businesses more resilient to exactly this kind of event, I wanted to share some thoughts on what happened, why it happened, and what it tells us about where our defences are falling short.
The timeline
The attack landed over Easter, a public holiday weekend when IT and security teams were stretched thin. Scattered Spider, one of the more notorious ransomware gangs has claimed responsibility.
The attack wiped nearly £1 billion off M&S’s market value, and with some services – including online ordering – still not up and running, the company is reportedly losing around £43 million per week. Despite already paying out a reported £100 million to the attackers via cyber insurance, the company is predicting disruption will continue into July.
How they got in
It’s believed Scattered Spider started with social engineering. Phishing, impersonation, basically exploiting the human layer, which is still the weakest link. This is not unusual. In almost 9 out of 10 successful attacks, the entry point is a person.
Once in, they moved to install ransomware and access Active Directory, locking out admins and, it’s believed, tampering with backups. That’s a logical move. Backups are the safety net. If attackers can take that away, victims are left extremely vulnerable.
But the ransomware wasn’t the start
Most people think ransomware is step one. It’s not. According to Trend Micro over 90% of attacks start with reconnaissance tools such as keystroke loggers, spyware, credential harvesters. These tools are designed to silently gather intelligence about your estate. They can slip past XDR solutions and allow attackers to learn how to go deeper.
And they don’t hang around. The average time from initial breach to the encryption event is now just 14 days. In 2023, it was 100. That acceleration is no accident. Better security tools mean longer dwell times are risky for attackers. So they move quickly, hit hard, and aim to encrypt when your team is least available.
Enter DragonForce
Scattered Spider didn’t build their own ransomware. They used a service from DragonForce who are a dark web group offering ransomware-as-a-service. Think SaaS, but for criminals. DragonForce operates like a business, complete with account managers and affiliate programmes.
Their most popular kit is based on something called LockBit 3.0 which a leaked builder tool that lets criminals easily customise powerful ransomware that is tailored for each target. It’s modular, it’s configurable and it’s dangerous.
So what if it hits you?
Let’s say LockBit 3.0 is unleashed in your environment. The great news is that fantastic tools exist to help. For example HPE Zerto has real-time encryption detection. IBM has lightening fast encryption awareness built into its FlashSystem storage boxes, and offers Sensors for virtual workloads.
These are great tools as they close the barn door fast once an encryption event stats. But not before a few horses have already bolted. That’s the nature of reactive defences. They reduce loss, not eliminate it.
So, why not stop it earlier?
Why not test everything, every day?
It sounds obvious, but we all know the reality. Deep scanning production environments for malware every day isn’t feasible. The performance impact on your production systems, the cost, the resources needed, and the disruption. It’s just not practical.
For this reason most XDR tools are configured to scan only new or modified files. That leaves plenty of room for reconnaissance tools to sit quietly, doing damage while staying under the radar.
What if there was another way?
There is another way. And it doesn’t interfere with your production systems at all.
Your backups. That’s where the value lies. They are a goldmine of information that often sits idle, stored on expensive hardware, doing very little.
With Predatar and Trend Micro you can automate recovery tests of your backup servers in an isolated CleanRoom every single day. Then you can use market leading XDR tools to scan them for malware with no negative impact on production performance. It’s fast, automated and powered by threat intelligence that’s updated multiple times daily.
We’re talking 500,000 new signatures a day, supported by over 450 threat researchers and 1,500 security engineers.
Why does this matter to CISOs?
Because recovery testing has always been a tick-box exercise. What we’re doing is turning it into a proactive security control. We’re detecting threats at stage one. That gives your team the time and space to respond before the damage is done.
And for those still sceptical?
We’ve found malware in 82% of the client estates we monitor. This is malware that their production XDR tools missed. Every one of those clients uses Gartner Magic Quadrant vendors.

And of that 82%, over half were stage one threats. Keyloggers. Spyware. Trojan horses. The kind of tools that groups like Scattered Spider may well have used to start the M&S attack.
Final thoughts
The M&S attack is a case study in how fast, sophisticated and strategic today’s ransomware operations have become. If your cyber resilience strategy only kicks in after encryption has started, it’s already too late.
Your backup is a valuable untapped asset, your second chance to catch what production missed. Learn more about Predatar Recovery Asurance.
Rick Norgate, Managing Director, Predatar