In 2025, the cyber-threat landscape intensified at a pace that few organisations were prepared for. Attackers used AI-driven impersonation, credential-theft campaigns and supply-chain infiltration to break into businesses at scale. High-profile organisations across retail, manufacturing and critical services faced data exposure and weeks of operational disruption. The incidents across 2025 made one thing clear: the consequences are immediate and costly.
Several key trends define the cyber-threat environment in 2025:
In April 2025, UK high-street retailer Marks & Spencer (M&S) suffered a sophisticated cyber incident.
The breach was attributed to the hacking group Scattered Spider (also linked to Lapsus$-style activity). Evidence points to social-engineering (SIM-swap / phishing) targeting a third-party service provider, enabling ransomware-style disruption of online services.
Customer-data exposure: names, email addresses, order histories and dates of birth were taken but no usable payment-card details or passwords.
M&S immediately engaged cyber security experts, notified the NCSC and began forced password resets for users.
Shortly after the M&S incident, the Co-op was hit by a cyber attack in April 2025 that disrupted operations at its ~2,300 stores.
Attackers used social-engineering to gain insider access. The group confirmed that hackers accessed internal systems and member data.
The first‐half profit was hit by ~£80 million; lost revenue of £206 million. Full-year impact projected at ~£120 million.
Co-op shut systems proactively, prioritised “lifeline” stores in rural areas and communicated openly with members and regulators.
In August/September 2025, UK car-maker Jaguar Land Rover (JLR) suffered a ransomware attack that halted production at its “smart factories” and impacted its extensive supply-chain.
The hacker group claimed responsibility, pausing production lines globally and impacting suppliers and employees in the UK.
It is regarded as possibly the costliest cyber incident in UK history, with estimated damage to the UK economy of ~£1.9 billion.
Thousands of jobs in the supply-chain were at risk; production lines shut for weeks.
A forensic investigation is ongoing; production restart is phased; government statements note the broader impact on GDP.
In early 2025, Asahi Group Holdings — one of the world’s largest beverage producers — experienced a cyber attack that forced several production facilities across Europe and Asia to halt operations for multiple days.
The incident was linked to a highly coordinated ransomware campaign targeting industrial systems. Attackers infiltrated Asahi’s network through a compromised supplier account, enabling lateral movement into operational technology environments.
The company isolated affected OT systems, rerouted production to unaffected sites where possible and brought in global cyber security specialists to contain the breach. Public communication emphasised transparency around supply chain delays.
In June–July 2025, Qantas disclosed a major cyber incident affecting its customer-service systems, traced to a third-party call-centre platform.
Attackers gained access via a third-party vendor compromise, likely using social-engineering tactics. Qantas’ core flight-operation systems were not breached.
Qantas engaged external cyber-forensics teams, notified Australian authorities, and contacted affected customers. Support channels and guidance on protective steps were issued.
Having reviewed major incidents, what themes and take-aways emerge that organisations should embed into strategic planning for 2026?
Recurring Themes