Tuesday, July 16, 2024

Over 300 SPAR Stores Switch To Cash-only Payments After Cyber Attack

In the north of England, a major cyberattack hits recently on more than 300 branches of the convenience store chain, “Spar.” It has led to the closure of these stores at a time, and the experts have described this issue as a “total outage.”

Across Lancashire, the outage is still in effect as Lawrence Hunt & Co Ltd claimed, this company runs 25 branches Spar across Lancashire, and this outage is affecting the following departments across the SPAR network:-

  • Credit cards
  • Back office systems

Due to this “total outage,” the store operators and their corresponding staffs are unable to operate the stores, as they are prevented from taking any card payments since the systems were locked.

However, some of the remote branches of the chain are still operating but, here, they are operating the remote branches with cash transactions only for grocery items only.

One of the largest distributors of the SPAR chain in North also remains offline, the James Hall and Co who distribute stock to hundreds of SPAR shops. On Sunday the cyberattack hit the Spar chain, and after the attack, the IT technicians are still working to fix the issue.


Here’s what an official Twitter account for Spar in the north of England told shoppers:-


“We apologize for the inconvenience this is causing our customers and we are working as quickly as possible to resolve the situation. This has affected around 330 SPAR stores across the North of England over the past 24 hours. It is currently impacting stores’ ability to process card payments meaning that a number of SPAR stores are currently closed to shoppers or only taking cash payments.”

In total, more than 13000 stores were operated by SPAR across the globe, and this major cyberattack hit the Lancashire county stores only. 

Till now the SPAR has not provided any details regarding the attack, but it is assumed that this is a ransomware attack. However, the NCSC (UK’s national cybersecurity center) affirmed that they are already aware of this incident, and closely tracking every activity.


Latest articles

Critical Cellopoint Secure Email Gateway Flaw Let Attackers Execute Arbitrary Code

A critical vulnerability has been discovered in the Cellopoint Secure Email Gateway, identified as...

Singapore Banks to Phase out OTPs for Bank Account Logins Within 3 Months

The Monetary Authority of Singapore (MAS) and The Association of Banks in Singapore (ABS)...

GuardZoo Android Malware Attacking military personnel via WhatsApp To Steal Sensitive Data

A Houthi-aligned group has been deploying Android surveillanceware called GuardZoo since October 2019 to...

ViperSoftX Weaponizing AutoIt & CLR For Stealthy PowerShell Execution

ViperSoftX is an advanced malware that has become more complicated since its recognition in...

Malicious NuGet Campaign Tricking Developers To Inject Malicious Code

Hackers often target NuGet as it's a popular package manager for .NET, which developers...

Akira Ransomware Attacking Airline Industry With Legitimate Tools

Airlines often become the target of hackers as they contain sensitive personal and financial...

DarkGate Malware Exploiting Excel Files And SMB File Shares

DarkGate, a Malware-as-a-Service (MaaS) platform, experienced a surge in activity since September 2023, employing...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles