{"id":68014,"date":"2025-07-09T14:14:24","date_gmt":"2025-07-09T19:14:24","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=68014"},"modified":"2025-07-09T14:14:25","modified_gmt":"2025-07-09T19:14:25","slug":"social-engineering-101-what-the-ms-attack-can-teach-us","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/social-engineering-101-what-the-ms-attack-can-teach-us\/","title":{"rendered":"Social Engineering 101: What the M&amp;S Attack Can Teach Us"},"content":{"rendered":"\n<p>Marks &amp; Spencer (M&amp;S), one of the UK\u2019s best-known retail stores, recently confirmed that it suffered a major cyberattack. The breach happened after hackers pulled off a sneaky trick to get into the company\u2019s computer system. Here&#8217;s a breakdown of what happened. <\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">The Hack: A Clever Trick<\/h2>\n\n\n\n<p>On April 17, M&amp;S fell victim to what experts call a social engineering attack. But what does that mean?<\/p>\n\n\n\n<p>In this case, a hacker pretended to be someone who works with M&amp;S\u2014out of the 50,000 people connected to the company. This fake identity was so convincing that it tricked an outside company into resetting a real employee\u2019s password.<\/p>\n\n\n\n<p>Once the hackers had that password, they used it to break into M&amp;S\u2019s network.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Who Got Tricked?<\/h2>\n\n\n\n<p>The password reset was <a href=\"https:\/\/archive.ph\/ifCnk#selection-1587.0-1587.25\">reportedly<\/a> done by <strong>Tata Consultancy Services<\/strong>, an outside company that helps M&amp;S with IT support. Tata may have been tricked by the hackers into thinking they were helping a real employee.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Who&#8217;s Behind the Attack?<\/h2>\n\n\n\n<p>The ransomware group <strong>DragonForce<\/strong> is believed to be behind the attack. There\u2019s been some confusion around this name:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Some media outlets mixed up DragonForce ransomware with DragonForce Malaysia, a political hacktivist group.<\/li>\n\n\n\n<li>The DragonForce involved in this attack is linked to a ransomware gang that is possibly based in Russia, not Malaysia.<\/li>\n<\/ul>\n\n\n\n<p>The attack is also connected to another group known as Scattered Spider, which is known for using ransomware to attack big companies.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">What Did the Hackers Do?<\/h2>\n\n\n\n<p>Once inside the system, the hackers:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Encrypted important servers so M&amp;S couldn\u2019t access them.<\/li>\n\n\n\n<li>Stole about 150GB of data (that\u2019s a huge amount).<\/li>\n\n\n\n<li>Used a tactic called double extortion, which means:\n<ol class=\"wp-block-list\">\n<li>They lock up your files.<\/li>\n\n\n\n<li>They also steal your data and threaten to leak it unless you pay.<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Did M&amp;S Pay the Ransom?<\/h2>\n\n\n\n<p>We don\u2019t know for sure.<\/p>\n\n\n\n<p>M&amp;S said they didn\u2019t talk directly with the hackers. Instead, they left that part to cybersecurity experts who know how to deal with ransomware gangs.<\/p>\n\n\n\n<p>When asked if they paid the ransom, M&amp;S\u2019s chairman, Archie Norman, didn\u2019t give a clear answer. He said it wasn\u2019t something they wanted to share with the public, but they did tell the authorities.<\/p>\n\n\n\n<p>It\u2019s worth noting that the hackers haven\u2019t posted M&amp;S\u2019s data online, which might mean the ransom was paid\u2014or negotiations are still ongoing.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">What Happens Next?<\/h2>\n\n\n\n<p>The company acted quickly once they knew about the hack. They shut down their systems to stop the attack from spreading. Still, the damage had already been done.<\/p>\n\n\n\n<p>The investigation continues, and M&amp;S is working with cybersecurity professionals and law enforcement to prevent future attacks.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Why This Matters<\/h2>\n\n\n\n<p>This isn\u2019t just a story about one company. It\u2019s a warning to all businesses and individuals:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Cybercriminals are getting more clever.<\/li>\n\n\n\n<li>Even big companies can fall victim to fake identities and password tricks.<\/li>\n\n\n\n<li>Always be careful with who you trust online.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">How PC Matic Can Help Prevent Attacks Like This<\/h2>\n\n\n\n<p>Attacks like the one on M&amp;S show just how sneaky and advanced today\u2019s hackers can be. But there are smart ways to fight back\u2014and that\u2019s where <strong><a href=\"http:\/\/pcmatic.com\">PC Matic<\/a><\/strong> comes in.<\/p>\n\n\n\n<p>Here\u2019s how PC Matic helps stop threats <strong>before they cause damage<\/strong>:<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h5 class=\"wp-block-heading\">Application Allowlisting<\/h5>\n\n\n\n<p>Most antivirus programs try to block the <em>bad stuff<\/em>. PC Matic does something smarter\u2014it only allows <strong>approved, trusted programs<\/strong> to run. That means even if a hacker sneaks ransomware into your system, it won\u2019t be able to launch.<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h5 class=\"wp-block-heading\">Real-Time Protection<\/h5>\n\n\n\n<p>PC Matic scans your system in real time, catching suspicious behavior like strange login attempts or unknown software trying to run. This can stop an attack before it spreads, like what happened to M&amp;S when their servers were encrypted.<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h5 class=\"wp-block-heading\">Automated Patching<\/h5>\n\n\n\n<p>Cybercriminals often get in through outdated software. PC Matic keeps your programs up to date with <strong>automated patch management<\/strong>, closing the gaps hackers use to sneak in.<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h5 class=\"wp-block-heading\">Made in America \u2013 With No Outsourcing<\/h5>\n\n\n\n<p>PC Matic is proudly built and supported in the U.S., which helps avoid the kind of third-party missteps (like the password reset in this case) that led to M&amp;S\u2019s breach.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Final Thoughts<\/h2>\n\n\n\n<p>The M&amp;S hack shows how human error and outside vendors can create security holes. It also highlights how serious ransomware attacks have become. While M&amp;S is staying quiet on the ransom, their quick response and reliance on experts was a smart move.<\/p>\n\n\n\n<p>Cybersecurity isn\u2019t just about strong passwords anymore\u2014it\u2019s about protecting people and processes too.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Marks &amp; Spencer (M&amp;S), one of the UK\u2019s best-known retail stores, recently confirmed that it suffered a major cyberattack. The breach happened after hackers pulled off a sneaky trick to get into the company\u2019s computer system. Here&#8217;s a breakdown of what happened. The Hack: A Clever Trick On April 17, M&amp;S fell victim to what [&hellip;]<\/p>\n","protected":false},"author":83,"featured_media":68015,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[6219],"tags":[],"class_list":["post-68014","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybernews"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Social Engineering 101: What the M&amp;S Attack Can Teach Us<\/title>\n<meta name=\"description\" content=\"Marks &amp; Spencer (M&amp;S), one of the UK\u2019s best-known retail stores, recently confirmed that it suffered a major cyberattack. The breach happened\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/social-engineering-101-what-the-ms-attack-can-teach-us\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Social Engineering 101: What the M&amp;S Attack Can Teach Us\" \/>\n<meta property=\"og:description\" content=\"Marks &amp; Spencer (M&amp;S), one of the UK\u2019s best-known retail stores, recently confirmed that it suffered a major cyberattack. The breach happened\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/social-engineering-101-what-the-ms-attack-can-teach-us\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-09T19:14:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-09T19:14:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/marks-and-spencer-header.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jessica Molden\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jessica Molden\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/social-engineering-101-what-the-ms-attack-can-teach-us\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/social-engineering-101-what-the-ms-attack-can-teach-us\\\/\"},\"author\":{\"name\":\"Jessica Molden\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/66010e2a7c093df51d1ce9344e904700\"},\"headline\":\"Social Engineering 101: What the M&amp;S Attack Can Teach Us\",\"datePublished\":\"2025-07-09T19:14:24+00:00\",\"dateModified\":\"2025-07-09T19:14:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/social-engineering-101-what-the-ms-attack-can-teach-us\\\/\"},\"wordCount\":798,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/social-engineering-101-what-the-ms-attack-can-teach-us\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/marks-and-spencer-header.jpg\",\"articleSection\":[\"CyberNews\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/social-engineering-101-what-the-ms-attack-can-teach-us\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/social-engineering-101-what-the-ms-attack-can-teach-us\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/social-engineering-101-what-the-ms-attack-can-teach-us\\\/\",\"name\":\"Social Engineering 101: What the M&amp;S Attack Can Teach Us\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/social-engineering-101-what-the-ms-attack-can-teach-us\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/social-engineering-101-what-the-ms-attack-can-teach-us\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/marks-and-spencer-header.jpg\",\"datePublished\":\"2025-07-09T19:14:24+00:00\",\"dateModified\":\"2025-07-09T19:14:25+00:00\",\"description\":\"Marks &amp; Spencer (M&amp;S), one of the UK\u2019s best-known retail stores, recently confirmed that it suffered a major cyberattack. The breach happened\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/social-engineering-101-what-the-ms-attack-can-teach-us\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/social-engineering-101-what-the-ms-attack-can-teach-us\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/social-engineering-101-what-the-ms-attack-can-teach-us\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/marks-and-spencer-header.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/marks-and-spencer-header.jpg\",\"width\":1600,\"height\":900},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/social-engineering-101-what-the-ms-attack-can-teach-us\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Social Engineering 101: What the M&amp;S Attack Can Teach Us\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/66010e2a7c093df51d1ce9344e904700\",\"name\":\"Jessica Molden\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/jmolden\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Social Engineering 101: What the M&amp;S Attack Can Teach Us","description":"Marks &amp; Spencer (M&amp;S), one of the UK\u2019s best-known retail stores, recently confirmed that it suffered a major cyberattack. The breach happened","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/social-engineering-101-what-the-ms-attack-can-teach-us\/","og_locale":"en_US","og_type":"article","og_title":"Social Engineering 101: What the M&amp;S Attack Can Teach Us","og_description":"Marks &amp; Spencer (M&amp;S), one of the UK\u2019s best-known retail stores, recently confirmed that it suffered a major cyberattack. The breach happened","og_url":"https:\/\/www.pcmatic.com\/blog\/social-engineering-101-what-the-ms-attack-can-teach-us\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2025-07-09T19:14:24+00:00","article_modified_time":"2025-07-09T19:14:25+00:00","og_image":[{"width":1600,"height":900,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/marks-and-spencer-header.jpg","type":"image\/jpeg"}],"author":"Jessica Molden","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Jessica Molden","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/social-engineering-101-what-the-ms-attack-can-teach-us\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/social-engineering-101-what-the-ms-attack-can-teach-us\/"},"author":{"name":"Jessica Molden","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/66010e2a7c093df51d1ce9344e904700"},"headline":"Social Engineering 101: What the M&amp;S Attack Can Teach Us","datePublished":"2025-07-09T19:14:24+00:00","dateModified":"2025-07-09T19:14:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/social-engineering-101-what-the-ms-attack-can-teach-us\/"},"wordCount":798,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/social-engineering-101-what-the-ms-attack-can-teach-us\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/marks-and-spencer-header.jpg","articleSection":["CyberNews"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/social-engineering-101-what-the-ms-attack-can-teach-us\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/social-engineering-101-what-the-ms-attack-can-teach-us\/","url":"https:\/\/www.pcmatic.com\/blog\/social-engineering-101-what-the-ms-attack-can-teach-us\/","name":"Social Engineering 101: What the M&amp;S Attack Can Teach Us","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/social-engineering-101-what-the-ms-attack-can-teach-us\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/social-engineering-101-what-the-ms-attack-can-teach-us\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/marks-and-spencer-header.jpg","datePublished":"2025-07-09T19:14:24+00:00","dateModified":"2025-07-09T19:14:25+00:00","description":"Marks &amp; Spencer (M&amp;S), one of the UK\u2019s best-known retail stores, recently confirmed that it suffered a major cyberattack. The breach happened","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/social-engineering-101-what-the-ms-attack-can-teach-us\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/social-engineering-101-what-the-ms-attack-can-teach-us\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/social-engineering-101-what-the-ms-attack-can-teach-us\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/marks-and-spencer-header.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/marks-and-spencer-header.jpg","width":1600,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/social-engineering-101-what-the-ms-attack-can-teach-us\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Social Engineering 101: What the M&amp;S Attack Can Teach Us"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/66010e2a7c093df51d1ce9344e904700","name":"Jessica Molden","url":"https:\/\/www.pcmatic.com\/blog\/author\/jmolden\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/68014","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=68014"}],"version-history":[{"count":1,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/68014\/revisions"}],"predecessor-version":[{"id":68016,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/68014\/revisions\/68016"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/68015"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=68014"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=68014"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=68014"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}