Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Report: 71% of tech leaders won’t hire devs without AI skills

      July 17, 2025

      Slack’s AI search now works across an organization’s entire knowledge base

      July 17, 2025

      In-House vs Outsourcing for React.js Development: Understand What Is Best for Your Enterprise

      July 17, 2025

      Tiny Screens, Big Impact: The Forgotten Art Of Developing Web Apps For Feature Phones

      July 16, 2025

      Too many open browser tabs? This is still my favorite solution – and has been for years

      July 17, 2025

      This new browser won’t monetize your every move – how to try it

      July 17, 2025

      Pokémon has partnered with one of the biggest PC gaming brands again, and you can actually buy these accessories — but do you even want to?

      July 17, 2025

      AMD’s budget Ryzen AI 5 330 processor will introduce a wave of ultra-affordable Copilot+ PCs with its mobile 50 TOPS NPU

      July 17, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The details of TC39’s last meeting

      July 17, 2025
      Recent

      The details of TC39’s last meeting

      July 17, 2025

      Notes Android App Using SQLite

      July 17, 2025

      How to Get Security Patches for Legacy Unsupported Node.js Versions

      July 17, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      KeySmith – SSH key management

      July 17, 2025
      Recent

      KeySmith – SSH key management

      July 17, 2025

      Pokémon has partnered with one of the biggest PC gaming brands again, and you can actually buy these accessories — but do you even want to?

      July 17, 2025

      AMD’s budget Ryzen AI 5 330 processor will introduce a wave of ultra-affordable Copilot+ PCs with its mobile 50 TOPS NPU

      July 17, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»All Co-op Members Hit in April Cyberattack, CEO Breaks Silence

    All Co-op Members Hit in April Cyberattack, CEO Breaks Silence

    July 17, 2025

    Co-op cyberattack

    Co-op has confirmed that the personal details of all 6.5 million of its members were stolen in a cyberattack earlier this year. For the first time since the Co-op cyberattack, Co-op’s CEO Shirine Khoury-Haq told BBC Breakfast that she was deeply sorry for what happened and how it affected both customers and staff.

    She said she was devastated that member information had been taken, and equally concerned about the toll the breach took on employees who worked to contain the attack.

    The cyberattack on Co-op, which occurred in April, compromised names, addresses, and contact details of members. While no financial or transactional data was accessed, Khoury-Haq acknowledged that the breach had caused concern among members and staff alike.

    She noted that although payment data was not affected in Co-op cyberattack, the exposure of personal information was still significant.

    Emotional Toll on Staff and CEO

    During her interview, Khoury-Haq revealed the personal impact of the Co-op cyberattack, especially after witnessing the pressure and urgency faced by the company’s IT team.

    “Early on I met with our IT staff and they were in the midst of it. I will never forget the looks on their faces, trying to fight off these criminals,” she said. While the hackers were removed from Co-op’s systems, their digital footprints remained, allowing the company to monitor all activities and report them to the authorities.

    “We know a lot of that information is out there anyway, but people will be worried and all members should be concerned.”

    The Co-op CEO emphasized that the membership structure of the organization, where members share in the company’s profits, made the attack especially personal. “It hurt my members, they took their data and it hurt our customers and that I do take personally,” she said.

    Arrests Made, Suspects Out on Bail

    The cyberattack on Co-op was one of several coordinated attacks also targeting Marks & Spencer (M&S) and Harrods earlier this year. On July 10, 2025, the UK’s National Crime Agency (NCA) announced the arrest of four individuals suspected of orchestrating these cyberattacks.

    The suspects include:

    • A 17-year-old British male from the West Midlands
    • A 19-year-old Latvian male, also from the West Midlands
    • A 19-year-old British male from London
    • A 20-year-old British female from Staffordshire

    All four were arrested at their home addresses on suspicion of blackmail, money laundering, offenses under the Computer Misuse Act, and participating in the activities of an organized crime group.

    They have since been released on bail as investigations continue. Police also seized various electronic devices from their homes as part of the evidence collection process.

    Ongoing Recovery and New Cybersecurity Initiatives

    Co-op has not yet disclosed the financial impact of the data breach but confirmed that it is still working to restore back-end systems affected by the incident. In response to the Co-op cyberattack, the retailer is launching a partnership with The Hacking Games, a cybersecurity recruitment organization that seeks to steer young talent toward ethical hacking careers.

    As part of this initiative, Co-op is planning a pilot program with the Co-op Academies Trust, which oversees 38 schools across England, aiming to build interest and skillsets in cybersecurity at an early age.

    Timeline and Scope of the Co-op Cyberattack

    The Co-op cyberattack was first acknowledged by the company on April 30, when the company reported a attack affecting its call center and back-office operations. However, within days, the full extent of the incident became clear.

    Co-op later confirmed that hackers had gained access to information related to both current and former members. Reports indicate that the company managed to prevent further damage by quickly disconnecting internet access from internal networks, thereby stopping the hackers from deploying ransomware that could have escalated the disruption.

    LVMH Hit by Multiple Cyberattacks

    The Co-op incident is part of a growing trend in cyberattacks against well-known brands. According to The Cyber Express, luxury retailer Louis Vuitton, under parent company LVMH, has also suffered repeated cyberattacks in recent months.

    The most recent LVMH cyberattack occurred on July 2, 2025, following earlier breaches at Christian Dior Couture and Louis Vuitton Korea. In each case, personal data such as names, contact details, and purchase histories were accessed. However, LVMH stated that no financial or payment data was compromised.

    “Louis Vuitton recently discovered an unauthorized party had accessed some of the data it holds for its clients. We immediately began taking steps to investigate and contain this incident, supported by leading cybersecurity experts,” a company spokesperson told The Cyber Express.

    The company has since notified the UK Information Commissioner’s Office and is contacting affected customers in compliance with data protection laws.

    Conclusion

    The back-to-back attacks on Co-op, M&S, Harrods, and LVMH underline the increasing frequency and impact of cyber threats across sectors. With sensitive data often targeted, even when financial information remains secure, businesses are being forced to reassess their security postures.

    Co-op’s decision to engage with cybersecurity education initiatives signals a forward-looking approach that goes beyond damage control. It reflects a shift towards preparing the next generation to work on the right side of digital defense.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleBelk Suffers Major Data Breach; Law Firm Investigates Class Action
    Next Article United Australia Party Confirms Major Ransomware Attack and Data Breach

    Related Posts

    Machine Learning

    How to Evaluate Jailbreak Methods: A Case Study with the StrongREJECT Benchmark

    July 17, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-6391 – Brocade ASCG Log File Exposed JWT Vulnerability

    July 17, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Linux Considers Dropping Support for Ancient i486 and i586 CPUs

    Security

    Rilasciato IceWM 3.8: Gestore di Finestre per il Sistema X

    Linux

    CodeSOD: Recasting the Team

    News & Updates

    CVE-2023-28908 – Volkswagen MIB3 Bluetooth Integer Overflow Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    CVE-2025-5130 – Tmall Demo Unrestricted File Upload Vulnerability

    May 24, 2025

    CVE ID : CVE-2025-5130

    Published : May 24, 2025, 8:15 p.m. | 39 minutes ago

    Description : A vulnerability was found in Tmall Demo up to 20250505. It has been classified as critical. This affects the function uploadProductImage of the file tmall/admin/uploadProductImage. The manipulation of the argument File leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The vendor was contacted early about this disclosure but did not respond in any way.

    Severity: 4.7 | MEDIUM

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    CTEM vs ASM vs Vulnerability Management: What Security Leaders Need to Know in 2025

    July 17, 2025

    CVE-2025-1985 – Cisco Web-UI Cross-Site Scripting (XSS) Vulnerability

    May 26, 2025

    Big Changes to COPPA: How the FTC’s New Rule Impacts Children’s Online Privacy

    April 28, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.