Cyber Attacks & Infrastructure Disruptions (Spring 2025)

User avatar placeholder
Written by Nat Schooler

May 29, 2025

In this eye-opening episode, Lisa Ventura MBE and I delve into the escalating world of cyber threats and their impact on global infrastructure. Join us as we explore the latest cyber attack trends and how they are disrupting essential services worldwide.

In this eye-opening episode, Lisa Ventura MBE and I delve into the escalating world of cyber threats and their impact on global infrastructure. Join us as we explore the latest cyber attack trends and how they are disrupting essential services worldwide. From power grids to communication networks, no system is safe. Our expert guests will provide insights into the vulnerabilities that hackers exploit and discuss innovative strategies to safeguard our digital future. Don’t miss this crucial discussion on the frontlines of cybersecurity! Subscribe to INFLUENTIAL VISIONS for more insights into the world of technology and innovation. Stay ahead of the curve with our expert interviews and deep dives into the future of tec

From power grids to communication networks, no system is safe. Our expert guests will provide insights into the vulnerabilities that hackers exploit and discuss innovative strategies to safeguard our digital future.

Don’t miss this crucial discussion on the frontlines of cybersecurity!

Stay ahead of the curve with our expert interviews and deep dives into the future of tech!

Q&A OUTLINE – Cyber Attacks & Infrastructure Disruptions (Spring 2025)

I. Retail Cyber Attacks
Q1: What happened to Marks & Spencer in April 2025?
A: M&S suffered a ransomware attack by the DragonForce group (linked to Scattered
Spider). Online orders were halted, operations disrupted, and customer data stolen.
Estimated losses: £30M.
Q2: What data was compromised at M&S?
A: Names, contact details, dates of birth, and order histories – but not passwords or full
payment details.
Q3: What happened at the Co-op around the same time?
A: Co-op also suffered a breach in late April. Hackers accessed personal data of up to 20
million members. Stores experienced stock shortages and payment disruptions due to
system shutdowns.
Q4: Was the same group responsible for both M&S and Co-op attacks?
A: Yes. DragonForce claimed both. The Scattered Spider group is suspected in both cases,
using similar social engineering tactics.
Q5: How did Harrods respond to their attempted cyber attack?
A: Harrods detected an intrusion in early May, cut off internet access, and avoided data loss
or disruption. It was likely targeted by the same group but contained the threat quickly.
Q6: How were these retail attacks similar?
A:
 All used social engineering to infiltrate systems.
 DragonForce/Scattered Spider was involved.
 Aimed to steal data and disrupt services.
 Harrods succeeded in early detection and isolation.
II. Infrastructure Outages: Were They Related?
Q7: What happened in Spain and Portugal in April 2025?
A: Both countries experienced widespread power outages over multiple days in April,
affecting hospitals, public transport, and digital infrastructure. Official causes are under
investigation but suspected to involve cyber sabotage of energy grid control systems.
Q8: What caused the May 2025 London Underground outage?
A: On May 6, the entire London Underground system halted for several hours due to a
failure in the signaling and control network. Though officially attributed to “technical failure,”
some cybersecurity analysts raised concerns over potential malware activity within transport
control systems.
Q9: Were these infrastructure outages connected to the retail cyber attacks?
A: While no conclusive evidence has been released linking the outages to the
DragonForce/Scattered Spider campaign, the timing, scale, and cross-sector nature of
disruptions have led to growing speculation about a coordinated or state-backed campaign
testing the UK and European resilience.

 Shared characteristics:
o Occurred within weeks of each other.
o Targeted critical infrastructure (energy, transport, retail).
o Possibly exploited vulnerable third-party platforms or shared supply
chain systems.
o Involved social engineering and insider impersonation tactics.

III. Broader Implications
Q10: What can we learn from these incidents?
✅ Cybersecurity is a national resilience issue, not just a business concern.
✅ Supply chain and shared vendor risk must be scrutinized.
✅ Attackers are now cross-sectoral – hitting retail, energy, and transport in tandem.
✅ Public-private collaboration is crucial for real-time threat intelligence sharing.
Q11: How can organisations protect themselves immediately?
 Implement MFA and strong identity verification at help desks.
 Train employees on social engineering red flags.
 Segment networks and prepare offline backups.
 Develop and test incident response plans.
 Monitor suppliers and conduct cyber risk assessments on third parties.
IV. Final Thought
Q12: Is the UK and Europe’s critical infrastructure at risk of systemic cyber attacks?
A: These incidents, when viewed together, suggest that attackers are probing not just
businesses but national infrastructure layers. A systemic risk is emerging – where the
lines between criminal and geopolitical cyber threats blur. Preparation and resilience
must scale accordingly.

Image placeholder

Nathaniel Schooler is a Podcast Host, Amazon Best Selling Author, and Entrepreneur. He is Co-Founder International Imposter Syndrome Awareness Day, Co-Founder of MONDAY INFLUENCER®.