Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

M&S calls for mandatory ransomware reporting | Computer Weekly

By Computer Weekly by By Computer Weekly
July 8, 2025
Home Uncategorized
Share on FacebookShare on Twitter


Marks & Spencer chairman Archie Norman has described the recent ransomware attack on the retailer’s systems as something akin to an “out-of-body experience” as he called for cyber attack victims to be brave, bite the bullet, and be open and transparent about their experiences.

Speaking before the Business and Trade Sub-Committee on Economic Security, Arms and Export Controls – in a session at which representatives from fellow attack victim Co-op Group and various cyber experts including former National Cyber Security Centre (NCSC) chief Ciaran Martin also gave evidence, Norman said that while he did not believe government can regulate its way to security, there was a role for it to play in making sure learnings from security incidents are discussed and dispersed, particularly at boardroom level.

He said M&S wanted to use its experience for the benefit of government and other businesses. “I’ve already got one or two boards that have invited me to come and see them and share our war stories, which I will certainly do,” he said.

“We do think that mandatory reporting is a very interesting idea,” said Norman. “It’s apparent to us that quite a large number of cyber attacks never get reported to the NCSC. In fact we have reason to believe there have been two major cyber attacks on large British companies in the last four months which have gone unreported.

“We think that’s a big deficit in our knowledge as to what’s happening. I don’t think it would be regulatory overkill to say if you have a material attack … for companies of a certain size you are required within a time limit to report those to the NCSC and that would enhance the central intelligence body around this.”

He said that early on – before reports of a cyber attack hit the front pages – M&S had shared all the information it had about the ongoing incident with the National Cyber Security Centre (NCSC) so that it could alert other retail businesses, likely including Co-op Group. He also revealed that M&S had received an undisclosed level of support from the US FBI, saying that the FBI was “more muscled up” in this regard.

Traumatic incident

Discussing the impact of the cyber attack, Norman said: “It’s fair to say that everybody at M&S experienced it. Our ordinary shop colleagues [were] working in ways they hadn’t worked for 30 years, working extra hours just to try to keep the show on the road. Let aside our tech colleagues, for a week probably the cyber team had no sleep…. Its not an overstatement to describe it as traumatic.

M&S is still rebuilding its business and expects to be doing so for some time to come, and recognising that its overall IT estate is a hodgepodge of legacy systems, Norman said the organisation is now moving up various phases of an ongoing tech refresh in the wake of the attack.

Commenting on remarks made in the House of Commons by MP David Davis that an unnamed British company had paid a significant ransom recently, Norman declined to say whether or not M&S was the organisation to which Davis was referring, and would not directly disclose whether or not the retailer had received a ransomware demand directly.

He said that early on M&S had taken a decision not to communicate directly with its attackers, leaving that to cyber professionals.

He added that for some time, M&S did not know who had attacked it. “They never send you a letter signed Scattered Spider – that doesn’t happen,” said Norman. “We didn’t even hear from the threat actor for approximately a week after they penetrated our systems. you rely completely upon your security advisors to say what they think is happening and they recognised the threat actor by the attack vector.

“Also they communicate through the media and in this case their chosen avenue of communication was principally the BBC. It was sometimes an unusual experience to be brushing your teeth in the morning when somebody comes onto the BBC with a communication from the people who are allegedly attacking your business.”

Social engineering

Taking further questions from the panel, Norman went out of his way to explicitly deny media reports that suggested M&S had “left the back door open”, saying that the attack had occurred via social engineering via an undisclosed third-party, as has been extensively speculated over the past few weeks.

“The attack on M&S has been penned as sophisticated impersonation, in this case likely referring to the use of  advanced social engineering tactics, potentially including deepfake audio or video, to convincingly pose as executives or trusted insiders,” said Richard LaTulip, field chief information security officer (CISO) at threat intelligence specialist Recorded Future.

“Protecting against sophisticated impersonation attacks requires a layered approach. While technical defences, such as multi-factor authentication and identity verification tools, are essential, the human layer remains the most vulnerable. That’s why ongoing training and executive-level awareness are critical. Employees, especially those in high-risk roles, must be educated to recognize social engineering tactics, including AI-generated deepfakes or urgent messages impersonating leadership.”



Source link

By Computer Weekly

By Computer Weekly

Next Post
‘Big Short’ Trader Steve Eisman breaks down one reason investors shouldn’t worry about deficits

'Big Short' Trader Steve Eisman breaks down one reason investors shouldn't worry about deficits

Recommended.

Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads

Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads

July 10, 2025
Hyperscale datacentre capacities continue to rise off back of AI boom | Computer Weekly

Hyperscale datacentre capacities continue to rise off back of AI boom | Computer Weekly

March 20, 2025

Trending.

Chai AI Announces Upcoming Rollout of Apple and Google Age Verification APIs to Enhance Platform Safety

Chai AI Announces Upcoming Rollout of Apple and Google Age Verification APIs to Enhance Platform Safety

March 10, 2026
Huawei lanceert Next Generation FAN-oplossing

Huawei lanceert Next Generation FAN-oplossing

March 7, 2026
Baidu Announces Fourth Quarter and Fiscal Year 2025 Results

Baidu Announces Fourth Quarter and Fiscal Year 2025 Results

February 26, 2026
Half of Google’s software development now AI-generated | Computer Weekly

Half of Google’s software development now AI-generated | Computer Weekly

February 5, 2026
Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials

Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials

March 24, 2026

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio