Marks & Spencer Warns Customers Over Data Theft

Marks & Spencer has contacted online customers to warn them that “some personal customer data” was stolen as part of the cyber-attack that has disrupted the company’s systems since 25 April, but said the data didn’t include card or payment details or account passwords.

The data could include contact details, dates of birth and online order history, the retailer said.

In the email, operations director Jane Wall said the data “does not include useable card or payment details, and it also does not include any account passwords”.

Image credit: Unsplash

‘Peace of mind’

The company said customers do not need to take action, but will be prompted to change their passwords “for extra peace of mind”.

Wall cautioned that the stolen data could be used by hackers to carry out scams.

“You might receive emails, calls or texts claiming to be from M&S when they are not, so do be cautious,” she said.

“Remember that we will never contact you and ask you to provide us with personal account information, like usernames, and we will never ask you to give us your password.”

The retailer has not indicated how many of its customers had data stolen, but said it would contact all of them.

It had 9.4 million active online customers in the year to 30 March, according to its most recent full-year results.

The company said it has also reported the matter to the relevant authorities and is working with security experts to monitor developments.

Chief executive chief Stuart Machin said M&S was “working around the clock to get things back to normal” as soon as possible.

Customers began to experience issues over the Easter weekend and M&S halted online orders on 25 April.

While in-store operations have returned to normal, online orders remain suspended and the company has not indicated when they might resume.

Extortion

Hackers who contacted several media outlets to claim responsibility for the M&S hack said it had been carried out using the DragonForce cybercrime service.

The hackers said they were also behind recent attacks on the Co-op and Harrods.

The DragonForce service involves ransomware that encrypts an organisation’s systems as well as stealing data.

Such attacks frequently involve a double-extortion method in which the company is asked for a ransom to restore their data and another one to delete their copy of the stolen data, which is released to the public if the ransom is not paid.

DragonForce’s darknet website currently does not contain an entry for M&S.

Darren Williams, chief executive of security firm BlackFog, said the attack is an indicator of the current era of hacking “in which data is [hackers’] their most prized target”.

Matthew Broersma

Matt Broersma is a long standing tech freelance, who has worked for Ziff-Davis, ZDnet and other leading publications

Recent Posts

Norway Plans Temporary Ban On New Crypto Mining Data Centres

Norway reportedly seeks to impose temporary ban on new data centres mining crypto, to conserve…

1 day ago

BBC Warns Perplexity Of Legal Action Over Content Use

British broadcaster BBC alleges US-based Perplexity is reproducing BBC content “verbatim” without its permission

1 day ago

Waymo Applies For New York Testing Permit

Congested streets of New York targetted by Waymo for testing, even though full robotaxis are…

1 day ago

Apple ‘Premium’ Priced Folding iPhones Expected In 2026, 2027

Foxconn is expected to begin a foldable iPhone project later this year, says analyst, with…

2 days ago

Microsoft To Axe Thousands Of Sales Staff – Report

More job losses for Microsoft, after report tech giant is planning to cut thousands of…

2 days ago

SpaceX Starship Explodes On Launch Pad

Another setback? Elon Musk's SpaceX rocket explodes into giant fireball during testing at Starbase facility…

2 days ago