In May and June 2025, leading retailers like Marks & Spencer, Co‑op, Harrods—and even global brands such as Victoria’s Secret, North Face, Cartier—have been hit by sophisticated cyberattacks. These incidents aren't just headlines—they’re stark, wake‑up calls reminding us: no one is safe without a proactive cybersecurity strategy.

1. Marks & Spencer: A £300m Lesson in Third‑Party Risk
In April, M&S suffered a crippling ransomware attack via a third‑party contractor—allegedly exploiting a social‑engineering tactic that "tricked IT workers into resetting passwords".
The result? No online orders, disrupted supply chains, and an estimated profit hit of £300m, with business disruptions extending into July.
Worse, confidential customer data—including emails, addresses, and birth dates—was stolen (though not payment details).
This shows that even secure organisations can be compromised via external partners if proper vendor management and access controls aren’t enforced.

2. The Co‑op & Harrods: Early Warning Signals
Coinciding with the M&S breach were cyber incidents at Co‑op and Harrods.
Co‑op has fortunately recovered swiftly thanks to a decisive and coordinated response.
Similar disruptions occurred at Harrods, though details remain under wraps.
These echoes reinforce that cyber threats targeting one retail giant often spread across the sector.
Global Retailers Hit by Credential Stuffing
The U.S. saw credential stuffing hits at North Face, Victoria’s Secret, and Cartier ‑ accessed via reused credentials from breaches at other platforms.
North Face and Cartier confirmed name and email breaches; Victoria’s Secret even shut down its website temporarily to contain the incident.
Experts warn the trend indicates a coordinated campaign on the entire retail sector
AI & Ransomware: A Dangerous Combo
A recent Financial Times exposé highlights an alarming trend: cybercrime is escalating due to “ransomware‑as‑a‑service” and the misuse of AI tools that automate phishing and malware creation—making attacks more scalable and dangerous.
- Vendor Weakness is Your Weakness
Ensure that third parties handling your data utilize MFA, tight access controls, and ongoing audits—just as you would for your own team. - Defend Credentials with MFA & Unique Passwords
Credential stuffing thrives on password reuse. Enforce strong, unique credentials and Multi‑Factor Authentication on every critical login. - Invest in Cyber Resilience, Not Just Reactions
Relying on cyber‑insurance isn’t enough. As seen with M&S’s losses, insurance may not cover reputational damage or full recovery costs. Prioritise proactive threat detection and rapid incident response. - Educate Your Team
Social engineering was the key to the M&S breach. Frequent, realistic phishing simulations and training dramatically reduce this risk. - Adopt Advanced Security Tools
Endpoint Detection & Response, continuous log‑monitoring, SOC‑grade alerting—these aren’t reserved for large enterprises. Most tools are now affordable and scalable for SMEs. - Plan for Incident Escalation
Have a tested incident response plan, similar to Co‑op’s, to reduce downtime and reinforce stakeholder confidence.

Why Managed IT Support Is Your Shield & Sword
At Managed IT Support, our proactive approach can plug the gaps left by traditional systems:
Comprehensive Vendor Audits to ensure every supplier meets your security standards.
Business‑grade MFA & Password Policies implemented across staff and third‑party connections.
Phishing‑aware Culture with ongoing training and simulated exercises.
24/7 Threat Detection Tools to monitor, alert, and neutralise risks before they escalate.
Incident Response Readiness, so breaches are caught, contained, and communicated swiftly—minimising disruption.
Final Word
The recent retail cyber‑attacks are a powerful reminder: big budgets aren’t bulletproof. Whether you’re running a local SME or a national brand, threat actors don’t discriminate—they exploit the weakest link.
Don’t wait for your own M&S‑style crisis. Get in touch, and let MGIT show you how to build true cyber‑resilience—from the cloud to your supply chain. Because when it comes to cybersecurity, proactive beats reactive—every time.