We review vendors based on rigorous testing and research but also take into account your feedback and our affiliate commission with providers. Some providers are owned by our parent company.
Learn more
vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: Holiday.com, ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.
Advertising Disclosure

vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: Holiday.com, ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

M&S Cyberattack Disrupts Services — Ransomware Suspected

M&S Cyberattack Disrupts Services — Ransomware Suspected
Husain Parvez First published on May 03, 2025 Cybersecurity Researcher

Marks & Spencer (M&S), one of the UK’s leading retailers, is grappling with the fallout of a major cyberattack that has disrupted its services for over a week. The incident has forced the company to pause online orders, created delays in Click & Collect services, and left visible gaps on store shelves. Industry experts increasingly suspect a ransomware attack — possibly involving the DragonForce group.

M&S initially disclosed the breach via a London Stock Exchange statement, describing it as “a cyber incident” and noting “minor, temporary changes to our store operations to protect customers and the business.” As disruptions continued, CEO Stuart Machin addressed customers via social media, saying the company was “working day and night to manage the current cyber incident and get things back to normal for you as quickly as possible.”

In a further update published on April 25, M&S added, “Our experienced team — supported by leading cyber experts — is working extremely hard to restart online and app shopping.”

The BBC reported that the ransomware group DragonForce may be responsible, possibly in connection with the Scattered Spider gang — a cybercrime network previously linked to the 2023 MGM Resorts breach in Las Vegas. Ciaran Martin, founding chief of the UK's National Cyber Security Centre, called it “a pretty bad episode of ransomware,” adding that it’s “a highly disruptive event and a very difficult one for them to deal with.”

While some M&S services remain operational, the retailer’s website and app are only partially accessible. In-store contactless payments have been restored, but delays continue in fulfillment and payment systems. Cybersecurity experts warn that restoring complex retail infrastructure after a ransomware event can take significant time. Professor Alan Woodward of the University of Surrey commented, “Everything from knowing what has been sold — hence what needs replenishing — to taking card payments is very dependent on complex systems.”

Adding to broader cybersecurity concerns, a recent investigation revealed that over 14 million cookies belonging to UK users — some containing login credentials and authentication tokens — had been leaked onto the dark web, with 56% still active. While no direct link to the M&S breach has been established, the incident highlights growing vulnerabilities across the UK retail sector.

M&S has not yet confirmed whether customer data was compromised or identified the threat actors involved. In the meantime, cybersecurity professionals recommend that customers remain cautious and update any reused passwords as a precaution.

About the Author

Husain Parvez is a Cybersecurity Researcher and News Writer at vpnMentor, focusing on VPN reviews, detailed how-to guides, and hands-on tutorials. Husain is also a part of the vpnMentor Cybersecurity News bulletin and loves covering the latest events in cyberspace and data privacy.

Please, comment on how to improve this article. Your feedback matters!

Leave a comment

This field must contain more than 50 characters

The field content should not exceed 1000 letters

Sorry, links are not allowed in this field!

Name should contain at least 3 letters

The field content should not exceed 80 letters

Sorry, links are not allowed in this field!

Please enter a valid email address