Skip to main content

Incident White Paper

When A Phone Call Bypassed Every Control

The M&S 2025 Social Engineering Breach: How a Single Outsourced Help Desk Became the Perimeter

Published

August 20, 2025

Author

Frank Kahle

Executive Summary

In February 2025, Scattered Spider—a sophisticated social engineering collective—infiltrated Marks & Spencer's network with a single phone call to an outsourced help desk operated by Tata Consultancy Services. No exploit. No zero-day vulnerability. A person answered the phone.

Within weeks, DragonForce ransomware encrypted M&S systems. Online sales shut down for 46 days. The company lost an estimated £3.8 million per day in revenue. By the time M&S regained control, the incident had cost £300 million in profit impact—nearly one-third of the company's annual operating profit.

The same attackers then moved laterally to Harrods and the Co-operative Group using identical methodology. A CEO can understand this: every technical control in the world means nothing if someone can call a help desk and reset a password. Every CFO can feel the £3.8M daily loss. Every board should recognize that outsourcing identity management to a third party made that third party your cybersecurity perimeter—and they didn't know it.

What Failed

M&S is a fortress of technical controls: firewalls, intrusion detection, endpoint protection, network segmentation, multi-factor authentication. All of it proved irrelevant.

The failure was not technical; it was organizational. M&S outsourced its IT help desk to TCS, a global contractor. When Scattered Spider called that help desk claiming to be an M&S employee, they triggered a process: verify identity, reset password, restore access. The help desk did its job. They had no visibility into whether the person on the line was actually an M&S employee. They had no way to detect that the request was malicious. They simply followed procedure.

With legitimate credentials in hand, the attackers moved into Active Directory and extracted the NTDS.dit file—a Windows system file containing hashes for every user password in the domain. They did not crack these passwords. They did not need to. With NTDS.dit, they had access equivalent to every door key in the building.

By late April, when ransomware activated across M&S systems, the breach was already weeks old. Technical teams detected encryption and began response. But by then, attackers had already exfiltrated data and established multiple persistence mechanisms. The damage was done.

Multi-factor authentication did not stop this attack. The attackers did not need to crack MFA. They obtained the initial credential through social engineering—a help desk reset—and MFA can only protect what you authenticate properly in the first place. M&S's fundamental assumption—that the help desk would only respond to legitimate requests—broke under the simplest social engineering pressure.

The Decision Timeline: From Breach to Disclosure

February 2025

Initial Compromise

Scattered Spider makes the phone call to the TCS help desk. An M&S employee credential is compromised. Active Directory and NTDS.dit are accessed.

April 19–21, 2025 (Easter Weekend)

Ransomware Activation & Customer Impact

DragonForce ransomware encrypts critical systems. M&S's online ordering platform goes offline. In-store contactless payments and Click & Collect services fail. Customer-facing systems collapse across 1,049 UK stores.

April 24, 2025

Public Disclosure & Incident Response Begins

M&S acknowledges the breach publicly. The company switches 65,000 staff to pen-and-paper inventory management across 1,049 stores. Automated stock systems remain offline.

May 21, 2025 (27 Days Later)

Financial Impact Disclosed

M&S announces to investors that the breach will cost approximately £300 million in operating profit—30.5% of the company's annual profit target. Online clothing sales remain offline for a total of 46 days.

June–July 2025

Lateral Spread & Sector-Wide Impact

Investigators confirm that Harrods and the Co-operative Group were hit by the same attackers using identical social engineering methods. The UK retail sector faces a crisis of confidence in third-party identity management.

What the Financial Impact Really Means

Numbers can abstract disaster. Let's be concrete:

  • £3.8M Lost per day in online revenue during the 46-day shutdown
  • 46 days Total duration of online sales disruption (clothing, home, beauty)
  • £300M Total profit impact in FY25/26 (insurance will recover ~£100M; net cost approximately £200M)
  • £500M+ Market capitalization loss in the weeks following disclosure
  • 65,000 staff Required to revert to manual, pen-and-paper inventory processes

For M&S, this was not a data breach. It was an operational catastrophe. When your online platform goes dark for 46 days during peak trading season, you don't just lose sales—you lose customer trust, market share, and shareholder confidence. You cannot recover that in a quarter.

The broader impact: a £500 million market cap destruction and the revelation that every major UK retailer's third-party help desk is now visible to sophisticated attackers as a single point of failure.

What the Incident Exposed

The Third-Party Identity Perimeter

M&S had outsourced a critical function—help desk support—to a third party. That decision made business sense: TCS is a global IT services provider with expertise, scale, and 24/7 capacity. But it created a security perimeter that M&S could not directly control.

Scattered Spider understood this instantly. They did not attack M&S's firewalls or endpoints. They attacked the weakest link in the perimeter: the person answering the help desk phone. That person had no way to verify identity beyond what the attacker told them. They had no real-time access to M&S's employee directory. They had no threat intelligence context. They simply followed the help desk procedure, which existed to help employees who had legitimately lost access.

Boards must understand: every outsourced IT function, every managed service provider, every cloud vendor's support desk—these are now part of your security perimeter. If you have not explicitly managed and monitored these third parties as critical security infrastructure, they are a liability masquerading as a cost optimization.

The Operational Resilience Blind Spot

M&S has 1,049 UK stores. The company operates one of the largest retail inventory systems in Europe. When ransomware encrypted the automated stock management system, 65,000 staff had no visibility into what was in stock, where it was located, or what to order next.

The response: pen and paper. Literally. Staff reverted to manual inventory processes used in the 1990s. This worked, but it meant that during the busiest retail period (late April into May), M&S's operational agility collapsed. Delivery logistics suffered. Store-to-store transfers became impossible to track. Click & Collect could not function because the company could not reliably know what stock existed.

This reveals the true cost of digital dependency: M&S's business resilience did not degrade gracefully. It fell off a cliff. There was no documented, tested operational manual for running stores without real-time IT systems. No alternate procedures. No business continuity plan that had actually been rehearsed.

The Speed of Lateral Movement

M&S was hit in February. Harrods and Co-op were targeted using the same methodology—social engineering of outsourced help desks—in the following months. This tells us that Scattered Spider immediately recognized the attack had worked and scaled the technique across the sector.

A phone call costs nothing. Training an outsourced help desk on social engineering resilience costs everything—time, money, coordination across vendors, difficult conversations with service providers about why security is their problem too. So most companies do nothing. Scattered Spider was betting on exactly that.

The Data That Was Lost

The attackers exfiltrated the NTDS.dit file, containing Windows domain password hashes for M&S's entire IT estate. They also extracted personal data on M&S's online customers: names, email addresses, postal addresses, dates of birth, online order history, phone numbers, and masked payment details.

Notably, the attackers did not obtain useable payment information—M&S's payment processing was segregated. But they obtained everything needed to conduct targeted phishing, credential stuffing, and social engineering against M&S employees and customers. They obtained the master key to the domain. This data became tradeable currency in underground markets, amplifying the long-tail damage of the breach across months or years.

The Resilience Lens: What This Attack Reveals About Unpreparedness

Cyber resilience is not the absence of breaches. It is the ability to absorb a breach and continue operating. M&S failed that test.

The company had clearly invested in technical security: firewalls, endpoint protection, network monitoring, MFA. These are table stakes. But it had not invested in the scenarios that actually cost money: operational alternatives when systems fail, third-party identity risk management, crisis communication protocols, and the ability to run a 1,000+ store retail operation without real-time IT.

Resilience also requires honesty. M&S outsourced help desk support to TCS without formally establishing what "identity verification" actually means in a help desk context. It assumed that procedures would be followed. It did not assume—or plan for—the possibility that an attacker would call that desk and exploit the very procedures designed to help legitimate employees.

A resilient organization would have:

  • Documented, tested procedures for running critical operations without automated systems
  • Conducted tabletop exercises simulating both a help desk compromise and consequent operational chaos
  • Established formal security requirements with all third-party service providers, including social engineering resilience training
  • Monitored help desk activity through a third party or through periodic audits for suspicious patterns
  • Practiced incident response scenarios involving simultaneous operational and security disruption

M&S appears to have done none of these things. The result was a 46-day shutdown and a £300 million loss.

What Boards Should Be Asking Now

If you are a board member at a major organization, the M&S incident is not a warning sign of what *could* happen. It is evidence of what *is* happening across the sector. Your duty is to ask these questions of your executive team:

  • 1

    Who handles identity verification and password resets for your organization, and how do they verify identity? If the answer is "an outsourced help desk" or "a managed service provider," then you need to know—in detail—what verification steps they follow, and whether they've been trained to resist social engineering. Ask for documentation. Ask for evidence of training. Ask what happens if that help desk is compromised.

  • 2

    Can your organization operate for 46 days without your core IT systems? If the answer is "we don't know" or "probably not," then you have a critical vulnerability. Operational resilience is not optional for large organizations. It must be explicitly documented and periodically tested.

  • 3

    Have you tested your incident response plan? Not a review, not a walkthrough, but an actual simulation involving operational chaos, communications breakdown, and partial system failure. M&S's response (reverting to pen and paper) suggests they had not thought through this scenario in advance.

  • 4

    What is your organization's single point of failure from a help desk perspective, and how is it monitored? If a single phone call to an outsourced help desk can compromise your domain, you need additional controls: call verification protocols, periodic audits, anomaly detection, and explicit authorization requirements for credential resets.

  • 5

    How much of our digital infrastructure is fully dependent on third parties, and what are our explicit contractual requirements for their security posture? Outsourcing is efficient, but it is not risk-free. Your contracts should specify security training, incident response obligations, and audit rights.

Conclusion: A Phone Call Is Enough

Marks & Spencer invested heavily in technical security controls. None of it mattered because a person answered the phone.

Scattered Spider proved that you do not need zero-days, nation-state funding, or undetectable malware. You need social engineering skill and the knowledge that somewhere in your organization, a third party is answering the phone and will help employees regain access. They are doing their job correctly. The attacker is simply impersonating an employee better than you've prepared for.

The £300 million cost of the M&S incident is not a technical problem with a technical solution. It is an organizational and operational resilience problem. It is the cost of assuming that your third parties are not part of your security perimeter. It is the cost of not documenting and testing what happens when your core systems go dark. It is the cost of not understanding that a CEO can understand social engineering risk, but only if someone explains it clearly.

Harrods and Co-op learned this the hard way. Scattered Spider moved to them next, using the same playbook. How many other organizations—financial services firms, healthcare providers, government agencies, utilities—are currently vulnerable to this exact attack and don't yet know it?

The only defense is preparation. Organizations that have rehearsed this scenario, that have documented operational alternatives, that have explicitly hardened their third-party identity perimeter, and that have trained their help desks on social engineering resistance will survive the next Scattered Spider phone call. Everyone else will get a call they're not ready for.

Rehearse This Scenario

CrisisLoop builds structured executive exercises around real-world incidents like this one. If your leadership team has never rehearsed a social engineering attack that bypasses every technical control through a third-party help desk, that gap is worth closing before it plays out at your organisation.

Talk to Us About Resilience Rehearsal

Sources