
The past year has seen a wave of digital assaults shake some of Britain’s most recognisable names to their core, exposing vulnerabilities across the UK’s intricate network of outsourced IT services. At the centre of this storm stands Tata Consultancy Services, the Indian outsourcing heavyweight whose rapid expansion and close ties with major British brands are now coming under intense examination.
Marks & Spencer’s chief executive Stuart Machin was one of the first to receive a chilling message from hackers identifying themselves as Scattered Spider. The digital intruders had infiltrated internal emails, locked the retailer’s systems, and forced online sales to a screeching halt, costing the business an estimated £300 million. The same gang’s fingerprints have since been linked to serious breaches at the Co op and Australian airline Qantas, bringing this cyber onslaught into sharp focus for government and business leaders alike.
Security experts and MPs alike are questioning how such attackers have found entry into such high profile brands. According to the National Cyber Security Centre, IT support teams that operate as external outsourcers are increasingly becoming the preferred target. These helpdesk operations can reset passwords and provide broad systems access, making them a weak link if compromised by social engineering tactics. Many of these IT services, including those at M&S and Jaguar Land Rover, are run by Tata Consultancy Services. Chairman of the business and trade committee Liam Byrne has called on TCS to reveal the full extent of its work with large UK organisations and clarify its position on recent incidents.
Stuart Machin himself has recounted how hackers employed sophisticated impersonation to manipulate their way into sensitive M&S infrastructure. Entry was aided by a third party, with reports suggesting hackers gained super user access by targeting an Indian contact centre acting on M&S’s behalf. Industry experts believe scammers have found alarming success simply by phoning IT helpdesks, masquerading as employees, and convincing staff to share or reset critical passwords.
Jaguar Land Rover became another high profile casualty at the end of August when its production lines were brought to a halt by a ransomware attack. This particular breach was claimed by Scattered Lapsus Hunters, an offshoot of the same group targeting British brands. While the exact method remains unconfirmed, hackers claim to have exploited a flaw in SAP software. JLR’s reliance on TCS for IT and cyber security, formalised in a recent £800 million deal, has sharpened questions about whether cost driven outsourcing can keep pace with the fast evolving threat landscape.
TCS’s immense size and its position as Britain’s outsourcing linchpin make some exposure to cyber incidents almost unavoidable. Yet with its association to multiple recent headline attacks, scrutiny is growing over whether its helpdesk and security practices are robust enough for its role at the heart of British business. Calls for greater transparency and tougher safeguards are only set to grow as the risks of digital interdependence come into sharper relief for companies banking on the cost efficiencies of outsourcing.
The following content has been published by Stockmark.IT. All information utilised in the creation of this communication has been gathered from publicly available sources that we consider reliable. Nevertheless, we cannot guarantee the accuracy or completeness of this communication.
This communication is intended solely for informational purposes and should not be construed as an offer, recommendation, solicitation, inducement, or invitation by or on behalf of the Company or any affiliates to engage in any investment activities. The opinions and views expressed by the authors are their own and do not necessarily reflect those of the Company, its affiliates, or any other third party.
The services and products mentioned in this communication may not be suitable for all recipients, by continuing to read this website and its content you agree to the terms of this disclaimer.






