We review vendors based on rigorous testing and research but also take into account your feedback and our affiliate commission with providers. Some providers are owned by our parent company.
Learn more
vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: Holiday.com, ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.
Advertising Disclosure

vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: Holiday.com, ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

M&S Confirms Customer Data Was Stolen in Ransomware Attack

M&S Confirms Customer Data Was Stolen in Ransomware Attack
Husain Parvez First published on May 14, 2025 Cybersecurity Researcher

Marks & Spencer has confirmed that personal customer data was stolen in the recent cyberattack that disrupted its services for weeks. The breach exposed names, addresses, phone numbers, and order histories. While account passwords and full card details were not compromised, the retailer urged customers to reset their passwords “for extra peace of mind.”

According to BBC News, the breach affects users of M&S’s online services. While some services remain operational, the retailer’s website and app are only partially accessible, and fulfillment systems continue to face delays.

The data breach is the latest development in an incident that began over Easter weekend, when customers reported failures in contactless payments and Click & Collect services. At the time, M&S described the situation as a “cyber incident” and said it had made “operational changes to protect [customers] and the business,” as cited in the report by TechCrunch. A company spokesperson declined to elaborate, but reports of outages and delays persisted across stores and digital platforms.

The Record confirmed that M&S was contacting customers directly to notify them of the breach. “There is no evidence that this data has been shared,” the retailer stated, though security experts warn the threat of data resale or identity fraud remains. The incident has already caused significant operational damage. The retailer is losing approximately £43 million per week in sales due to the disruption, with no set date for when online ordering will resume.

The attack has been linked to the DragonForce ransomware group, which has also targeted Harrods and the Co-op. Known for “double extortion” tactics — encrypting data while stealing a copy to pressure victims into paying — DragonForce has been under close scrutiny. The National Cyber Security Centre confirmed it is working with affected organizations but said it couldn’t yet confirm if the attacks were coordinated. British intelligence services are investigating whether DragonForce acted alone or as part of a broader campaign.

We reported that the incident showed hallmarks of ransomware, with experts already suspecting DragonForce’s involvement. At the time, M&S’s systems were experiencing widespread disruption, prompting cyber expert Ciaran Martin to call it “a pretty bad episode of ransomware” and a “very difficult one for them to deal with.”

Although in-store operations have resumed, M&S’s logistical and digital infrastructure remains under strain. Laminated signs citing “technical issues” have become a common sight, and customer frustration is mounting. Cybersecurity analysts, however, caution against premature conclusions. “If the attackers hold on to the data and release it later, M&S could face further reputational and legal fallout,” said Matt Hull, head of threat intelligence at NCC Group, in the BBC report.

As of now, the DragonForce group has not publicly claimed responsibility for the attack, but the pattern aligns with other incidents linked to the group. M&S has notified regulators and continues to work with external cybersecurity experts to contain the threat. While the company insists that “there is no need for customers to take action,” it still urges vigilance.

About the Author

Husain Parvez is a Cybersecurity Researcher and News Writer at vpnMentor, focusing on VPN reviews, detailed how-to guides, and hands-on tutorials. Husain is also a part of the vpnMentor Cybersecurity News bulletin and loves covering the latest events in cyberspace and data privacy.

Please, comment on how to improve this article. Your feedback matters!

Leave a comment

This field must contain more than 50 characters

The field content should not exceed 1000 letters

Sorry, links are not allowed in this field!

Name should contain at least 3 letters

The field content should not exceed 80 letters

Sorry, links are not allowed in this field!

Please enter a valid email address