But how did these retail breaches really happen?
As Ewan’s identified, one likely answer lies in the limitations of static defence. These are systems that are configured once and rarely revisited. They may include traditional firewalls, perimeter protections, and access policies that assume the network is a known, controlled space.
But attackers today don’t play by those rules.
“Security isn’t something you do once and walk away from,” says Ewan. “Even if updates are applied regularly, there’s a delay between patch release and patch application. For retailers like M&S, that delay creates a window of vulnerability, and attackers know how to exploit it.”
Legacy Systems, Update Delays, and Lateral Movement
Retailers often operate on complex, ageing infrastructures. Legacy systems that can’t be updated quickly – or even at all – are still common. And while IT teams know the importance of patching, applying updates during business hours can be too disruptive, especially during trading peaks.
“Understandably, retailers try to minimise downtime,” Ewan explains. “But the very act of delaying updates, even by a few days, increases risk.”
Even worse, once attackers gain a foothold – whether through a phishing email, stolen credentials, or a zero-day exploit – they can move laterally within a network. That’s where lack of network segmentation and poor identity and access management become critical liabilities.
“Ransomware isn’t only about encryption, it’s about escalation,” says CTO Chris Templeton. “The speed and spread of the M&S cyber attack suggest the possibility of a zero-day exploit or an overlooked privilege path. It’s a sign that reactive security is no longer enough.”