Matt Lawrence,
Director of Cyber Security Operations
Director of Cyber Security Operations
No matter how strong your defences are, you should operate under the assumption that attackers will breach your systems eventually. The goal for security leaders is to minimise the damage and keep the business running when that happens.
Organisations once focused heavily on keeping attackers out with strong perimeter defences. But today, breaches often occur through stolen credentials or social engineering—making intrusion almost inevitable.
Prevention still matters, but detection and response are equally critical. That means integrating monitoring, alerting, and response playbooks into your core security programme. It also means designing IT and business processes such that if one part of your network is compromised, it can be isolated while the rest of the business continues to operate.
A useful guide for this resilience-oriented approach is the NIST Cybersecurity Framework (CSF).
After the traditional “Protect” comes “Detect, Respond, and Recover” these functions explicitly focus on finding intrusions fast, containing them, and keeping the business running.
The framework emphasises continuous monitoring to spot anomalies and verify security measures. It also stresses having robust incident response and recovery plans to restore operations quickly and maintain business continuity after an incident.
The latest NIST CSF guidance highlights enhanced cyber resilience as a key benefit, noting it “improves detection, response, and recovery from incidents, supporting business continuity”.
For a security leader, aligning with NIST means making sure you have capabilities in place to detect malicious activity in real-time, respond decisively, and recover critical systems or data. Detection might include a 24/7 SOC with SIEM/SOAR, user behaviour analytics, and threat hunting. Response involves predefined incident handling procedures and teams ready to act. Recovery covers backup strategies, disaster recovery sites, and business continuity plans so you can continue serving customers even if primary systems go down.
Identity is the new perimeter, and attackers target it aggressively. Groups like Scattered Spider exemplify this trend: they have repeatedly breached companies by impersonating users and tricking IT helpdesks into resetting passwords or disabling MFA.
With a convincing phone call, an attacker can reset a privileged account’s credentials and log in as a legitimate user, essentially walking in through an unlocked door. It’s no surprise that valid credentials are often more valuable to attackers than malware now.
Once inside, attackers aim to move laterally pivoting across multiple systems and accounts using stolen credentials and admin tools. Techniques like MITRE’s “Valid Accounts” involve using legitimate passwords and remote access tools (e.g. RDP, TeamViewer, AnyDesk) to stay hidden. Because they use familiar IT tools, these actions often evade detection. Consider how these tactics map to MITRE ATT&CK in the context of an identity-driven breach:
In the Scattered Spider incidents, attackers called service desk staff (vishing) convincing them to issue password resets to attacker-controlled accounts. MITRE categorises this as voice phishing (T1566.004 – Spear phishing via Telephone). By exploiting human trust, the attackers obtained valid login credentials without cracking a single password themselves.
Armed with credentials (or even stolen password hashes from Active Directory databases like NTDS.dit), attackers could access additional systems and accounts. In one case, attackers stole an AD database and cracked employee passwords. This aligns with MITRE techniques T1078 (Valid Accounts) and T1110 (Brute Force Password Cracking).
With those accounts, they moved through the network. Scattered Spider is known to install multiple remote admin tools and use built-in services (MITRE T1021 – Remote Services) to reach other machines and persist. In other words, once they had a beachhead, they spread laterally by logging in like any other user or admin, which is much harder to spot than malware.
Attackers have found ways to defeat strong authentication. Techniques like Adversary-in-the-Middle (T1557) allow them to hijack session cookies bypassing MFA entirely. Some phishing frameworks will downgrade MFA or trick users into using less secure methods.
In helpdesk scams, attackers convince staff to re-enrol a new MFA device or turn off MFA (MITRE has technique T1556.006 – Disable or Modify MFA for this). The result: an attacker can impersonate a legitimate user with a valid session token or newly enrolled device, making the intrusion nearly invisible to traditional defences.
Attackers have found ways to defeat strong authentication. Techniques like Adversary-in-the-Middle (T1557) allow them to hijack session cookies bypassing MFA entirely. Some phishing frameworks will downgrade MFA or trick users into using less secure methods.
In helpdesk scams, attackers convince staff to re-enrol a new MFA device or turn off MFA (MITRE has technique T1556.006 – Disable or Modify MFA for this). The result: an attacker can impersonate a legitimate user with a valid session token or newly enrolled device, making the intrusion nearly invisible to traditional defences.
In April–May 2025, Scattered Spider targeted UK retailers including M&S and Co-op. M&S faced a £300M ransomware hit, while Co-op limited damage through swift response—highlighting the value of resilience.
Attackers allegedly gained access via a compromised third-party helpdesk (Tata), using social engineering to obtain credentials. Once inside, they deployed DragonForce ransomware and stole customer data. Caught off-guard, M&S had to revert to manual operations—logging shipments by hand—as key systems failed. Recovery took weeks, with an estimated £300M impact. The case painfully illustrates exposed gaps in continuity planning and resilience.
Targeted in a similar attack, with personal data from 6.5 million members stolen. Early detection and a swift response made the difference. By proactively shutting down core systems, Co-op contained the threat before ransomware could be deployed. Though they faced data loss and reputational impact, they avoided a full operational shutdown—turning a potential crisis into a manageable breach. Their preparedness and decisive containment preserved business continuity.
Targeted in that same campaign, reportedly spotted the attack in progress and cut off Internet access from its internal network. By rapidly isolating their environment, Harrods prevented data theft or encryption altogether. Normal operations continued with minimal impact. This shows the power of quick detection and decisive containment, essentially executing an “assume breach” playbook in real time.
The contrrast between M&S and others is striking. M&S did have security investments, but by their own admission they were “unlucky… through human error” in falling for the helpdesk scam. Once the attackers were in, it appears M&S lacked the early detection or network segmentation that might have contained the breach.
As a result, the attackers had time to exfiltrate data and trigger a ransomware event. Co-op and Harrods, on the other hand, treated the intrusion as inevitable and acted fast to limit damage. Essentially, they assumed compromise and executed drastic continuity measures (like an emergency shutdown or network cutoff) to save the enterprise.
Security leaders must prepare for when—not if—attackers get in.
Acknowledging the “assume breach” mindset is one thing—applying it enterprise-wide is another. Here are practical steps across architecture, incident response, and detection engineering to enable continuity and rapid threat detection:
Building resilience means designing your environment to withstand failure or compromise — whether internal or external — by isolating threats and maintaining operational continuity.
Technology alone won’t save the day if your people and processes aren’t ready. An assume-compromise strategy calls for serious incident response (IR) planning and regular drills.
These non-technical aspects of incident response are essential for continuity; they keep everyone on the same page and focused on the recovery.
Assuming attackers are already inside, rapid detection is critical. Traditional signature-based tools often miss modern threats like phishing or credential theft. That’s where behavioural detection and continuous monitoring come in.
For example: An employee account suddenly accesses 10 database servers it never touched before, or a user logs in at 3 AM from a foreign IP and then initiates a mass download of files, those are big red flags. Develop alerts for things like impossible travel (user logging from London then NYC in 30 minutes), multiple failed logins across various accounts (password spraying), new privileged group assignments, or the same device using multiple VPN accounts. These can all signal an attacker at work.
MITRE ATT&CK is a powerful framework for mapping detection capabilities. Focus on key tactics related to identity and lateral movement—Initial Access, Credential Access, Lateral Movement, and Privilege Escalation. For each, ensure you can detect or mitigate common techniques.
Examples include:
Systematically reviewing attacker behaviours and adding detection logic boosts your chances of early threat discovery. The Co-op detected their threat before ransomware launched—likely thanks to well-placed tripwires. You want those in your environment too.
Detection rules are useless if no one’s watching. Whether it’s an internal SOC or external MXDR, ensure alerts are monitored 24/7 and acted on. Use tools to reduce noise and prioritise real threats.
Adopt an “assume breach” mindset: treat every alert seriously until proven benign. Breaches often go unnoticed because alerts are dismissed or misjudged. Encourage curiosity and urgency—better a false alarm than a missed attack.
Stay informed on attacker tools and tactics, and ensure your controls address them. If threat intel highlights a tool or technique, proactively search for it in your logs.
Build detection rules based on real-world TTPs—not just theory. When gaps emerge (e.g. missing log detail or overlooked lateral movement), refine your detection engineering. This cycle of learning and improvement reflects the “Respond and Recover” principle in frameworks like NIST—use every insight to strengthen your defences.
“Assume compromise, design for continuity and detection” is about accepting that breaches will happen and making sure your organisation can withstand and limit those incidents rather than be crippled by them. By adopting this mindset, security leaders can shift their strategy from purely preventive to truly resilient.
Here are some key takeaways and action items for security leaders to consider:
Don’t wait for a crisis to figure out how to keep the lights on.
By focusing on these areas, security leaders can ensure that when (not if) the next breach happens, their organisation will detect it swiftly, contain it effectively, and continue operating with confidence. In today’s threat landscape, resilience is what separates disruption from disaster. The “assume compromise” mindset, backed by frameworks like NIST, helps turn cyberattacks into manageable incidents—not existential crises. Prepared organisations protect both reputation and business continuity.
Get in touch with an accredited Incident Response experts who can help you contain, recover and mitigate attacks.
0333 987 4048For regular switchboard please
contact - 0333 939 8080