Retail Sector Faces Surge in Ransomware Attacks: A 2025 Analysis

Alan V Gutnov
Alan V Gutnov

Director of Strategy

 
July 19, 2025 2 min read

Retail Ransomware Attacks Increase

Publicly disclosed ransomware attacks on the retail sector globally surged by 58% in Q2 2025 compared to Q1, with UK-based firms being particularly targeted, according to a report by BlackFog. This spike in attacks follows high-profile breaches affecting retailers like Marks & Spencer (M&S), The Co-op, and Harrods, attributed to the threat actor known as Scattered Spider.

Source: BlackFog

These incidents have led to significant operational disruptions and financial repercussions for the affected brands. For instance, M&S reported cyber costs exceeding £300 million. On July 10, UK law enforcement arrested four individuals linked to these attacks, underscoring the ongoing threat to the retail sector.

DragonForce Ransomware Group

The DragonForce ransomware group, emerging in late 2023, has quickly evolved into a Ransomware-as-a-Service (RaaS) model. This group recruits affiliate hackers to utilize their ransomware platform, taking a 20% cut from ransoms while managing malware development and payment negotiations. A DragonForce representative stated, “We are here for business and money.”

Recent attacks attributed to DragonForce or its affiliates include significant breaches at M&S, which faced widespread outages in late April 2025, and the Co-op, which experienced attempted breaches shortly thereafter.

CyberWire

Tactics of DragonForce

DragonForce employs sophisticated tactics for initial access, such as social engineering and phishing to gain credentials. In the M&S breach, attackers reportedly accessed the company's Active Directory database months prior to deploying ransomware, allowing them to use valid accounts for lateral movement within the network.

The group also utilizes PowerShell for executing payloads and automating tasks, often running malicious commands to disable security features. They have been observed using techniques like credential dumping from the LSASS process to gain domain administrator privileges.

Defense Strategies Against Ransomware

Organizations must adopt a multi-layered defense to mitigate the risk of ransomware attacks. Key strategies include:

  1. Implementing phishing-resistant multi-factor authentication and educating employees about social engineering tactics.
  2. Securing remote access points, such as VPNs and RDP servers, behind a Zero Trust Network Access (ZTNA) gateway.
  3. Protecting Active Directory and monitoring for suspicious credential retrieval.
  4. Deploying advanced Endpoint Detection & Response (EDR) tools configured to resist tampering.
  5. Regularly backing up critical data offline to prepare for potential recovery from an attack.

Gopher Security specializes in AI-powered, post-quantum Zero-Trust cybersecurity architecture, providing comprehensive solutions such as AI Inspection Engine for Traffic Monitoring and AI Ransomware Kill Switch. This technology converges networking and security across devices and environments, ensuring robust protection against evolving ransomware threats.

Explore our services at Gopher Security to enhance your organization's security posture.

Alan V Gutnov
Alan V Gutnov

Director of Strategy

 

MBA-credentialed cybersecurity expert specializing in Post-Quantum Cybersecurity solutions with proven capability to reduce attack surfaces by 90%.

Related News

CVE-2025-15467: Critical OpenSSL RCE and DoS Vulnerability Overview
OpenSSL vulnerability

CVE-2025-15467: Critical OpenSSL RCE and DoS Vulnerability Overview

Urgent: OpenSSL 3.x vulnerable to CVE-2025-15467, enabling pre-auth RCE. Learn affected versions, impact, and immediate mitigation steps. Protect your systems now!

By Divyansh Ingle March 10, 2026 4 min read
common.read_full_article
SolarWinds Patches Critical Web Help Desk RCE Vulnerabilities Now
SolarWinds Web Help Desk

SolarWinds Patches Critical Web Help Desk RCE Vulnerabilities Now

Critical RCE & Auth Bypass flaws in SolarWinds Web Help Desk are fixed! Don't risk it. Update to v2026.1 now to protect your systems. Learn more.

By Edward Zhou March 9, 2026 4 min read
common.read_full_article
AI vs Human Hackers: Who Prevails in 2026 Pen Testing?
AI hacking

AI vs Human Hackers: Who Prevails in 2026 Pen Testing?

Discover the results of a groundbreaking study comparing AI agents and human hackers in web vulnerability exploitation. See who prevails and what it means for your security. Read now!

By Jim Gagnard March 6, 2026 6 min read
common.read_full_article
Vulnerability Exploits Lead Cyber Intrusions in 2026 Trends
vulnerability exploits

Vulnerability Exploits Lead Cyber Intrusions in 2026 Trends

Exploits are now the top intrusion method, outpacing phishing. Discover why rapid vulnerability patching is critical and how to bolster your defenses. Read more!

By Edward Zhou March 4, 2026 4 min read
common.read_full_article