What SMEs Can Learn from the M&S and Co-Op Phishing Attacks?

 

The Headlines That Should Make You Pause

In April and May 2025, two of the UK’s most recognisable retailers — Marks & Spencer and Co-op — were hit by serious cyberattacks, both involving phishing and social engineering tactics.

1.       M&S: SIM Swap, Help Desk Failure, and £300M Fallout

M&S confirmed that hackers tricked IT help desk staff into resetting credentials by posing as employees, then escalated the breach by performing a SIM swap to intercept two-factor authentication codes. This allowed attackers to access sensitive customer data, including contact details and order history.

📉 According to reports, the fallout will cost M&S up to £300 million in lost profits, reputational damage, and security overhauls.


2.       Co-op: Credential Phishing and Member Data Exposure

Co-op’s breach followed a similar pattern: attackers exploited human error and weak access controls to break into internal systems. They extracted a significant volume of member data — including names, emails, and contact details — though financial info was reportedly not accessed.

Co-op later admitted the breach occurred over several days and involved manipulating multiple staff interactions.


⚠️ Takeaway: If They Can Get in There, They Can Get in Anywhere

Phishing isn’t just about dodgy emails anymore. These attacks worked because:

 

  • Help desk protocols were manipulated with confidence tricks
  • Multi-factor security was circumvented via SIM swapping
  • Internal trust was exploited — attackers sounded convincing

 

These are big-name brands with big cybersecurity budgets. But they fell victim to mistakes SMEs are even more vulnerable to — limited training, under-tested processes, and overworked support staff.


🔒 What Can SMEs Do Today?

Here are 5 real-world, low-cost actions any SME can take — starting now.

1. Run a Fake Phishing Test

Simulate a phishing email campaign using tools like KnowBe4, Gophish, or Microsoft Attack Simulator. 👉 Find out who clicks. Learn. Improve.

2. Train Like You Mean It

Not a one-off workshop — make cyber hygiene part of the culture: • Teach people how phishing really looks • Run spot quizzes • Reinforce what “never share” actually means

In the Co-op attack, it’s likely that the staff gave away too much info, believing they were helping.

3. Secure the Front Door

Use multi-factor authentication (MFA) on everything. Then go further: • Restrict MFA resets to named admins • Block new devices from logging in without manual approval

M&S’s attackers bypassed MFA using SIM swap fraud. Your mobile provider can help lock this down.

4. Lock Down IT Support

Whether in-house or outsourced, your support process must: • Use callback verification • Ask multi-layer ID questions • Record all reset activity

M&S’s breach started with an innocent-sounding request to reset a password.

5. Limit Access by Role

Segment your systems. No one should have “just in case” access. The fewer doors an attacker can open, the less damage they can do.

SME Risk Reduction Cheat Sheet

Article content

💬 Final Word

If your team isn’t trained — or if your IT support can be tricked — then you’ve got a gap. Not because you’re careless. But because attackers are smart and relentless.

🔐 At PiBlu, we help SMEs put the basics in place. Not enterprise-level complexity — just practical, everyday defences that actually work.

Want a quick, jargon-free chat about your setup?

📞 Call 0161 388 8188or message me here on LinkedIn.

Let’s get your business phishing-ready — before someone tests it for you.

LATEST NEWS

“What I Keep Hearing From Local Businesses — and the Simple Fixes That Actually Work”

I’ve been out and about across the North West these past few weeks chatting with business owners about what’s working and what’s…. It’s the same story in almost every office, warehouse, and café — the IT drags, the phones drop, tech is holding people back, and everyone’s quietly fed up with it. Different businesses, same…

READ MORE from “What I Keep Hearing From Local Businesses — and the Simple Fixes That Actually Work”

Telecoms Made Simple: The Hidden Cost of “Good Enough” Business Broadband

Running a business in 2025 means everything runs on your connection — calls, payments, files, even the morning brew chat over Teams. But here’s what I see every single week: SMEs putting up with “good enough” internet. The type that usually works, until the moment it really matters. If your Wi-Fi drops the second someone…

READ MORE from Telecoms Made Simple: The Hidden Cost of “Good Enough” Business Broadband

The Hidden Cost of IT Downtime (and How to Stop It)

Imagine this. It’s a normal Tuesday morning. Orders are waiting. Staff are logging in. Phones are ringing. Then suddenly — everything freezes. Emails stop. Calls drop. The system won’t load. Within minutes, productivity falls to zero. By lunchtime, customers are frustrated. By the end of the day, you’ve lost revenue, reputation, and momentum. And here’s…

READ MORE from The Hidden Cost of IT Downtime (and How to Stop It)