BREAKING: Arrests Made in M&S, Co-op, and Harrods Cyber-Attack Investigation

July 15, 2025

Published: July 15, 2025
Author: Cybergen Team


The UK’s National Crime Agency (NCA) has made a major breakthrough in one of the most high-profile cyber investigations of the year. Four individuals aged between 17 and 20 have been arrested in connection with the devastating April 2025 cyber-attacks on Marks & Spencer (M&S), Co-op, and Harrods.


The suspects—two 19-year-olds, a 17-year-old, and a 20-year-old woman—were detained across the West Midlands, Staffordshire, and London. They are being held on suspicion of several serious offences under the Computer Misuse Act, including blackmail, money laundering, and involvement in organised crime.

The Investigation

The Cyber Attack: What Happened?

The attack was attributed to Scattered Spider, a notorious cybercrime group linked to multiple high-profile intrusions. The group is believed to have used advanced social engineering tactics, including SIM-swapping and phishing, to gain access to internal systems. Once inside, they deployed ransomware using the DragonForce platform to encrypt key systems and extort payment.


Marks & Spencer alone is reported to have suffered financial losses of up to £300 million, making this one of the most damaging cyber-attacks on a UK business in recent memory.


Click here to read more into it.

Why This Matters

This case underscores the growing threat of organised cybercrime, especially from younger, tech-savvy individuals capable of using sophisticated tools and techniques. It also highlights the importance of cyber resilience, employee training, and multi-layered security in protecting businesses from social engineering attacks.


The arrests will no doubt be welcome news to impacted businesses and consumers, but they also serve as a reminder: cybersecurity is no longer just an IT issue, it's a business-critical priority.

Summary

Who was arrested?

Four suspects (ages 17–20) arrested in the West Midlands, Staffordshire, and London on July 10, 2025.


What are the charges?

Suspected violations include the Computer Misuse Act, blackmail, money laundering, and participating in organised crime.


Which hack was this?

The April 2025 cyber‑attacks that severely disrupted online orders at M&S (nearly seven-week pause), Co‑op, and Harrods.


Who’s behind it?

The perpetrators are linked to the Scattered Spider hacking group and the DragonForce ransomware‑as‑a‑service operation.


Next steps?

The arrested suspects remain in custody and are being questioned as digital forensic investigations proceed. The NCA continues international cooperation to identify all involved parties.

Blue shield with a padlock icon in a digital background with binary code, representing cybersecurity.
February 23, 2026
Why compliance-driven security fails in 2026. Learn how attackers exploit identity and attack paths, and how intelligence-led penetration testing reduces real cyber risk
Woman presenting AI concept on screen, pointing with a laptop. Blue tones, glowing
February 21, 2026
How AI is transforming cyber attacks in 2026, from deepfake phishing to adaptive malware — and what CISOs must do now to reduce risk and strengthen resilience.
Laptop with a fingerprint scan graphic overlaid, symbolizing secure access.
February 17, 2026
Why traditional penetration testing fails in 2026, and what effective, risk-driven testing really looks like. Discover how to move beyond CVSS scores and vulnerability lists to attacker-focused attack paths, identity compromise, lateral movement, and measurable risk reduction that actually improves security outcomes.
Person wearing VR headset, text
February 11, 2026
Explore the future of cybersecurity in 2026. Discover emerging threats, evolving attack methods, and how organisations can stay resilient in a changing threat landscape.
Man looking at a digital interface with holographic building model, graphs, and code overlays, indoors.
February 11, 2026
Cyber threat intelligence reveals how modern ransomware attacks really start: credential abuse, trusted access, and quiet pre-positioning long before impact.
Red and blue digital graphic with the word
February 5, 2026
CREST pen testing reveals what really happens after initial compromise. Learn how attackers escalate privileges, move laterally, and how testing exposes real risk.
Notepad++ code editor window with C++ code and Notepad++ logo with a gecko.
February 3, 2026
Notepad++ update infrastructure was hijacked in a targeted supply-chain attack. Learn what happened, who was behind it, and why it matters.
Hand holding magnifying glass over digital warning sign on screen.
February 1, 2026
High-severity vulnerabilities don’t equal real cyber risk. Learn why CVSS-driven risk registers fail, how attackers exploit exposure, and how CTEM reduces real-world risk.
Hand touching a glowing security shield interface with a binary code background.
February 1, 2026
Breaches persist despite audits and investment. Learn how threat-led security turns cyber activity into prioritised risk reduction with threat intelligence, MDR and CTEM.