British retailer M&S confirms being hit by ‘cyber incident’ amid store delays

Avatar

British retailer Marks and Spencer (M&S) announced on Tuesday it “has been managing a cyber incident over the past few days” following a slew of customer complaints on social media.

The nature of the incident hasn’t been disclosed. The company, which is a constituent of the FTSE 100 Index, employs more than 70,000 people worldwide and has more than 1,000 stores in the United Kingdom.

In a statement filed to London’s stock exchange on Tuesday afternoon, the company said it made “some minor, temporary changes to our store operations” as soon as it became aware of the incident.

Customers have complained on social media that various electronic payments systems are not working, including card payments, gift cards and the retailer’s Click and Collect service.

In a statement sent to customers, the company confirmed there “may be some limited delays to your Click and Collect order, which we are working hard to resolve.”

The company told the London stock exchange that it has brought in external cyber security experts to investigate and manage the incident, as well as reported it to the relevant regulators and the National Cyber Security Centre.

“We are taking actions to further protect our network and ensure we can continue to maintain customer service,” the company’s statement continued.

“We are sorry for any inconvenience experienced. Importantly, our stores remain open and our website and app are operating as normal.”

CybercrimeNewsNews Briefs
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Alexander Martin

is the UK Editor for Recorded Future News. He was previously a technology reporter for Sky News and is also a fellow at the European Cyber Conflict Research Initiative.

 

Total
0
Shares
Previous Post

GCP Cloud Composer Bug Let Attackers Elevate Access via Malicious PyPI Packages

Next Post

Docker Malware Exploits Teneo Web3 Node to Earn Crypto via Fake Heartbeat Signals

Related Posts

Outlaw Group Uses SSH Brute-Force to Deploy Cryptojacking Malware on Linux Servers

Cybersecurity researchers have shed light on an "auto-propagating" cryptocurrency mining botnet called Outlaw (aka Dota) that's known for targeting SSH servers with weak credentials. "Outlaw is a Linux malware that relies on SSH brute-force attacks, cryptocurrency mining, and worm-like propagation to infect and maintain control over systems," Elastic Security Labs said in a new analysis
Avatar
Read More