Chairman Blames Cyber Group ‘DragonForce’ for M&S Security Breach

Marks & Spencer (M&S) chairman Archie Norman has confirmed that the ransomware attack disrupting the retailer’s online operations in April and May was orchestrated by the cybercriminal syndicate known as DragonForce, as revealed to U.K. lawmakers on July 8, 2025

Taunting Ransom Demand

  • On April 23, M&S CEO Stuart Machin and several executives received an abusive ransom email from a hijacked TCS account, demanding payment via a darknet portal. The message declared: “We have marched the ways from China all the way to the UK and have mercilessly raped your company and encrypted all the servers.”
  • The attackers referenced M&S’s cyber-insurance coverage and threatened to leak stolen data if demands weren’t met thetimes.co.uk+2digitalmarketreports.com+2digit.fyi+2.

Impact and Fallout

About DragonForce

Response and Next Steps

  • M&S declined to pay a ransom and is rebuilding systems from scratch, delaying full recovery but following government cyber guidance.
  • The company has notified affected customers and mandated password resets, while monitoring for potential phishing or fraud attempts moneyweek.com+1mobileidworld.com+1.
  • M&S is ramping up cybersecurity investments, conducting system audits, and working with law enforcement and national agencies to enhance future resilience .

The M&S cyberattack blamed squarely on DragonForce demonstrates the growing threat posed by RaaS groups capable of disrupting major corporations. With millions of customers impacted and hundreds of millions in losses, the case underscores the urgent need for strong cybersecurity protocols, rigorous third-party risk management, and real-time threat detection in modern retail.

1 thought on “Chairman Blames Cyber Group ‘DragonForce’ for M&S Security Breach”

Leave a Comment

MENU
skyblue-oryx-747718.hostingersite.com