top of page

Investigation begins into Spar supermarket cyber attack

A possible supply chain cyber attack left more than 300 Spar supermarkets unable to process credit card payments.


The National Cyber Security Centre (NCSC) is investigating a security incident that has caused disruption at about 300 Spar stores in the north of England in a cyber attack that bears the hallmarks of a supply chain ransomware hit.


Based in the Netherlands, Spar operates a franchise model with more than 13,000 individual stores globally. A number of these franchises have been attacked by as yet unknown threat actors.


Among the victims is Lawrence Hunt & Co, which operates 25 stores in Lancashire. The firm described a “total IT outage affecting all our stores” which forced them to remain closed on Sunday, December 5. The franchisee later confirmed an outage “affecting tills, credit cards and back-office systems”.


Many other Spar operators have been posting further updates. Hull University Students’ Union spoke of a “security breach on the network system” that had forced it to shut its campus branch, while another store in Ribchester, Preston, informed customers of a “major and widespread IT failure”.


As of Monday, December 6, many branches were open, but were operating as cash-only businesses. Computer Weekly understands that incident responders were aiming to try to bring stores back online on Monday evening, but as of the morning of Tuesday, December 7, this work had been put back and many stores remained shut.




The attack appears to have originated from within the systems of Preston-based wholesaler and food distributor James Hall & Co, which supplies about 600 Spars across the region.


The firm’s website remained inoperable for some time, but in a statement circulated on social media, a spokesperson said: “James Hall & Company are currently aware of an online attack on its IT system. This has not affected all Spar stores across the north of England, but a number have been impacted over the past 24 hours and we are working to resolve this situation as quickly as possible.


“It is currently impacting stores’ ability to process card payments, meaning that a number of Spar stores are currently closed to shoppers or only taking cash payments.


“We apologise for the inconvenience this is causing our customers and we are working as quickly as possible to resolve the situation.”


Toby Lewis, global head of threat analysis at Darktrace, said the attack offered more proof - if it were needed - that organisations exist in a complex web of dependencies and are only ever as secure as their suppliers. “While people, services and technology can be outsourced, risk cannot,” he said.


“Reports of a major IT outage, including the website, payment processing and distribution logistics, indicate that this was likely to be ransomware - for which there is no quick recovery fix. If paid, the price of a ransom is typically a fraction of the total cost of the incident - and full recovery often takes months.”


Brooks Wallace, EMEA vice-president at Deep Instinct, said the timing of the cyber attack suggested it was carried out by threat actors motivated to extract the biggest possible concessions from their target.


“The Christmas period is usually the busiest time for most businesses, none more so than supermarkets,” said Wallace. “With the demand that supermarkets experience over the holiday season, if they are hit by a ransomware attack, they are naturally desperate to recover as quickly as possible.


“It is, therefore, a big red target for many threat actors who know that any ransom demand could be paid almost immediately.”



 

Reporting

Report all Fraud and Cybercrime to Action Fraud by calling 0300 123 2040 or online. Forward suspicious emails to report@phishing.gov.uk. Report SMS scams by forwarding the original message to 7726 (spells SPAM on the keypad).

 

The contents of blog posts on this website are provided for general information only and are not intended to replace specific professional advice relevant to your situation. The intention of East Midlands Cyber Resilience Centre (EMCRC) is to encourage cyber resilience by raising issues and disseminating information on the experiences and initiatives of others. Articles on the website cannot by their nature be comprehensive and may not reflect most recent legislation, practice, or application to your circumstances. EMCRC provides affordable services and Trusted Partners if you need specific support. For specific questions please contact us by email.

 

EMCRC does not accept any responsibility for any loss which may arise from reliance on information or materials published on this blog. EMCRC is not responsible for the content of external internet sites that link to this site or which are linked from it.

bottom of page