Threats Four Arrested in Connection With M&S and Co-op Cyberattacks: How Cybercriminals Are Prosecuted in 2025
Get Your Sample Report
With Ethical Hacking Expertise
In a significant development in the ongoing fight against cybercrime, the UK’s National Crime Agency (NCA) has confirmed the arrest of four individuals suspected of being involved in a wave of disruptive cyberattacks targeting major British retailers Marks & Spencer (M&S) and the Co-op. The arrests mark a crucial step in holding perpetrators accountable in a landscape increasingly fraught with high-profile digital threats.
The Arrests: A Brief History
According to the NCA, the suspects include a 20-year-old woman apprehended in Staffordshire and three teenage males—aged 17, 18, and 19—arrested in coordinated operations across London and the West Midlands. The arrests are part of an ongoing investigation into a series of cyberattacks that caused operational chaos for M&S and the Co-op, leading to serious disruptions in their digital services and supply chains.
While specific details about the tactics used in the attacks have not been disclosed, initial indicators point toward denial-of-service campaigns and possible breaches into back-end systems that impacted day-to-day business operations and customer services.
Wider Impact on Retail and Consumer Cyber-Related Trust
The attacks on M&S and the Co-op are only the latest in a growing trend of cybercriminals targeting essential services and household names. These attacks have repercussions far beyond IT infrastructure—they erode consumer trust, strain resources, and trigger multi-million-pound damages in downtime, lost sales, and remediation efforts.
Retailers, particularly those with complex supply chains and widespread digital footprints, have become increasingly vulnerable. The rise in cyber incidents across the UK retail sector highlights the urgent need for stronger cyber resilience, especially with evolving threat actor tactics and increasing accessibility to attack tools via the dark web.
National Crime Agency’s Role and Message
The NCA’s swift response underlines the growing emphasis on proactive law enforcement collaboration in the digital domain. A spokesperson from the agency stated:
“This operation demonstrates our commitment to identifying and disrupting those behind significant cybercrime incidents impacting UK businesses and consumers. We will continue working with partners across the public and private sectors to bring offenders to justice.”
These arrests also send a clear message to would-be attackers: anonymity behind a screen is no longer a shield. With partnerships between law enforcement, cybersecurity specialists, and private enterprise growing stronger, attribution is becoming faster—and arrests more likely.
What This Means for Businesses
This high-profile case highlights several key takeaways for businesses of all sizes:
Young Cybercriminals: The age of the arrested suspects again reveals how young individuals are being drawn into cybercrime, often through underground forums and “hacktivist” communities. Businesses must prioritize education and early outreach in cybersecurity.
Resilience Planning: Cyber resilience is no longer optional. Companies must go beyond antivirus software and firewalls. Regular penetration testing, red team exercises, and robust incident response plans are essential.
Threat Intelligence and Partnerships: Timely information sharing with government entities like the NCA, as well as threat intelligence providers, can help detect and mitigate attacks faster.
Conclusion
The recent arrests tied to the M&S and Co-op cyberattacks reflect a shifting tide in the battle against digital threats. As law enforcement continues to crack down on cybercrime and disrupt criminal networks, businesses must take equal steps to harden their defenses, educate their teams, and stay vigilant.
In today’s threat landscape, security is no longer just an IT issue—it’s a business imperative.
Contact Us
Speak with an Account Executive
Interested in Pentesting?

Penetration Testing Methodology
Our Penetration Security Testing methodology is derived from the SANS Pentest Methodology, the MITRE ATT&CK framework, and the NIST SP800-115 to uncover security gaps.
Download Methodology
Pentest Sourcing Guide
Download our Pentest Sourcing Guide to learn everything you need to know to successfully plan, scope, and execute your penetration testing projects.
Download GuideExplore in-depth resources from our ethical hackers to assist you and your team’s cyber-related decisions.

September 13 - Blog
Why Multi-Factor Authentication is Not Enough
Knowing is half the battle, and the use and abuse of common frameworks shed insight into what defenders need to do to build defense in depth.

November 19 - Blog
The Top Cybersecurity Statistics for 2024
The top cybersecurity statistics for 2024 can help inform your organization's security strategies for 2025 and beyond. Learn more today.

October 24 - Blog
Packetlabs at SecTor 2024
Packetlabs is thrilled to have been a part of SecTor 2024. Learn more about our top takeaway's from this year's Black Hat event.