Business rival credits cyberattack on M&S for boosting profits

In a trading statement published Wednesday, British clothing retailer Next reported that it was continuing to see sales overperform in the wake of a cyberattack on its rival Marks & Spencer (M&S).

Next, which increased its profit guidance by £30 million ($39.5 million) credited “favourable weather conditions and competitor disruption” for a 7.6% surge in sales in the first half of this year.

M&S, which first announced it was managing a cyber incident in April that caused disruption into July, said in May that it expected its own annual profits to be hit by around £300 million ($395 million).

M&S’s online store and app were not fully operational again until August. According to analysis by Kantar, rivals with their own online presence — including Zara, H&M and Sainsbury’s — all experienced a sales uplift, while clothing retailers without a significant online presence, such as Primark, did not.

While the competition within the retail space allowed consumers to spend their money elsewhere despite the M&S incident, a cyberattack affecting automotive manufacturer Jaguar Land Rover (JLR) caused much more damage.

According to the nonprofit Cyber Monitoring Group, the disruption to JLR cost the British economy £1.9 billion ($2.5 billion) including the hit to JLR’s own output as well as its multi-tier manufacturing supply chain, and downstream organizations such as dealerships.

It follows opposition lawmakers last week saying it was “deeply concerning” that the British government has still not introduced new cybersecurity laws to Parliament that would improve security standards for critical infrastructure.

At the time, a government spokesperson said: “The Cyber threats we face are sophisticated, relentless and costly. Our Cyber Security and Resilience Bill will be introduced to Parliament this year and is designed to strengthen our cyber defences – protecting the services the public rely on so they can go about their normal lives.”

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Alexander Martin

Alexander Martin

is the UK Editor for Recorded Future News. He was previously a technology reporter for Sky News and is also a fellow at the European Cyber Conflict Research Initiative.

 

Total
0
Shares
Previous Post

The Death of the Security Checkbox: BAS Is the Power Behind Real Defense

Next Post

New “Brash” Exploit Crashes Chromium Browsers Instantly with a Single Malicious URL

Related Posts

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

The North Korean threat actors behind the Contagious Interview campaign have once again tweaked their tactics by using JSON storage services to stage malicious payloads. "The threat actors have recently resorted to utilizing JSON storage services like JSON Keeper, JSONsilo, and npoint.io to host and deliver malware from trojanized code projects, with the lure," NVISO researchers Bart Parys, Stef
Read More

Years of JSONFormatter and CodeBeautify Leaks Expose Thousands of Passwords and API Keys

New research has found that organizations in various sensitive sectors, including governments, telecoms, and critical infrastructure, are pasting passwords and credentials into online tools like JSONformatter and CodeBeautify that are used to format and validate code. Cybersecurity company watchTowr Labs said it captured a dataset of over 80,000 files on these sites, uncovering thousands of
Read More