01 logo

🔐 When Trust Gets Hacked: Inside the Marks & Spencer – TCS Cyber Attack

How a single breach shook a global retailer, raised questions about third-party security, and exposed the hidden risks of digital partnerships.

By Sajida SikandarPublished 3 months ago 3 min read

🏢 A Trusted Brand Under Fire

For over a century, Marks & Spencer (M&S) has been a symbol of British reliability — the kind of brand customers instinctively trust. But in April 2025, that trust was tested in a way few expected.

A major cyberattack disrupted the company’s online systems, exposed sensitive data, and triggered a chain reaction that extended all the way to one of its key technology partners — Tata Consultancy Services (TCS).

What followed was a digital crisis that revealed how even established corporations can fall victim when human error and cybercrime collide.

💻 The Breach: What Really Happened

The incident began over the Easter weekend when a cybercriminal group known as Scattered Spider infiltrated M&S’s network. Instead of exploiting software bugs or breaking encryption, the hackers used social engineering — a tactic that manipulates people, not systems.

By impersonating legitimate IT staff, the attackers reportedly gained access through credentials linked to two TCS employees, who were working as part of M&S’s service desk support.

Once inside, they moved through the network, disrupting M&S’s online services, shutting down Click & Collect orders, and even affecting supply chains.

The company later confirmed that customer names, addresses, and purchase histories were exposed — though no passwords or payment information were stolen.

📉 The Fallout: Millions Lost, Trust Damaged

The immediate consequences were severe:

Online sales were halted for nearly two weeks.

In-store operations experienced delays and disruptions.

The company projected a £300 million loss in operating profit.

Its market value fell by nearly £750 million within days of the breach.

Customers grew frustrated as deliveries stalled and services froze. Behind the scenes, M&S called in cybersecurity experts and worked closely with the UK’s National Cyber Security Centre (NCSC) to contain the attack.

But the big question remained: How did the hackers get in — and who was responsible?

🧩 TCS in the Spotlight

As Marks & Spencer’s long-time IT partner, Tata Consultancy Services (TCS) was quickly drawn into the conversation. The breach appeared to involve login credentials associated with its service desk employees.

In response, TCS launched an internal investigation and issued a public statement:

“Our systems were not compromised. We do not provide cybersecurity services to Marks & Spencer, and no other clients were affected.”

The company emphasized that it continued to work with M&S across several technology areas, including data management and cloud operations, and denied any wrongdoing.

✂️ Contract Fallout: Fact or Coincidence?

A few months later, M&S confirmed that it would not renew its service-desk contract with TCS — ending a partnership that had lasted more than ten years.

The announcement sparked speculation that the termination was fallout from the breach. However, both companies clarified that the decision was part of a routine review process that began before the attack.

TCS stated that the service desk represented a “very small part” of its broader engagement with M&S and reiterated that the separation was unrelated to the cyber incident.

Still, the timing was difficult to ignore — and for many observers, it served as a reminder of how fragile trust becomes after a data breach.

🧠 Lessons From the Cyber Attack

The M&S–TCS incident isn’t just a headline — it’s a cautionary tale for businesses everywhere. Here’s what we can learn:

1. Social Engineering Is the Weakest Link

Hackers no longer need to break code; they just need to trick people. Cybersecurity training is now as vital as firewalls.

2. Vendor Risk Is Real

No matter how secure your own systems are, your third-party vendors could expose you. Continuous vendor audits and multi-factor authentication are essential.

3. Transparency Matters

M&S’s decision to publicly acknowledge the breach and work with authorities helped restore some trust. Quick, honest communication is key in crisis management.

4. Cybersecurity Is Everyone’s Responsibility

Outsourcing IT doesn’t mean outsourcing accountability. Every organization must take joint ownership of its digital safety.

🔄 Moving Forward

Marks & Spencer continues to rebuild its systems and customer confidence, investing heavily in cybersecurity upgrades and employee training. The company has also strengthened its incident response strategy — ensuring that future breaches can be detected and isolated faster.

TCS, on the other hand, has reaffirmed its commitment to transparency and client safety. While it maintains ongoing partnerships with M&S in other areas, it’s also reinforcing its internal monitoring policies to prevent credential misuse.

🌍 A Wake-Up Call for Every Business

The M&S–TCS cyberattack underscores a critical truth: cybersecurity is no longer an IT problem — it’s a business survival issue.

Every connection, every vendor, and every employee account is a potential gateway for attackers. And as this case shows, even trusted giants can fall when vigilance slips for just a moment.

In an age where digital trust is currency, protecting it isn’t optional — it’s everything.

cybersecurity

About the Creator

Sajida Sikandar

Hi, I’m Sajida Sikandar, a passionate blogger with 3 years of experience in crafting engaging and insightful content. Join me as I share my thoughts, stories, and ideas on a variety of topics that matter to you.

Reader insights

Be the first to share your insights about this piece.

How does it work?

Add your insights

Comments

There are no comments for this story

Be the first to respond and start the conversation.

Sign in to comment

    Find us on social media

    Miscellaneous links

    • Explore
    • Contact
    • Privacy Policy
    • Terms of Use
    • Support

    © 2026 Creatd, Inc. All Rights Reserved.