Get immediate help for cyber attacks with our new Incident Response services LEARN MORE >

Services

We’re a selected team of skilled cybersecurity professionals who work as an extension of your IT staff, as well as best-in-class technology to add an additional layer of protection to your organization.

View our Managed Services
Ask About Our Outsourced Cybersecurity Program

Our comprehensive outsourced cybersecurity program leverages advanced technology and expert professionals to enhance your security without the need for in-house capabilities.
 

Learn more

Partners

We collaborate with best in the business to ensure our customers receive the highest levels of care and support. These trusted relationships allow us to better serve and educate our customers.

Regional Partner of the Year Award

Partner of the Year Award

Why Inversion6

With an abundance of solutions and providers, the task of choosing the right option is critical and can sometimes be overwhelming.

industry validation

"Thanks to Inversion6, we now have an established protocol and response procedure whenever incidents are detected. Now, we are able to act immediately to prevent a security event from becoming a larger incident."

Read Full Story

Resources

Our experts are thought leaders in the cybersecurity space. From blogs to publications and webinars, check out these resources to learn more about what’s trending in our industry and how you can stay ahead.

Why Cybersecurity Should Be Driving Your Enterprise Risk Management Strategy

By Christopher Prewitt

Read Article
Latest Inversion6 Press

CISO Craig Burland’s latest byline in Cyber Defense Magazine discusses the importance of accountability in cybersecurity.

View Story
June 9, 2025
By: Ian Thornton-Trump CD and Jack Nichelson

When Hackers Hit High Street: What the 2025 UK Retail Attacks Reveal About Modern Cyberthreats


This spring, what appeared to be a coordinated wave of ransomware attacks rocked the UK retail sector. Among the highest-profile victims: Marks & Spencer (M&S), a household name in British retail, whose customers awoke to headlines alleging their personal data had been compromised—a claim which later proved to be the case 

Retail companies have long been vulnerable to cyberattacks. They have large, distributed infrastructures, high employee turnover and vast troves of customer data, making them irresistible targets. What makes these retail breaches particularly disturbing is how they were likely conducted by a relatively small network of young, skilled attackers using a new generation of malicious tactics 

These incidents were not anomalies. In fact, we believe they are the new normal. And the lessons they offer are crucial for every organization, not just in retail and not just in the UK. 

The Next Generation of Cyberattacks:  

At the center of this storm is a loosely affiliated criminal group known as Scattered Spider, who have been identified as the likely culprits behind this series of attacks. Despite their ominous name, they are a group of semi-organized young cybercriminals who rely heavily on AI-generated phishing, SIM swapping and open-source intelligence to target their victims. 

Scattered Spider attacks succeed because the attackers know how to impersonate employees and leverage native knowledge of UK slang, systems and org structures. And in this specific case, the payload in all three of these breaches appears to have been delivered via a commercially available ransomware kit called “DragonForce,” an up-and-coming Ransomware as a Service (RaaS) cyber-crime tool. 

As we noted in a recent Sky News appearance, this should serve as a true wake-up call. Attackers no longer need nation-state backing or elite hacking skills to bring down large retail organizations.  

A Plan to Counterattack:

Businesses should take away some hard but valuable lessons from these attacks; lessons that extend far beyond retail and far beyond the UK. Here are a few of them. 

1. Response plans must move at the speed of the attackers 

If your IR plan can’t neutralize a full domain compromise in a matter of minutes, it’s probably outdated. In this case, two of the targeted retail organizations, M&S and Co-op, may both have been breached by hackers long before the attack was actually launched  When the attacks came, Co-op was able to catch on and shut down key portions of their own system before hackers had time to complete the attack. The M&S team was not so lucky.  

2. Endpoints remain your single biggest weak spot. 

Most modern breaches begin with compromised credentials. In these recent UK attacks, identity controls on password resets and phone numbers may have failed. This is yet another example of why behavioral detection, just-in-time access and strict MFA policies should no longer be optional for a large organization. 

3. Security tools only work when you let them. 

In many environments, EDR tools remain hamstrung by “do not touch” lists, servers that can’t be shut down in the middle of the night and email rules that whitelist too broadly. Bottom line, if you don’t trust your tools to act when it counts, they won’t help you. 

So how do you put these lessons into practice? One idea we recommend is to run your next tabletop exercise based on the modern attack methods outlined above. If your team can’t detect and contain this mock attack in real time, you have some work to do. 

As you plan, don’t be shy about asking your MSSP some hard questions. What would they have done in this case? Would they have caught it? How would they have handled the situation in real time? 

Ready to put your response strategy to the test? 

Inversion6 helps enterprises operationalize their threat intelligence, harden their identity controls and modernize their incident response. 

If you're wondering whether your team could stop a Scattered Spider-style attack in time, let’s find out together

Post Written By: Ian Thornton-Trump CD and Jack Nichelson

Related Blog Posts

Let's TALK

Our team of experts in information security, storage, and networking works alongside your team to implement technology solutions that are smart, flexible, and customized to fit your needs. Ready to learn how we can help strengthen your technology environment? Fill out the form below to get started.

TALK TO AN EXPERT