What SMEs Can Learn from the M&S and Co-Op Phishing Attacks?

 

The Headlines That Should Make You Pause

In April and May 2025, two of the UK’s most recognisable retailers — Marks & Spencer and Co-op — were hit by serious cyberattacks, both involving phishing and social engineering tactics.

1.       M&S: SIM Swap, Help Desk Failure, and £300M Fallout

M&S confirmed that hackers tricked IT help desk staff into resetting credentials by posing as employees, then escalated the breach by performing a SIM swap to intercept two-factor authentication codes. This allowed attackers to access sensitive customer data, including contact details and order history.

📉 According to reports, the fallout will cost M&S up to £300 million in lost profits, reputational damage, and security overhauls.


2.       Co-op: Credential Phishing and Member Data Exposure

Co-op’s breach followed a similar pattern: attackers exploited human error and weak access controls to break into internal systems. They extracted a significant volume of member data — including names, emails, and contact details — though financial info was reportedly not accessed.

Co-op later admitted the breach occurred over several days and involved manipulating multiple staff interactions.


⚠️ Takeaway: If They Can Get in There, They Can Get in Anywhere

Phishing isn’t just about dodgy emails anymore. These attacks worked because:

 

  • Help desk protocols were manipulated with confidence tricks
  • Multi-factor security was circumvented via SIM swapping
  • Internal trust was exploited — attackers sounded convincing

 

These are big-name brands with big cybersecurity budgets. But they fell victim to mistakes SMEs are even more vulnerable to — limited training, under-tested processes, and overworked support staff.


🔒 What Can SMEs Do Today?

Here are 5 real-world, low-cost actions any SME can take — starting now.

1. Run a Fake Phishing Test

Simulate a phishing email campaign using tools like KnowBe4, Gophish, or Microsoft Attack Simulator. 👉 Find out who clicks. Learn. Improve.

2. Train Like You Mean It

Not a one-off workshop — make cyber hygiene part of the culture: • Teach people how phishing really looks • Run spot quizzes • Reinforce what “never share” actually means

In the Co-op attack, it’s likely that the staff gave away too much info, believing they were helping.

3. Secure the Front Door

Use multi-factor authentication (MFA) on everything. Then go further: • Restrict MFA resets to named admins • Block new devices from logging in without manual approval

M&S’s attackers bypassed MFA using SIM swap fraud. Your mobile provider can help lock this down.

4. Lock Down IT Support

Whether in-house or outsourced, your support process must: • Use callback verification • Ask multi-layer ID questions • Record all reset activity

M&S’s breach started with an innocent-sounding request to reset a password.

5. Limit Access by Role

Segment your systems. No one should have “just in case” access. The fewer doors an attacker can open, the less damage they can do.

SME Risk Reduction Cheat Sheet

Article content

💬 Final Word

If your team isn’t trained — or if your IT support can be tricked — then you’ve got a gap. Not because you’re careless. But because attackers are smart and relentless.

🔐 At PiBlu, we help SMEs put the basics in place. Not enterprise-level complexity — just practical, everyday defences that actually work.

Want a quick, jargon-free chat about your setup?

📞 Call 0161 388 8188or message me here on LinkedIn.

Let’s get your business phishing-ready — before someone tests it for you.

LATEST NEWS

“From Sticky Notes to Netflix Logins: Why SME Password Security Needs an Upgrade”

We all know passwords matter. But here’s the thing — in 2025, they matter more than ever. Just this summer, researchers found 16 billion stolen login details for sale online. That’s billions of usernames and passwords sitting there for cybercriminals to exploit. If even one of those belongs to your business, the fallout could be…

READ MORE from “From Sticky Notes to Netflix Logins: Why SME Password Security Needs an Upgrade”