Company Details
morrisonsjobs
34,033
321,786
43
morrisons.jobs
0
MOR_1839965
In-progress


Morrisons Vendor Cyber Rating & Cyber Score
morrisons.jobsOur team of friendly faces works as one to provide shopping trips and a career experience you won’t find anywhere else. Together we work the Morrisons way. Constantly looking to do things even better, we work in partnership with our communities, colleagues, suppliers and British farmers to provide our customers with the freshest food at great value for money. Our people ‘Make Morrisons’. Our team spirit really is hard to beat. At the top of our game in all kinds of roles, we work as one team in our stores, distribution centres, manufacturing sites and Head office. In return for looking after our customers, we look after our people with great perks, lots of career opportunities and the training and support everyone needs to be the best they can be.
Company Details
morrisonsjobs
34,033
321,786
43
morrisons.jobs
0
MOR_1839965
In-progress
Between 750 and 799

Morrisons Global Score (TPRM)XXXX

Description: UK Food Logistics Firm Hit by Ransomware, Disrupting Major Supermarket Supply Chains A ransomware attack on Peter Green Chilled, a key logistics provider for major UK supermarkets, has disrupted order processing for retailers including Tesco, Sainsbury’s, Asda, Waitrose, Co-op, Morrisons, M&S, and Aldi. The incident, which occurred last Wednesday, forced the Somerset-based company to suspend order handling on Thursday, though transport operations remained unaffected. Managing Director Tom Binks confirmed the attack in an email, stating that the firm was implementing workarounds to maintain deliveries while providing regular updates to clients. While existing schedules have largely held, concerns persist among suppliers of perishable goods over potential waste due to delays. This attack follows a recent surge in ransomware incidents targeting the UK retail sector, with Marks & Spencer, Co-op, and Harrods all experiencing disruptions in recent weeks. Phil Pluck, CEO of the Cold Chain Federation, noted a sharp rise in such attacks on food distribution networks, often unreported due to reputational risks. The cold chain sector’s tight timelines and high-volume perishable goods make it a lucrative target for cybercriminals. Security experts warn that supply chain vulnerabilities amplify the impact of such breaches. Richard Orange of Abnormal AI highlighted the risk of follow-on attacks, including vendor email compromise, where attackers impersonate suppliers to steal credentials or redirect payments. Meanwhile, Andy Norton of Armis reported that 41% of retailers have faced increased cyber threats in the past six months, with no signs of slowing. Peter Green Chilled has not yet provided further comment on the incident. A previous reference to Lidl as a client was retracted after the supermarket confirmed it no longer uses the firm’s services.
Description: Blue Yonder Hit by Ransomware Attack, Disrupting Supply Chain Operations for Major Retailers Blue Yonder, a leading supply chain management software provider acquired by Panasonic in 2021, confirmed its managed services environment was disrupted by a ransomware attack on Thursday. The Arizona-based company serves global grocers, retailers, and logistics firms, helping streamline operations for high-profile clients. The attack prompted Blue Yonder to engage external cybersecurity experts and deploy defensive and forensic measures to contain the breach and assess its scope. While the company is actively monitoring its Azure public cloud environment reporting no signs of further suspicious activity officials have not provided an estimated timeline for full restoration. Among those affected, U.K. grocery chain Morrisons confirmed the incident disrupted its warehouse management system for fresh food and produce. The retailer stated it is operating on backup systems while working to maintain customer deliveries nationwide. No group has claimed responsibility for the attack, and details on compromised data remain undisclosed. Blue Yonder has notified impacted customers and is providing ongoing updates as the investigation continues. The timing of the attack just days before the U.S. Thanksgiving holiday adds pressure on retailers, who rely on peak operational efficiency during this critical sales period. The incident follows a separate cyberattack earlier this month on Ahold Delhaize’s U.S. operations, though it remains unclear whether ransomware was involved in that case.
Description: Wm Morrison supermarket suffered a data breach incident in 2014 which exposed the 100,000 employees' personal information. The attackers stole information including bank account details and published it online and even sent on a disc to a newspaper. West Yorkshire Police investigated the incident and took preventive steps to enhance the security of its internal data security systems and as set up a helpline for its staff.


No incidents recorded for Morrisons in 2026.
No incidents recorded for Morrisons in 2026.
No incidents recorded for Morrisons in 2026.
Morrisons cyber incidents detection timeline including parent company and subsidiaries

Our team of friendly faces works as one to provide shopping trips and a career experience you won’t find anywhere else. Together we work the Morrisons way. Constantly looking to do things even better, we work in partnership with our communities, colleagues, suppliers and British farmers to provide our customers with the freshest food at great value for money. Our people ‘Make Morrisons’. Our team spirit really is hard to beat. At the top of our game in all kinds of roles, we work as one team in our stores, distribution centres, manufacturing sites and Head office. In return for looking after our customers, we look after our people with great perks, lots of career opportunities and the training and support everyone needs to be the best they can be.


For more than 85 years, Tractor Supply has been passionate about serving the needs of recreational farmers, ranchers, homeowners, gardeners, pet enthusiasts and all those who enjoy living Life Out Here. Tractor Supply is the largest rural lifestyle retailer in the U.S., ranking 296 on the Fortune 50

Türkiye’de perakende sektörünün lideri olan BİM Birleşik Mağazalar A.Ş., temel gıda ve tüketim malzemelerinin uygun fiyat ve yüksek kaliteyle tüketiciye ulaştırılması hedefiyle faaliyetlerine 1995 yılında 21 mağazayla başlamıştır. Yüksek indirim (hard-discount) modelinin Türkiye’deki ilk temsilcisi
Lowe’s Companies, Inc. (NYSE: LOW) is a FORTUNE® 50 home improvement company serving approximately 20 million customers a week in the United States. Lowe’s and its related businesses operate or service more than 2,200 home improvement and hardware stores and employ over 300,000 associates. Based in
It takes guts to start a business during the Great Depression. And it takes vision to keep it going. Our founder, Hendrik Meijer, opened Thrifty Acres in 1934. Nearly thirty years later, his son, Fred, pioneered the world's first-ever supercenter, laying the groundwork for what we are today: a mult
El Corte Inglés is a world leader in large department stores and a benchmark of Spanish distribution. With more than 70 years' experience, the Group has maintained from the outset a policy of customer service and an ongoing concern with adapting itself to suit the tastes and needs of society.

Reliance Digital is a Consumer Electronics, Durables, IT & Telecom retail arm of Reliance Retail Group with more than 1300+ stores across India. Reliance Digital seeks to fulfill the dream of every Indian, be it through its nationwide network of conveniently located stores or through its presenc

Advance Auto Parts, Inc. is a leading automotive aftermarket parts provider that serves both professional installers and do-it-yourself customers. As of October 5, 2024, Advance operated 4,781 stores primarily within the United States, with additional locations in Canada, Puerto Rico and the U.S. Vi
7-Eleven introduced the world to convenience. And in return, the world made us the #1 convenience retailer. It started with a simple idea – give customers what they want, when and where they want it. That was 1927. And what started on a single ice dock in Dallas, Texas, has since grown to more than

Boxer Superstores is one of Southern Africa’s fastest-growing discount supermarket chains, driven by a strong commitment to affordability, accessibility, and community. With operations across every province in South Africa and into the Kingdom of eSwatini, Boxer stands proudly as a full-service disc
.png)
Cap10 and Platinum Equity are among the parties which have expressed an interest in Escode, the software escrow and verification arm of NCC...
A young Staffordshire woman who was among four arrested for their suspected involvement in the damaging cyber attacks against Marks & Spencer, the Co-op and...
Distributor Peter Green Chilled, which supplies to supermarkets including Tesco, Sainsbury's and Aldi, told the BBC the cyber incident occurred last Wednesday...
Two of the UK's most recognised supermarkets – M&S and Co-op – have fallen victim to significant cyber attacks, disrupting operations, triggering consumer...
Check out the articles on this here website that caught your fancy last week, including Marks and Spencer, Shopify, OpenAI, Blue Yonder, RELEX Solutions,...
Luxury department store is forced to shut some systems but website and shops continue to operate.
UK supermarket group Co-op announced that cyber hackers were trying to break into its computer systems. This prompted the retailer to shut down parts of its IT...
Exclusive: In a letter seen by the Guardian, staff were told steps had been taken to keep systems safe.
The Co-op has shut down parts of its IT systems in response to hackers attempting to gain access to them.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Morrisons is http://www.morrisons.jobs.
According to Rankiteo, Morrisons’s AI-generated cybersecurity score is 778, reflecting their Fair security posture.
According to Rankiteo, Morrisons currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Morrisons has been affected by a supply chain cyber incident involving Peter Green Chilled, with the incident ID MARCALWAISAITOYTHEMORPET-TE1772023906.
According to Rankiteo, Morrisons is not certified under SOC 2 Type 1.
According to Rankiteo, Morrisons does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Morrisons is not listed as GDPR compliant.
According to Rankiteo, Morrisons does not currently maintain PCI DSS compliance.
According to Rankiteo, Morrisons is not compliant with HIPAA regulations.
According to Rankiteo,Morrisons is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Morrisons operates primarily in the Retail industry.
Morrisons employs approximately 34,033 people worldwide.
Morrisons presently has no subsidiaries across any sectors.
Morrisons’s official LinkedIn profile has approximately 321,786 followers.
Morrisons is classified under the NAICS code 43, which corresponds to Retail Trade.
No, Morrisons does not have a profile on Crunchbase.
Yes, Morrisons maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/morrisonsjobs.
As of April 02, 2026, Rankiteo reports that Morrisons has experienced 3 cybersecurity incidents.
Morrisons has an estimated 15,730 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack and Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an law enforcement notified with west yorkshire police, and remediation measures with enhance the security of its internal data security systems, and communication strategy with set up a helpline for its staff, and and third party assistance with external cybersecurity experts, and containment measures with defensive and forensic measures deployed, and recovery measures with actively monitoring azure public cloud environment, operating on backup systems, and communication strategy with notified impacted customers, providing ongoing updates, and enhanced monitoring with actively monitoring azure public cloud environment, and incident response plan activated with workarounds implemented to maintain deliveries, and containment measures with order processing suspended, and communication strategy with regular updates provided to clients..
Title: Wm Morrison Supermarket Data Breach
Description: Wm Morrison supermarket suffered a data breach incident in 2014 which exposed the 100,000 employees' personal information.
Date Detected: 2014
Type: Data Breach
Title: Blue Yonder Hit by Ransomware Attack, Disrupting Supply Chain Operations for Major Retailers
Description: Blue Yonder, a leading supply chain management software provider, confirmed its managed services environment was disrupted by a ransomware attack on Thursday. The attack impacted global grocers, retailers, and logistics firms, including U.K. grocery chain Morrisons, which experienced disruptions to its warehouse management system for fresh food and produce. The company engaged external cybersecurity experts and deployed defensive and forensic measures to contain the breach. No group has claimed responsibility, and details on compromised data remain undisclosed.
Date Detected: 2023-11-23
Type: Ransomware
Title: UK Food Logistics Firm Hit by Ransomware, Disrupting Major Supermarket Supply Chains
Description: A ransomware attack on Peter Green Chilled, a key logistics provider for major UK supermarkets, has disrupted order processing for retailers including Tesco, Sainsbury’s, Asda, Waitrose, Co-op, Morrisons, M&S, and Aldi. The incident forced the company to suspend order handling while maintaining transport operations. The attack follows a recent surge in ransomware incidents targeting the UK retail sector.
Date Detected: last Wednesday
Type: ransomware
Motivation: financial gain
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.

Data Compromised: Bank account details, Personal information

Systems Affected: Managed services environment, warehouse management system
Operational Impact: Disrupted supply chain operations for major retailers, including warehouse management for fresh food and produce

Systems Affected: order processing systems
Downtime: order handling suspended on Thursday
Operational Impact: disrupted order processing for major UK supermarkets
Brand Reputation Impact: potential reputational risk due to unreported incidents in the sector
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Information, Bank Account Details and .

Entity Name: Wm Morrison Supermarket
Entity Type: Retail
Industry: Supermarket
Size: 100,000 employees

Entity Name: Blue Yonder
Entity Type: Supply chain management software provider
Industry: Technology, Supply Chain, Logistics
Location: Arizona, USA
Customers Affected: Global grocers, retailers, and logistics firms

Entity Name: Morrisons
Entity Type: Grocery chain
Industry: Retail, Grocery
Location: United Kingdom
Customers Affected: Nationwide customers

Entity Name: Peter Green Chilled
Entity Type: logistics provider
Industry: food logistics / cold chain
Location: Somerset, UK
Customers Affected: Tesco, Sainsbury’s, Asda, Waitrose, Co-op, Morrisons, M&S, Aldi

Law Enforcement Notified: West Yorkshire Police,
Remediation Measures: enhance the security of its internal data security systems
Communication Strategy: set up a helpline for its staff

Incident Response Plan Activated: True
Third Party Assistance: External cybersecurity experts
Containment Measures: Defensive and forensic measures deployed
Recovery Measures: Actively monitoring Azure public cloud environment, operating on backup systems
Communication Strategy: Notified impacted customers, providing ongoing updates
Enhanced Monitoring: Actively monitoring Azure public cloud environment

Incident Response Plan Activated: workarounds implemented to maintain deliveries
Containment Measures: order processing suspended
Communication Strategy: regular updates provided to clients
Incident Response Plan: The company's incident response plan is described as workarounds implemented to maintain deliveries.
Third-Party Assistance: The company involves third-party assistance in incident response through External cybersecurity experts.

Type of Data Compromised: Personal information, Bank account details
Number of Records Exposed: 100,000
Data Exfiltration: published it onlinesent on a disc to a newspaper
Personally Identifiable Information: personal information
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: enhance the security of its internal data security systems, .
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by defensive and forensic measures deployed and order processing suspended.
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through Actively monitoring Azure public cloud environment, operating on backup systems.

Lessons Learned: Supply chain vulnerabilities amplify the impact of cyber breaches; follow-on attacks (e.g., vendor email compromise) are a risk; perishable goods sectors are lucrative targets due to tight timelines.

Recommendations: Enhance cybersecurity measures for supply chain partners; implement network segmentation; adopt adaptive behavioral WAF; use on-demand scrubbing services; monitor for follow-on attacks like vendor email compromise.
Key Lessons Learned: The key lessons learned from past incidents are Supply chain vulnerabilities amplify the impact of cyber breaches; follow-on attacks (e.g., vendor email compromise) are a risk; perishable goods sectors are lucrative targets due to tight timelines.
Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Enhance cybersecurity measures for supply chain partners; implement network segmentation; adopt adaptive behavioral WAF; use on-demand scrubbing services; monitor for follow-on attacks like vendor email compromise..

Source: Cyber Incident Description

Source: Article describing the incident
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Cyber Incident Description, and Source: Article describing the incident.

Investigation Status: Ongoing

Investigation Status: ongoing
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Set Up A Helpline For Its Staff, Notified impacted customers, providing ongoing updates and regular updates provided to clients.

Customer Advisories: Notified impacted customers, providing ongoing updates

Stakeholder Advisories: Regular updates provided to clients (supermarkets)
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Notified impacted customers, providing ongoing updates and Regular updates provided to clients (supermarkets).
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as External cybersecurity experts, Actively monitoring Azure public cloud environment.
Most Recent Incident Detected: The most recent incident detected was on 2014.
Most Significant Data Compromised: The most significant data compromised in an incident were bank account details, personal information and .
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was External cybersecurity experts.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were Defensive and forensic measures deployed and order processing suspended.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were bank account details and personal information.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 100.0K.
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Supply chain vulnerabilities amplify the impact of cyber breaches; follow-on attacks (e.g., vendor email compromise) are a risk; perishable goods sectors are lucrative targets due to tight timelines.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Enhance cybersecurity measures for supply chain partners; implement network segmentation; adopt adaptive behavioral WAF; use on-demand scrubbing services; monitor for follow-on attacks like vendor email compromise..
Most Recent Source: The most recent source of information about an incident are Article describing the incident and Cyber Incident Description.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Regular updates provided to clients (supermarkets), .
Most Recent Customer Advisory: The most recent customer advisory issued were an Notified impacted customers and providing ongoing updates.
.png)
A vulnerability was found in Nothings stb up to 1.26. Impacted is the function stbtt_InitFont_internal in the library stb_truetype.h of the component TTF File Handler. Performing a manipulation results in out-of-bounds read. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read in VS6ComFile!get_macro_mem_COM. Opening a crafted V7 file may lead to information disclosure from the affected product.
V-SFT versions 6.2.10.0 and prior contain a stack-based buffer overflow in VS6ComFile!CSaveData::_conv_AnimationItem. Opening a crafted V7 file may lead to arbitrary code execution on the affected product.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6MemInIF!set_temp_type_default. Opening a crafted V7 file may lead to information disclosure from the affected product.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6ComFile!load_link_inf. Opening a crafted V7 file may lead to information disclosure from the affected product.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.