Monday, May 19, 2025
HomeCyber AttackCyberattack Targets Iconic UK Retailer Harrods

Cyberattack Targets Iconic UK Retailer Harrods

Published on

SIEM as a Service

Follow Us on Google News

Luxury department store Harrods has become the latest UK retailer to face a cyberattack, joining Marks & Spencer (M&S) and the Co-op in a wave of incidents exposing vulnerabilities across the retail sector.

While Harrods’ flagship store and online platform remained operational, the breach prompted restricted internet access across its physical locations as cybersecurity teams worked to contain the threat.

The National Cyber Security Centre (NCSC) described the attacks as a “wake-up call” for the industry, emphasizing the need for heightened vigilance amid sophisticated threats targeting consumer data and supply chains.

- Advertisement - Google News

Harrods Restricts Network Access Following Intrusion Attempt

Harrods confirmed on Thursday that it had detected unauthorized attempts to infiltrate its systems, triggering immediate countermeasures by its IT security team.

As a precaution, the retailer restricted internet access at its physical sites, including its Knightsbridge flagship, H beauty stores, and airport outlets, though all locations remained open to customers. Online sales via harrods.com continued uninterrupted, with the platform functioning normally by Thursday evening.

Richard Horne, CEO of the NCSC, underscored the gravity of the situation, noting his team is collaborating with affected retailers to assess the attacks’ scope and disseminate defensive strategies across the sector.

Cody Barrow, former NSA cyber chief and current CEO of EclecticIQ, warned that retailers’ vast customer databases and operational reliance on digital systems make them prime targets for malicious actors. “Consumers must update passwords, monitor financial activity, and remain alert to scams exploiting these breaches,” he advised.

Sector-Wide Disruptions: M&S and Co-Op Grapple With Cascading Threats

The Harrods incident follows severe cybersecurity breaches at M&S and the Co-op, raising questions about potential linkages.

M&S disclosed last week that a ransomware attack-attributed to the group “DragonForce”-had crippled its online ordering systems, leaving shelves empty in some stores and costing millions in lost sales. Police are investigating the incident, which marks one of the most damaging cyberattacks on a UK retailer in recent years.

Meanwhile, the Co-op preemptively shut down portions of its IT infrastructure on Wednesday after detecting intrusion attempts, implementing stringent measures such as requiring staff to keep cameras on during virtual meetings and verifying all participants.

Toby Lewis, Head of Threat Analysis at Darktrace, suggested three scenarios: coincidental timing, compromise of a shared supplier or technology, or heightened scrutiny from security teams following the M&S attack. “These incidents highlight the challenges of securing expansive supply chains against evolving threats,” he noted.

Experts Urge Overhaul of Retail Cybersecurity Protocols

The M&S ransomware attack has reignited debates about preparedness in the retail sector. Ransomware-malware that encrypts critical data until a fee is paid-has become a preferred tool for cybercriminals targeting high-revenue industries.

While Harrods and the Co-op have not confirmed the nature of their breaches, the NCSC warns that ransomware groups increasingly exploit vulnerabilities in third-party vendors to infiltrate larger networks.

Parliament has also stepped into the fray, with Business and Trade Committee Chair Liam Byrne requesting details from M&S CEO Stuart Machin about the company’s adherence to NCSC guidelines and the robustness of its cyber defenses.

Barrow emphasized that retailers must adopt a “zero-trust” mindset, assuming breaches are inevitable and segmenting networks to limit attackers’ mobility.

For consumers, the immediate focus lies in mitigating personal risk. Beyond password updates and financial monitoring, experts advise skepticism toward unsolicited communications referencing recent breaches, as phishing campaigns often surge post-attack.

As the retail sector navigates this crisis, the collective response-or lack thereof-could set a precedent for cybersecurity resilience in an increasingly digitized economy.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Mayura Kathir
Mayura Kathirhttps://gbhackers.com/
Mayura Kathir is a cybersecurity reporter at GBHackers News, covering daily incidents including data breaches, malware attacks, cybercrime, vulnerabilities, zero-day exploits, and more.

Latest articles

Auth0-PHP Vulnerability Enables Unauthorized Access for Attackers

Critical security vulnerability has been discovered in the Auth0-PHP SDK that could potentially allow...

Active Exploitation of Ivanti EPMM Zero-Day Vulnerability in the Wild

Security researchers at The Shadowserver Foundation have identified active exploitation attempts targeting a critical...

Hacker Arrested for Taking Over SEC Social Media to Spread False Bitcoin News

Alabama man has been sentenced to 14 months in prison for orchestrating a sophisticated...

Investigating Cobalt Strike Beacons Using Shodan: A Researcher’s Guide

Security researcher has revealed a robust method for gathering threat intelligence on Cobalt Strike...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Auth0-PHP Vulnerability Enables Unauthorized Access for Attackers

Critical security vulnerability has been discovered in the Auth0-PHP SDK that could potentially allow...

Active Exploitation of Ivanti EPMM Zero-Day Vulnerability in the Wild

Security researchers at The Shadowserver Foundation have identified active exploitation attempts targeting a critical...

Hacker Arrested for Taking Over SEC Social Media to Spread False Bitcoin News

Alabama man has been sentenced to 14 months in prison for orchestrating a sophisticated...