COMMENTARY: In recent weeks, three major UK retailers have fallen victim to ransomware attacks, with the DragonForce group claiming responsibility.And just yesterday, one of the three, Marks & Spencer, disclosed that its customer data was stolen in a cyberattack three weeks ago.These incidents are not isolated or coincidental—they reveal a trend that could turn global.As a former head of IAM in retail, I deeply empathize with the teams on the inside, working night and day to recover. During an attack, it’s tough to get sleep, stress runs high, and trust comes hard. It's a disorienting time where every decision feels critical. Recovery often demands draconian measures just to regain control, but teams aim to to restore normal operations, giving people back the tools to do their jobs, and keeping the shelves stocked and the tills running. [SC Media Perspectives columns are written by a trusted community of SC Media cybersecurity subject matter experts. Read more Perspectives here.]For those on the outside, it's important to know that the attackers compromised all three retailers by targeting gaps in identity, using age-old social engineering techniques to steal credentials and weave their way into their networks.They are a reminder to retailers that all companies are targets—but they’re also a rare opportunity to rapidly advance security measures by capturing executive imagination with real-life examples of how attackers can weaponize weaknesses. Attacks like these can drive the changes necessary to get identity firmly at the top of the security agenda—after all: control account compromise and it’s possible to control ransomware.If we can learn anything from these recent attacks, it’s that now’s the time to rethink how the industry perceives identity—not just as an operational and efficiency function, but with the right mindset, as a critical security control. Identity and access management (IAM) and security teams that have long pushed for deeper protections should use this opportunity to move those plans forward. Now’s the moment to act.In large retail organizations, we often drive change by compliance requirements or the pursuit of operational efficiency, not security. The technologies in place were never designed with modern threat landscapes in mind, leaving security as a happy, albeit incomplete, by-product. It’s a legacy we’re still contending with, especially when it comes to identity.We see this in action in the three main models that dominate retail identity management:The minimal access model: Most frontline workers don’t have accounts, and systems like Point-of-Sale (PoS) terminals are shared and locally managed. These environments are heavily segmented and seen as relatively low risk. But this also limits what digital tools can do to support the business. The enabled-but-unprotected model: Everyone has an account, but security controls are only rolled out to knowledge workers, not the retail employees working the storefront. Efficiency improves, but the attack surface grows massively without corresponding security investments. It’s a digitized workforce—but not a protected one. The rare few: Some smaller or more security-conscious retailers have extended protection—often in the form of MFA—to all staff, including frontline workers. But this remains the exception, not the norm. Identity too often gets managed in silos as a function of compliance and efficiency, particularly in people-dense industries like retail, logistics, or public sector services. What attackers understand—and defenders under-resource—is that it's also one of the easiest vectors to exploit. And with the digitalization of the frontline workforce, it’ll only get easier.
Identity, Ransomware
The recent ransomware attacks on UK retailers all targeted gaps in identity

(Adobe Stock)
An In-Depth Guide to Identity
Get essential knowledge and practical strategies to fortify your identity security.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds