Saturday, January 25, 2025
HomeCyber AttackOver 300 SPAR Stores Switch To Cash-only Payments After Cyber Attack

Over 300 SPAR Stores Switch To Cash-only Payments After Cyber Attack

Published on

SIEM as a Service

Follow Us on Google News

In the north of England, a major cyberattack hits recently on more than 300 branches of the convenience store chain, “Spar.” It has led to the closure of these stores at a time, and the experts have described this issue as a “total outage.”

Across Lancashire, the outage is still in effect as Lawrence Hunt & Co Ltd claimed, this company runs 25 branches Spar across Lancashire, and this outage is affecting the following departments across the SPAR network:-

  • Credit cards
  • Back office systems

Due to this “total outage,” the store operators and their corresponding staffs are unable to operate the stores, as they are prevented from taking any card payments since the systems were locked.

However, some of the remote branches of the chain are still operating but, here, they are operating the remote branches with cash transactions only for grocery items only.

One of the largest distributors of the SPAR chain in North also remains offline, the James Hall and Co who distribute stock to hundreds of SPAR shops. On Sunday the cyberattack hit the Spar chain, and after the attack, the IT technicians are still working to fix the issue.

Apology

Here’s what an official Twitter account for Spar in the north of England told shoppers:-

https://twitter.com/lawrencehunts/status/1467523631437828099

“We apologize for the inconvenience this is causing our customers and we are working as quickly as possible to resolve the situation. This has affected around 330 SPAR stores across the North of England over the past 24 hours. It is currently impacting stores’ ability to process card payments meaning that a number of SPAR stores are currently closed to shoppers or only taking cash payments.”

In total, more than 13000 stores were operated by SPAR across the globe, and this major cyberattack hit the Lancashire county stores only. 

Till now the SPAR has not provided any details regarding the attack, but it is assumed that this is a ransomware attack. However, the NCSC (UK’s national cybersecurity center) affirmed that they are already aware of this incident, and closely tracking every activity.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Subaru’s STARLINK Connected Car’s Vulnerability Let Attackers Gain Restricted Access

In a groundbreaking discovery on November 20, 2024, cybersecurity researchers Shubham Shah and a...

Android Kiosk Tablets Vulnerability Let Attackers Control AC & Lights

A security flaw found in Android-based kiosk tablets at luxury hotels has exposed a...

CISA Releases Six ICS Advisories Details Security Issues

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued six Industrial Control Systems (ICS)...

Juniper Routers Exploited via Magic Packet Vulnerability to Deploy Custom Backdoor

A sophisticated cyber campaign dubbed "J-magic" has been discovered targeting enterprise-grade Juniper routers with...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

KEYPLUG Infrastructure Exposed: Server Configurations and TLS Certificates Revealed

In a recent technical investigation, researchers uncovered critical insights into the infrastructure linked to...

HellCat and Morpheus Ransomware Share Identical Payloads for Attacks

The cybersecurity landscape witnessed a surge in ransomware activity during the latter half of...

Critical Vulnerability in Next.js Framework Exposes Websites to Cache Poisoning and XSS Attacks

A new report has put the spotlight on potential security vulnerabilities within the popular...