Articles

5 Lessons From a Devastating Series of Cyberattacks

Hackers earlier this year launched aggressive, coordinated cyberattacks on three large British retailing chains: Harrods, Marks & Spencer, and Co-op. To defend itself, Marks & Spencer โ€” hit hardest โ€” shut down many of its computer systems, causing massive business disruptions that cost the company a reported $400 million in profit.

Cyberattack victims typically say little about their experiences. In this case, top executives at Marks & Spencer and Co-op talked through what happened at a British parliamentary subcommittee hearing in July.

The executives withheld sensitive details, but they acknowledged that being targeted was traumatic. โ€œTheyโ€™re essentially trying to destroy your business,โ€ Marks & Spencer Chairman Archie Norman told members of Parliament. โ€œItโ€™s an out-of-body experience.โ€ 

Two days after the hearing, British authorities arrested four people, including three teenagers, in connection with the attacks, which involved social engineering tricks and an apparent ransomware demand. In each instance, it is believed that someone impersonating an employee fooled a contractor into doing a password reset. โ€œIt was a sophisticated impersonation,โ€ Norman said. โ€œSomeone didnโ€™t just rock up and say, โ€˜Would you change my password?โ€™ They appeared as somebody with their details.โ€

The executives said they were willing to share information because keeping quiet only helps the bad actors. Indeed, Norman urged the British government to institute mandatory reporting of serious cyberattacks. โ€œItโ€™s apparent to us that quite a large number of serious cyberattacks never get reported,โ€ he said. That included two major attacks recently on British companies.

At the hearing, Norman and others offered a series of lessons they learned the hard way.

LESSON 1: It only takes one mistake

Marks & Spencer has 50,000 employees. โ€œThe attacker only has to get potentially lucky once with one of those 50,000,โ€ Norman said.

Normanโ€™s testimony shows how the larger the company, the greater the vulnerabilities. The โ€œattack surfaceโ€ โ€” the number of systems, employees, and contractors potentially targeted โ€” can be vast.

โ€œThe right thing to do is assume that the perimeter is permeable,” Norman said. โ€œYou have to have preventions โ€” dual factor authentication, password control, everything โ€” but thereโ€™s 50,000 points of entry.โ€

Dominic Kendal-Ward, Co-opโ€™s group secretary, warned that attacks will become more sophisticated. โ€œNo organization, regardless of how prepared you might be, is entirely invulnerable to these,โ€ he said.

LESSON 2: State-of-the art is better

Established companies invariably rely on computer systems that are hybrids of old and new equipment. These legacy systems have less sophisticated defenses with more potential cracks in their armor. A mix of systems also makes it more difficult to keep operations compartmentalized so that one attack doesnโ€™t paralyze an entire organization. โ€œThe question is, if they get in, how easy is it to move laterally,โ€ Norman said. โ€œPart of the reason why the attack has been business-impairing to us is because we closed down the systems as part of the defense. Once you close them down, bringing them back up in safe form is very difficult.โ€

Rob Elsey, Co-opโ€™s chief digital information officer, said itโ€™s imperative to stay up to date with patches that address new vulnerabilities. Even better is to replace older systems. โ€œThey generally have vulnerabilities that may no longer be able to be patched,โ€ he said.

LESSON 3: Have old-school backups

Once you accept that no company is impervious, what do you do? Have backup plans that assume compromised systems will be unusable for a period of time, either because they were knocked out or taken down as a defensive measure. โ€œOne of the things that we would say to others is make sure you can run your business on pen and paper for a period of time whilst all of your systems are down,โ€ said Nick Folland, Marks & Spencerโ€™s general counsel. Be able to โ€œgo with clipboards,โ€ Norman said, โ€œthen improvise your way through.โ€ 

LESSON 4: Consider cyber insurance

Norman said Marks & Spencer recently had reevaluated its cyber insurance needs and decided to double down on coverage to protect against a calamitous event. The company anticipates receiving a significant payout. Co-op said it decided against such coverage, choosing to invest directly in cyber protections. Going forward, Kendal-Ward said, โ€œWhether we decide to invest in insurance will depend on a detailed analysis, rather than (saying), โ€˜Well, this has happened so we must insure against this specific thing in future.โ€™ โ€

LESSON 5 War-gaming is critical ย  Executives said there is no way to practice experiencing the stress and chaos of a cyberattack, but preparation is still key, and โ€œsimulations are incredibly helpful,โ€ Elsey said. Practicing to defend against an intrusion prepares teams to understand their response roles and work together under pressure. Elsey described two approaches to war-gaming: a crisis-management exercise in which board members practice responding, and a simulated attack exercise in which the company pays a third party to act as a criminal gang. Exercises help identify weaknesses that must be addressed.ย ย  โ€œThere is no one role to cyber defense,โ€ Elsey said. โ€œItโ€™s layered components.โ€ These include technology upgrades, vigilance, crisis management responses, and business continuity plans. โ€œThere are,โ€ he said, โ€œalways lessons to be learned.โ€

Visit the MxD Virtual Training Center for information on cybersecurity workforce training resources.

More News

Articles

Taking the Mystery Out of Controlled Unclassified Information (CUI)

Keeping secrets is everyday work for defense industry contractors. But how do you...

Read More
Articles

2026 Cybersecurity Outlook: โ€˜Hardening Ourselves Against Attacks Has Never Been More Importantโ€™

In 2025, cybercriminals leaned heavily on artificial intelligence (AI) to automate attacks at...

Read More
Articles

The Year in Cybersecurity: AI, CMMC, and Lessons From 2025โ€™s Top Attacks

For manufacturers and suppliers, especially those in the Defense Industrial Base, cybersecurity in...

Read More