Thursday, March 28, 2024

Over 300 SPAR Stores Switch To Cash-only Payments After Cyber Attack

In the north of England, a major cyberattack hits recently on more than 300 branches of the convenience store chain, “Spar.” It has led to the closure of these stores at a time, and the experts have described this issue as a “total outage.”

Across Lancashire, the outage is still in effect as Lawrence Hunt & Co Ltd claimed, this company runs 25 branches Spar across Lancashire, and this outage is affecting the following departments across the SPAR network:-

  • Credit cards
  • Back office systems

Due to this “total outage,” the store operators and their corresponding staffs are unable to operate the stores, as they are prevented from taking any card payments since the systems were locked.

However, some of the remote branches of the chain are still operating but, here, they are operating the remote branches with cash transactions only for grocery items only.

One of the largest distributors of the SPAR chain in North also remains offline, the James Hall and Co who distribute stock to hundreds of SPAR shops. On Sunday the cyberattack hit the Spar chain, and after the attack, the IT technicians are still working to fix the issue.

Apology

Here’s what an official Twitter account for Spar in the north of England told shoppers:-

https://twitter.com/lawrencehunts/status/1467523631437828099

“We apologize for the inconvenience this is causing our customers and we are working as quickly as possible to resolve the situation. This has affected around 330 SPAR stores across the North of England over the past 24 hours. It is currently impacting stores’ ability to process card payments meaning that a number of SPAR stores are currently closed to shoppers or only taking cash payments.”

In total, more than 13000 stores were operated by SPAR across the globe, and this major cyberattack hit the Lancashire county stores only. 

Till now the SPAR has not provided any details regarding the attack, but it is assumed that this is a ransomware attack. However, the NCSC (UK’s national cybersecurity center) affirmed that they are already aware of this incident, and closely tracking every activity.

Website

Latest articles

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting...

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and...

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered...

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles