The Retail Fortress Was a Perimeter: How Marks & Spencer's GBP 300M Loss Exposes the Detection-Response Ceiling

The £300 million impact announced by Marks & Spencer in early 2025 following the Scattered Spider intrusion did not fail because the company lacked detection tools — it failed because detection tools cannot prevent theft of operational control.

Scattered Spider, also known as UNC6141 and tracked by CrowdStrike, Mandiant, and Sekoia, operates in a mode that has become the operational doctrine of advanced intrusion teams targeting high-value retail and financial infrastructure. The group typically enters via social engineering against support staff (help desk, IT service desk, privileged access management vendors), moves laterally through identity fabric and cloud tenancy boundaries, establishes persistent access via long-lived credentials or API tokens, and remains undetected for weeks or months whilst methodically harvesting operational secrets: configuration databases, API documentation, payment processor integrations, supply chain data, and most critically, access credentials cascading through downstream systems.

The canonical pattern was already visible in the 2023 MOVEit Transfer zero-day (CVE-2023-34362), which Progress Software patched in June but which, once exploit code circulated, enabled attackers to bypass authentication entirely and extract data from web.config files and SQL connection strings across hundreds of customer deployments before detection occurred. The subsequent damage was measured not in stolen customer records but in the fact that once you hold valid operational credentials, the interior of the perimeter becomes indistinguishable from the exterior — you own the same databases the legitimate administrators do, execute the same API calls, and leave nearly identical audit trails.

The retail sector had already been shaken by the 2023 cascade of intrusions that culminated in the Synnovis attack in July 2024 (which resulted in NHS operational chaos when a single vendor breach rendered patient record systems inaccessible across London hospital trusts), and by the MGM Resorts and Caesars Entertainment breaches in 2023, both traced to compromised identity systems and legacy VPN infrastructure. The pattern was not new. What made Scattered Spider's engagement against Marks & Spencer significant was that the GBP 300 million impact figure — publicly disclosed as operational disruption, inventory system downtime, and transaction processing failures — represents the cost of losing control of your own infrastructure, not the cost of a breach in the compliance sense.

Why Detection Failed at the Point It Mattered Most

Marks & Spencer, like most retail enterprises in that operating context, deployed a comprehensive security operations architecture. SIEM (Security Information and Event Management) ingestion from network sensors, EDR (Endpoint Detection and Response) agents on managed devices, SOAR (Security Orchestration, Automation and Response) playbooks for incident handling, DLP (Data Loss Prevention) rules tuned to retail-specific data structures, and external threat intelligence feeds. The company held ISO 27001 certification and maintained compliance with payment card industry data security standards (PCI DSS 3.2.1, migrating toward PCI DSS 4.0). On paper, the detection architecture was mature.

The fundamental failure was not one of capability but of timing and scope. Scattered Spider's methodology is specifically engineered to operate inside the blind spots of detection-response frameworks. Social engineering against help desk staff produces no malware artifacts — no process injection, no registry modification, no suspicious binary execution. A support engineer voluntarily handing over credentials to an attacker impersonating an executive or vendor does not trigger EDR telemetry. A phishing campaign targeting IT service desk personnel at Progress Software, or at a third-party infrastructure-as-a-service vendor that manages Marks & Spencer's cloud tenancy, produces an alert only if that vendor is instrumented and configured to export alerts to Marks & Spencer's security operations centre. The Optus 2022 breach revealed that vendors managing critical infrastructure often had no such arrangement.

Once valid credentials exist in an attacker's possession, the problem becomes invisible to detection systems. A legitimate user logging in from a geographically implausible location is a detection signal — but if the attacker is using a compromised administrative credential, or an API token embedded in a configuration file that legitimately allows automated scripts to execute queries, the system sees a valid authentication event followed by a valid authorisation event. The LastPass 2022 incident exposed this starkly: once the attacker held a legitimate administrative session token, they could decrypt encrypted customer vaults because cryptographic operations performed by an authenticated session are, by design, indistinguishable from those performed by the legitimate vault owner. Detection systems flagged high-volume data access, but not before the data had been read.

The GBP 300 million figure materialised only when Scattered Spider had sufficiently mapped the retail payment and inventory systems to execute coordinated disruption across multiple operational domains. Marks & Spencer's transaction processing failed not because a malware sample was detected, but because the attacker had mapped, compromised, and could disable the API authentication tokens and database credentials that powered the POS (point-of-sale) tier, inventory management systems, and settlement infrastructure. By the time detection occurred — almost certainly when an administrator noticed unusual API call patterns, or when backup and recovery systems triggered anomaly alerts — the attacker had already established persistence mechanisms (backdoor accounts, API tokens, scheduled task runners) that could survive credential rotation and continue operating through subsequent remediation cycles.

The Structural Ceiling of Detection-Response Architecture

The detection-response paradigm operates under a tacit but unexamined assumption: that the interior of your infrastructure is trustworthy, and that the job of security is to identify and eject the intruder before they access high-value assets. This assumption collapsed in operational practice somewhere between the SolarWinds 2020 supply-chain compromise (where a software update delivered malware directly into the trust layer) and the Scattered Spider methodology of harvesting credentials at the support desk and using them to become indistinguishable from legitimate operators.

Consider the architecture implied by standard remediation advice from vendors and regulators. Following an incident like Marks & Spencer's, the playbook reads: strengthen MFA (multi-factor authentication) on all administrative accounts; rotate all credentials; increase logging fidelity (push more events to SIEM); deploy additional EDR sensors; retrain staff on social engineering; segment the network; implement zero-trust networking (deploy microsegmentation firewalls, require continuous re-authentication). Each step assumes that the next layer of detection or access control will catch the attacker. Each step is also a tax on operational agility — MFA adds friction to automation, credential rotation breaks scripts and APIs, increased logging creates alert fatigue (the signal-to-noise ratio in typical SIEM systems is measured at 1:1000 or worse), and microsegmentation adds latency and operational complexity.

The real problem is not the absence of these controls — it is that they remain detection-response controls. They do not change the fact that once an attacker holds valid credentials, they can authenticate legitimately. They do not change the fact that a valid API token, held by an attacker, will execute API calls that are indistinguishable from those executed by an automated system. They do not change the fact that the SIEM alert firing at 3 AM on a Friday saying "administrative user accessed database from unusual IP" can only be acted upon if someone is awake to read it, and the attacker has already scheduled the operation to execute weeks later.

The architecture does not know what information it is entitled to protect, because the architectural layer does not understand the domain. A retail payment processor knows which transactions should clear, which inventory databases should be read, which supply chain partners should receive which data. But this knowledge exists in a business rules engine somewhere in the application layer, not in the infrastructure. When Scattered Spider maps the payment settlement API, they learn that a correctly-formed API request triggers a database update that is indistinguishable from a legitimate settlement. The infrastructure has no way to know whether a settlement is legitimate or not — it only knows whether the credential used to request it is valid.

Zero-Knowledge: Structural Resistance to Credential Compromise

The PULSE doctrine approaches this problem from a different architectural primitive: zero-knowledge substrate design. The principle is direct: structure your infrastructure such that the minimum data required to execute a transaction is available at the moment the transaction executes, and no more.

In concrete terms, consider Marks & Spencer's payment settlement system. Under a conventional architecture, the settlement API endpoint holds a credential that grants access to read customer transactions, read merchant accounts, compute totals, and execute transfers to the settlement bank. If that credential is compromised, all of those operations become available to the attacker. If the credential is also used by an automated scheduler that runs nightly settlement batches, the attacker can schedule additional operations, modify settlement amounts, or exfiltrate the transaction ledger.

Under a zero-knowledge design, the settlement function is decomposed such that:

  1. The credential for reading customer transaction data is distinct from the credential for executing transfers. Transaction data is read by a read-only query that operates against a snapshot of the transaction ledger that was created one day prior — so the attacker reads stale data.
  1. The credential for executing transfers never actually holds the connection string or API token for the settlement bank. Instead, it writes a signed message to a queue, which is then processed by a separate, isolated service that holds the actual settlement credential and which can only process messages signed by a known list of principals.
  1. The scheduler that executes nightly settlements does not run under the same credential as the API endpoint. It runs under a credential that is ephemeral (generated at execution time), scoped to a single batch run, and which cannot execute any operation outside the nightly settlement window (enforced not at the application layer but at the infrastructure layer via time-locked cryptographic keys).
  1. All three credentials are never held in the same location. The transaction-read credential lives in a secrets store that is offline (not accessible from the network). The transfer-execution credential is reconstructed at runtime from key shares that are held in separate hardware modules. The scheduler credential is derived from a trusted hardware TPM (Trusted Platform Module) that attests to the integrity of the running service before releasing the key.

The attacker who compromises one credential has compromised one bounded piece of the system. They cannot cascade privilege. They cannot use the transaction-read credential to execute a transfer, because they do not hold the transfer credential. They cannot use the transfer credential to impersonate the scheduler, because the scheduler credential requires hardware attestation. And critically — they cannot exfiltrate data at scale, because the transaction data they can read is stale (delayed by one business day), which provides a detection window without requiring a human to interpret an alert at 3 AM.

Domain-Specific Automation: Making Adversaries Visible Through Behaviour Mismatch

The second architectural principle is domain-specific automation — embedding the business rules that define legitimate operation directly into the infrastructure, rather than leaving them in application code or in the heads of analysts.

A retail payment system has well-defined patterns. Transactions clear between midnight and 6 AM in a batch process. Settlement to the bank occurs within 24 hours of transaction capture. The number of transactions per minute is bounded by the rate of POS terminals in the physical store network — you cannot process more transactions per minute than you have checkouts. A supplier data feed is delivered by a vendor every Thursday morning. A customer returns database should never grow faster than a certain percentage of the transaction volume (because returns are always less frequent than sales).

These are not detection rules to be written in Sigma or YARA and fed to SIEM. These are architectural constraints to be encoded into the infrastructure itself. The payment settlement service, under a well-designed substrate, should refuse to process a settlement request that violates these constraints — not because an alert fired, but because the request is rejected at the cryptographic layer.

If Scattered Spider attempts to schedule a settlement run on a Wednesday instead of a Thursday, the service rejects it (time-locked key does not exist). If they attempt to process 10,000 transactions per second instead of the typical 50 per second, the rate limiter (implemented in hardware, not software) rejects it before it reaches the application. If they attempt to modify the supplier data feed to inject false inventory, the cryptographic signature on that feed is invalid, and the data is rejected before it reaches the database. If they attempt to read customer returns data out of order or at a scale inconsistent with normal business operations, the query is rejected because it violates the access pattern that the legitimate application uses.

The attacker does not trigger an alert. The attacker is simply unable to execute the operation. And because these constraints are baked into the infrastructure — into the API gateway, the secrets management layer, the database query engine, the message queue processor — they cannot be bypassed by privilege escalation, credential compromise, or lateral movement.

This is the difference between post-breach detection and post-breach resistance. Detection assumes the attacker is already inside and tries to spot them. Resistance assumes the attacker is inside and prevents them from causing harm.

Adaptive Posture: Continuous Adversarial Drift

The third principle is continuous adversarial posture adjustment. This is not the same as EDR threat hunting or SIEM correlation tuning. It means that the infrastructure itself varies its response to inputs — not randomly, but according to a threat model that adapts to observed attacker behaviour.

In the aftermath of the Marks & Spencer incident, and given the known sophistication of Scattered Spider's operational security practices, the legitimate payment and inventory systems should shift their operating characteristics. If Scattered Spider adapted to detect that settlement credentials no longer grant read access to the transaction ledger, the infrastructure should begin varying the latency of reads (reading legitimately is now occasionally slow, to make forensic timing analysis harder). If the attacker adapted to the time-locked cryptographic keys by learning when the weekly settlement window occurs, the infrastructure should begin occasionally opening additional settlement windows at unpredictable times (and filling them with spurious transactions that look real to an attacker but which actually fail at the bank). If the attacker adapted to the rate limiter by spreading requests across multiple compromised API tokens, the rate limiter should begin flagging not absolute request rates but behavioural divergence from the legitimate application's known request patterns.

This is a form of adaptive active defence — the infrastructure is not waiting for an attacker to act, then responding defensively. It is continuously shifting the terrain such that an attacker's reconnaissance data ages quickly, and the operational picture they built during their initial compromise becomes stale.

The Regulatory Imperative: Post-Incident Obligation Under Emerging Standards

The incident at Marks & Spencer occurred under the regulatory regimes of GDPR (which mandates notification within 72 hours of discovery), PCI DSS (which requires incident investigation and remediation reporting), and the emerging DORA regime (Digital Operational Resilience Act, binding on EU financial institutions and critical infrastructure operators from January 2025). DORA explicitly requires demonstration of "operational resilience" — the ability to remain operational during adverse scenarios. Traditional detection-response architecture does not satisfy this requirement, because detection takes time and response involves operational downtime (credential rotation, system re-imaging, access revocation).

The Financial Conduct Authority's Senior Managers & Certification Regime (SM&CR) and the Prudential Regulation Authority's standards for critical operational resilience (APRA CPS 234 in Australia, similar regimes in Singapore under MAS TRM and in Hong Kong under their Cyber Resilience guidelines) all pivot on the same point: regulators now expect organisations to remain operational and to maintain service delivery during an active compromise. A GBP 300 million loss due to payment system downtime is now considered a regulatory failure, not a technical one.

The standard remediation — stronger MFA, better segmentation, more logging — treats the failure as a detection problem. The regulatory reading, increasingly, is that the failure was an architectural one: the system was designed such that compromise of any high-privilege credential could cascade into full operational failure. Under DORA and SM&CR, that is not acceptable.

Call to Qualified Operators

If your organisation manages critical operational infrastructure — payment systems, supply chain networks, inventory and settlement platforms — and you are assessing post-incident architecture under these emerging regulatory standards, we invite you to request a technical briefing under executed Mutual NDA to explore how zero-knowledge substrate design, domain-specific automation, and adaptive posture principles apply to your specific operational domain.

Engagement

Request a briefing under executed Mutual NDA.

PULSE engages only with verified counterparties. Strategic briefing material — reference architecture, regulatory mapping, deployment topology — is released after counter-execution of the NDA scoped to the recipient's evaluation purpose.

Request Briefing →

Related Reading