Control Validation

Common MITRE ATT&CK Techniques in 2025 UK Retailer Cyberattacks

May 6, 2025
Explore MITRE ATT&CK techniques used by Scattered Spider in major recent UK retailer cyberattacks and how to evaluate your own organization's defenses.
Garreth Jeremiah

The UK retail sector has faced a significant cybersecurity challenge in 2025, as a series of attacks disrupted major players including Marks & Spencer (M&S), Co-Op, and Harrods. Online reports attribute these attacks to, among others, Scattered Spider, a well-resourced intrusion group that leveraged a mix of social engineering and technical skill to gain access. Rather than exploiting new or unknown vulnerabilities, the attackers relied heavily on existing human and identity weaknesses to compromise their targets.

The team at Prelude Security took a deep dive into common methodologies deployed, providing a detailed account of the techniques typically attributed to Scattered Spider and the latest retailer attacks, categorized by the MITRE ATT&CK framework.

Relevant techniques identified in recent attacks

Initial access and social Engineering 

Scattered Spider’s entry tactics emphasize exploiting human error through carefully crafted social engineering. Given the reliance on sophisticated social engineering plays, many organizations may struggle with their attempts to gain a foothold. Prioritizing security awareness training and reviewing anti-phishing settings in your existing tools is recommended.

Spearphishing via Voice or Vishing (T1566.004): Disguising themselves as IT personnel, the attackers manipulated internal help desks into granting access. By leveraging phishing and speaking in the target’s native language with a convincing local accent, the attackers tricked employees into resetting passwords or installing remote tools, giving them direct access to corporate networks. Beyond voice-based social engineering, Phishing and Smishing (Phishing over Email and SMS - T1566.002 ) has historically been employed, though reports for the current campaigns on this are few.

Multi-Factor Authentication (MFA) Fatigue (T1621): Perhaps the most insidious method, MFA fatigue, involved bombarding employees with repeated MFA push notifications. Overwhelmed or confused, some employees unknowingly approved fraudulent login attempts, bypassing two-factor protections.

Credential abuse and persistence

This phase entailed the reuse of stolen credentials to gain unauthorized access to critical systems and data. Attackers focused on leveraging these credentials to move laterally within the network, identifying high-value assets, and escalating privileges to strengthen their control. They often deployed tools to maintain persistence, such as creating new user accounts or modifying existing authentication mechanisms, ensuring long-term access. These actions allowed attackers to evade immediate detection and enact further malicious activities, such as exfiltrating sensitive data or implanting additional malware, all while blending with legitimate network traffic.

Valid Accounts - Cloud Accounts (T1078.004): Scattered Spider leveraged initial credentials (obtained via phishing or help-desk deception) to access corporate cloud services and VPNs as authenticated users. The use of legitimate accounts helped the attackers blend in with normal activity and maintain persistence.

External Remote Services (T133): Using the compromised credentials, the attackers accessed enterprise networks through legitimate remote access channels such as VPN gateways and remote desktop services. Specific cases identify that Scattered Spider used the reset credentials to log in via the companies’ VPN or Citrix remote access portals. Persistent access to the network without needing malware was obtained by exploiting these “legitimate” external access mechanisms, essentially living off the land through the victims’ own remote access infrastructure.

Remote Access Tools (T1219): Scattered Spider also made use of remote monitoring and management (RMM) tools to persist in the environment. Employees were tricked into installing legitimate remote control software (e.g., AnyDesk, Splashtop, or ConnectWise) under the guise of IT support. Misuse of these off-the-shelf remote access tools allowed the adversaries to maintain stealthy backdoor access (often as scheduled services or startup programs) while appearing to be normal IT activity.

Create Account (T1136): Post initial access, Scattered Spider created new accounts and authentication mechanisms to establish persistence. For instance, they would register new user accounts or cloud roles with high privileges, or enroll their own devices for MFA on victim accounts. By creating backdoor accounts and adding themselves to privileged groups, the attackers ensured they could regain access even if the initially compromised credentials were reset once the breach was discovered.

Privilege escalation and evasion 

Their next phase focused on increasing their privileges and circumventing detection from the targeted organizations’ defenses. They used advanced techniques such as credential dumping, token manipulation, and pass-the-hash attacks to move laterally within the network and elevate their privileges. These methods allowed them to access sensitive resources, exfiltrate data, and deploy additional malicious tools without raising immediate alarms.

Impair Defenses: Disable or Modify Security Tools (T1562.001): The attackers took active measures to evade detection by disabling security software and logging. Scattered Spider has been observed using a “Bring Your Own Vulnerable Driver (BYOVD)” technique–loading a legitimate but vulnerable kernel driver on victim machines and exploiting it to kill antivirus/EDR processes.

They also tampered with monitoring tools, turning off endpoint agents and altering logging settings to blind the security team. This allowed the attackers to operate freely (e.g. deploying ransomware) without interference from defensive controls.

The Prelude team has built tests for a number of these techniques, such as T1562.001. These tests are available within the Prelude Detect console and are listed below, but an example has been provided here.

OS Credential Dumping: NTDS (Active Directory Database) (T1003.003): Reports In the M&S breach, Scattered Spider obtained Active Directory password hashes by stealing the NTDS.dit file from a domain controller. This file contains hashed credentials for all domain users; by extracting and cracking these hashes offline, the attackers gained a trove of valid passwords for lateral movement.

Using the cracked credentials, they could impersonate many accounts (including admins) and freely spread through the Windows domain to further compromise servers and data.

Network and Cloud Discovery (T1046 / T1580): Once inside, the attackers performed extensive discovery of the environment, scanning networks and systems for targets – for example, running port scans (like RustScan) to identify VMware ESXi servers and other critical infrastructure. In parallel, they enumerated cloud resources and identity directories (Azure AD, AWS) to find sensitive data stores or misconfigured services.

This internal reconnaissance helped Scattered Spider map out the environment (databases, file shares, backups, etc.) and plan their next steps for data theft and sabotage.

Data exfiltration and impact 

The final steps of Scattered Spider’s attacks revealed their dual intentions of financial extortion and operational sabotage. 

Exfiltration to Cloud Storage (T1567.002): Before launching ransomware, Scattered Spider engaged in data theft for double extortion. They collected large volumes of sensitive data (customer records, business documents) and exported it to attacker-controlled cloud storage – in some cases uploading files to a leak site or file-sharing service like MEGA. This was confirmed in Co-op’s case, where the company acknowledged that adversaries “were able to access and extract data,” including members’ personal information. By staging data in cloud buckets and exfiltrating it, the attackers gained leverage to threaten public release if the ransom was not paid.

Data Encrypted for Impact (T1486): Finally, the attackers deployed ransomware (in this campaign, the “DragonForce” ransomware) to encrypt critical systems and disrupt operations. At M&S, the attackers simultaneously detonated the encryptor on servers and even VMware ESXi hosts, rendering virtual machines and services inaccessible. This caused widespread outages – M&S had to suspend online orders, and stores experienced payment system failures and stock shortages. The use of ransomware encryption amplified the impact of the breach, pressuring the victims to negotiate while crippling their business until systems could be restored.

Evaluate your defenses against Scattered Spider

The Prelude team provides an existing suite of tests to evaluate how your EDR observes, detects, or prevents certain behaviors mentioned in this post.

Table 1
T-Code Technique Prelude VST ID
T1219
Remote Access Tools
53fdd681-bd47-44dc-81bb-3736cb78b1bc
T1136
Create Account
d77be60b-a229-4e89-bfbf-04c5123eb4e2
T1562.001
Impair Defenses: Disable or Modify Security Tools
24fba28b-c632-4c82-b0fd-872e7eaf2ebc
T1003.003
OS Credential Dumping: NTDS (Active Directory Database)
f339ae3e-95f5-48ff-a706-179cbc92674a
T1046
Network Discovery
d7aba28b-b4c9-47e6-8163-9408e7e443af


8f05212a-ce9d-41b4-8990-129d214dc781
T1580
Cloud DIscovery
N/A
T1567.002
Exfiltration to Cloud Storage
2bd2fdf2-07e7-4759-8f0d-ca35e64689c0


8b009cdc-548f-4d5a-8bdd-fbe7b4849694
T1486 Data Encrypted for Impact

881f9052-fb52-4daf-9ad2-0a7ad9615baf


db201110-d875-4133-9709-2732a47f252f

What organizations can learn from this threat

Scattered Spider’s targeted campaigns showcase how even the most robust organizations remain vulnerable to sophisticated, multi-faceted attack strategies. The group’s reliance on stealing and abusing legitimate credentials highlights the critical need for organizations to prioritize human defenses in addition to tuning their defensive technology. 

Consider these high-level efforts to hone existing policies and practices against Scattered Spider and similar threat groups.

  • Enhance employee awareness: Conduct regular training to recognize and prevent spearphishing, smashing, and vishing attempts
  • Implement robust MFA policies: Use hardened MFA systems that include biometrics or number matching to mitigate MFA fatigue attacks
  • Monitor for anomalies: Employ advanced detection tools to identify unusual activity, such as repeated login attempts or the use of new accounts
  • Limit privileged access: Enforce least-privilege access policies to reduce the damage potential of credential misuse
  • Endpoint security: Ensure EDR tools are capable of and configured to detect BYOVD techniques and tampering attempts in real time

Sources

The above techniques and descriptions are drawn from credible 2024–2025 threat intelligence analyses, incident reports, and news coverage of the retail attacks. Key references include the Protos Networks security bulletin on the UK retail hacks, detailed reporting by BleepingComputer and Reuters on the M&S and Co-op breaches, as well as MITRE ATT&CK’s profile of the Scattered Spider group, which aligns with the tactics observed in these incidents. Each ATT&CK ID listed corresponds to a technique that was explicitly noted in these sources as being used during the attacks.

UK National Cyber Security Centre (NCSC)

Bleeping Computer: 

Protos Networks:

Picus Security: 

Trustwave:

TheWeek:

Reuters: 

MITRE: 

CrowdStrike:

Mandiant:

Make the most of the tools you already have

Validate your security controls are working as expected so you can ensure you're protected against the latest threats.