Co-op Company Cyber Security Posture

coop.co.uk

Owned by you. Right by you.

Co-op Company Details

Linkedin ID:

the-co-op-group

Employees number:

19686 employees

Number of followers:

211789.0

NAICS:

452

Industry Type:

Retail

Homepage:

coop.co.uk

IP Addresses:

Scan still pending

Company ID:

CO-_1787391

Scan Status:

In-progress

AI scoreCo-op Risk Score (AI oriented)

Between 800 and 900

This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

Ailogo

Co-op Company Scoring based on AI Models

Model NameDateDescriptionCurrent Score DifferenceScore
AVERAGE-Industry03-12-2025

This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers.

N/A

Between 800 and 900

Co-op Company Cyber Security News & History

Past Incidents
3
Attack Types
2
EntityTypeSeverityImpactSeenUrl IDDetailsView
Co-operative Group (Co-op)Cyber Attack8545/2025THE523050725Link
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: In late March 2024, the Co-operative Group disclosed that a sophisticated cyber-attack on its network had resulted in the unauthorized exfiltration of customer data from one of its back-office systems. According to an FAQ posted on the retailerโ€™s website, hackers were able to extract names, residential addresses, email addresses, phone numbers and dates of birth belonging to Co-op Group members. Although the attackers did not gain access to more sensitive information such as member passwords, payment card details or transaction histories, the incident nevertheless represents a significant breach of personal data. In response, the Co-op took multiple systems offline and engaged with the UKโ€™s National Cyber Security Centre (NCSC) to contain the incident and begin the recovery process. The breach has prompted the NCSC to issue fresh guidance to the wider retail sector, emphasizing the need for robust multi-factor authentication, vigilant monitoring of privileged accounts, and rapid assimilation of threat intelligence. Senior government figures have described the attack as a "wake-up call" for all organizations to treat cybersecurity as a strategic priority. The Co-op continues to investigate the full scope of the compromise and is notifying affected members while reinforcing its defenses to prevent future intrusions.

Co-opCyber Attack10056/2025THE301062325Link
Rankiteo Explanation :
Attack threatening the organization's existence

Description: Co-op experienced a cyberattack that resulted in significant financial losses and operational disruptions. The attack led to a reduction in daily spend by 11 percent for the first 30 days. The impact was particularly severe in remote and rural areas where Co-op acts as a sole provider. The financial hit was substantial, with lost sales, incident response, IT restoration, and legal counsel costs contributing to the overall impact. The attack had knock-on effects for suppliers, partners, and service providers.

Co-opRansomware10047/2025THE411071725Link
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: UK retailer Co-op experienced a significant cyberattack in April that resulted in the theft of personal data of 6.5 million members, causing food shortages in its grocery stores. The attackers successfully copied and accessed the contact information of all members, although no financial or transaction information was exposed. The breach was particularly harmful to the Co-op's members and employees. The CEO, Shirine Khoury-Haq, confirmed the attack and expressed her regret, emphasizing the personal impact on the affected individuals. The attack involved the DragonForce ransomware, and the breach initially occurred through a social engineering attack that allowed threat actors to reset an employee's password and spread to other devices.

Co-op Company Subsidiaries

SubsidiaryImage

Owned by you. Right by you.

Loading...

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=the-co-op-group' -H 'apikey: YOUR_API_KEY_HERE'
newsone

Co-op Cyber Security News

2025-05-01T07:00:00.000Z
Inside The Co-opโ€™s Cyber Attack

After an attempted hack at the weekend, staff at the Co-op have been told they cannot access the company's IT systems.

2025-05-14T07:00:00.000Z
UK retailer Co-op restoring systems following major cyberattack

The company confirmed on May 2 that its attackers had gained access to certain member contact data, but no passwords or card information.

2025-05-01T07:00:00.000Z
Everything we know about the Co-op cyber attack so far

The Co-op has shut down parts of its IT system after an attempted cyber attack, just days after M&S battled a cyber incident.

2025-06-06T07:00:00.000Z
High-profile attacks on M&S and Co-op stress importance of cybersecurity

High-profile cyber attacks which crippled M&S and Co-op have been watched closely by the cybersecurity industry.

2025-04-30T07:00:00.000Z
Co-op is latest British retailer to be hit by cyber attack

Britain's Co-op Group (42TE.L) said on Wednesday hackers had attempted to break into its systems, the second high-profile cyber attack on a major UK retailerย ...

2025-02-05T08:00:00.000Z
Electric Co-ops Work to Strengthen Cyber Workforce, Tenn. CEO Tells Congress

Electric cooperatives are taking action to attract cyber experts to their rural communities to protect their systems from cyberattacks.

2025-05-05T07:00:00.000Z
Co-op admits data breach in cyberattack after DragonForce claims responsibility

None

2025-05-07T07:00:00.000Z
Co-op Cyberattack: Hackers Claim Massive Data Breach

A ransomware group calling itself DragonForce contacted the BBC with proof of a large-scale data breach, claiming they had exfiltrated sensitiveย ...

2025-06-16T07:00:00.000Z
M&S, Co-Op and Harrods got hit by a cyberattack: here's what retailers need to do to stop this

We saw three retail giants, Harrods, Marks & Spencer, and the Co-op, fall victim to cyberattacks, shaking consumer confidence and underlining a hard truth.

similarCompanies

Co-op Similar Companies

Pearle Europe

Pearle Europe is a leading optical retail company that started in November 1996 with the acquisition of Pearle Netherlands from the US based Pearle Vision Inc. Since 1996 the Group has entered new European markets almost every year through the acquisition of strong local retail formats. Pearle E

Charlotte-based Belk, Inc., a privately-owned department store, began when William Henry Belk opened his first store in 1888 with his brother, Dr. John Belk, joining as a partner. What started as two brothers in business has now grown into a legacy of selling great products at great prices, treating

Cencosud S.A.

Cencosud S.A. is a Chilean based multi-format retailer with operations in Argentina, Brazil, Chile, Colombia, Peru and a commercial office in China. Through its supermarket, home improvement, department stores, shopping centers and financial services divisions, the Company targets a wide range o

South Hill Designs

South Hill Designs is a lifestyle business for fun-loving people Two dads, five little girls, and the desire to make a difference... These were the seeds that made South Hill an astonishing success within one year of launching. South Hill is a home party company that offers beautiful personali

John Lewis Partnership

Working in Partnership for a happier world. Our Partnership is an ongoing experiment to find happier, more trusted ways of doing business, for the benefit of us all. We work together to create a successful business and a fairer, more sustainable future for Partners, customers, suppliers and communi

AP Eagers Limited

Eagers Automotive has a long and proud history in Australia operating within the automotive industry that extends for over 100 years. Eagers Automotive has shown resilience and innovation throughout the ever changing automotive landscape while being true to its heritage and has seen the company gro

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Co-op CyberSecurity History Information

How many cyber incidents has Co-op faced?

Total Incidents: According to Rankiteo, Co-op has faced 3 incidents in the past.

What types of cybersecurity incidents have occurred at Co-op?

Incident Types: The types of cybersecurity incidents that have occurred incidents Cyber Attack and Ransomware.

What was the total financial impact of these incidents on Co-op?

Total Financial Loss: The total financial loss from these incidents is estimated to be $270 million.

How does Co-op detect and respond to cybersecurity incidents?

Detection and Response: The company detects and responds to cybersecurity incidents through law enforcement notified with Yes and containment measures with Shut down several IT systems and communication strategy with Public apology by CEO and containment measures with Taking multiple systems offline, Engaging with the UKโ€™s National Cyber Security Centre (NCSC) and communication strategy with Notifying affected members.

Incident Details

Can you provide details on each incident?

Incident : Data Breach, Ransomware

Title: Co-op Cyberattack

Description: UK retailer Co-op has confirmed that personal data of 6.5 million members was stolen in the massive cyberattack in April that shut down systems and caused food shortages in its grocery stores.

Date Detected: 2023-04-22

Type: Data Breach, Ransomware

Attack Vector: Social Engineering, Password Reset

Vulnerability Exploited: Weak password policies

Threat Actor: Scattered Spider

Motivation: Financial, Data Theft

Incident : Cyberattack

Title: Cyberattacks on Major UK Retail Organizations

Description: Britain's Cyber Monitoring Centre (CMC) estimates the total cost of the cyberattacks that crippled major UK retail organizations recently could be in the region of ยฃ270-440 million ($362-591 million). The organization โ€“ which launched earlier this year and introduced standardized grading of cyberattacks โ€“ gave the criminals' digital intrusions of retail outlets across the country high marks, characterizing them as a category 2 systemic event.

Type: Cyberattack

Incident : Data Breach

Title: Co-operative Group Data Breach

Description: A sophisticated cyber-attack on the Co-operative Group's network resulted in the unauthorized exfiltration of customer data from one of its back-office systems. Hackers extracted names, residential addresses, email addresses, phone numbers, and dates of birth of Co-op Group members. No access to member passwords, payment card details, or transaction histories was gained.

Date Publicly Disclosed: March 2024

Type: Data Breach

What are the most common types of attacks the company has faced?

Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.

How does the company identify the attack vectors used in incidents?

Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Social engineering and password reset.

Impact of the Incidents

What was the impact of each incident?

Incident : Data Breach, Ransomware THE411071725

Data Compromised: Contact information of 6.5 million members

Systems Affected: IT systems, Windows domain

Downtime: Food shortages in grocery stores

Operational Impact: System shutdowns

Brand Reputation Impact: Significant

Identity Theft Risk: High

Payment Information Risk: None

Incident : Cyberattack THE301062325

Financial Loss: ยฃ270-440 million ($362-591 million)

Incident : Data Breach THE523050725

Data Compromised: names, residential addresses, email addresses, phone numbers, dates of birth

What is the average financial loss per incident?

Average Financial Loss: The average financial loss per incident is $90.00 million.

What types of data are most commonly compromised in incidents?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Contact information, names, residential addresses, email addresses, phone numbers and dates of birth.

Which entities were affected by each incident?

Incident : Data Breach, Ransomware THE411071725

Entity Type: Retailer

Industry: Retail

Location: United Kingdom

Size: Large

Customers Affected: 6.5 million

Incident : Cyberattack THE301062325

Entity Type: Retail

Industry: Retail

Location: UK

Incident : Cyberattack THE301062325

Entity Type: Retail

Industry: Retail

Location: UK

Incident : Cyberattack THE301062325

Entity Type: Retail

Industry: Retail

Location: UK

Incident : Data Breach THE523050725

Entity Type: Retailer

Industry: Retail

Response to the Incidents

What measures were taken in response to each incident?

Incident : Data Breach, Ransomware THE411071725

Law Enforcement Notified: Yes

Containment Measures: Shut down several IT systems

Communication Strategy: Public apology by CEO

Incident : Data Breach THE523050725

Containment Measures: Taking multiple systems offline, Engaging with the UKโ€™s National Cyber Security Centre (NCSC)

Communication Strategy: Notifying affected members

Data Breach Information

What type of data was compromised in each breach?

Incident : Data Breach, Ransomware THE411071725

Type of Data Compromised: Contact information

Number of Records Exposed: 6.5 million

Sensitivity of Data: High

Data Exfiltration: Yes

File Types Exposed: Windows NTDS.dit file

Personally Identifiable Information: Yes

Incident : Data Breach THE523050725

Type of Data Compromised: names, residential addresses, email addresses, phone numbers, dates of birth

Data Exfiltration: Yes

Personally Identifiable Information: Yes

How does the company handle incidents involving personally identifiable information (PII)?

Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through were Shut down several IT systems, Taking multiple systems offline and Engaging with the UKโ€™s National Cyber Security Centre (NCSC).

Ransomware Information

Was ransomware involved in any of the incidents?

Incident : Data Breach, Ransomware THE411071725

Ransomware Strain: DragonForce

Data Encryption: Unknown

Data Exfiltration: Yes

Lessons Learned and Recommendations

What recommendations were made to prevent future incidents?

Incident : Data Breach THE523050725

Recommendations: Robust multi-factor authentication, Vigilant monitoring of privileged accounts, Rapid assimilation of threat intelligence

What recommendations has the company implemented to improve cybersecurity?

Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Robust multi-factor authentication, Vigilant monitoring of privileged accounts, Rapid assimilation of threat intelligence.

References

Where can I find more information about each incident?

Incident : Data Breach, Ransomware THE411071725

Source: BBC Breakfast show

Incident : Data Breach, Ransomware THE411071725

Source: BleepingComputer

Incident : Cyberattack THE301062325

Source: Britain's Cyber Monitoring Centre (CMC)

Where can stakeholders find additional resources on cybersecurity best practices?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: BBC Breakfast show, and Source: BleepingComputer, and Source: Britain's Cyber Monitoring Centre (CMC).

Investigation Status

What is the current status of the investigation for each incident?

Incident : Data Breach, Ransomware THE411071725

Investigation Status: Ongoing

Incident : Data Breach THE523050725

Investigation Status: Ongoing

How does the company communicate the status of incident investigations to stakeholders?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through were Public apology by CEO and Notifying affected members.

Initial Access Broker

How did the initial access broker gain entry for each incident?

Incident : Data Breach, Ransomware THE411071725

Entry Point: Social engineering and password reset

High Value Targets: Windows NTDS.dit file

Data Sold on Dark Web: Windows NTDS.dit file

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident?

Incident : Data Breach, Ransomware THE411071725

Root Causes: Weak password policies, Social engineering vulnerabilities

Additional Questions

General Information

Who was the attacking group in the last incident?

Last Attacking Group: The attacking group in the last incident was an Scattered Spider.

Incident Details

What was the most recent incident detected?

Most Recent Incident Detected: The most recent incident detected was on 2023-04-22.

What was the most recent incident publicly disclosed?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on March 2024.

Impact of the Incidents

What was the highest financial loss from an incident?

Highest Financial Loss: The highest financial loss from an incident was ยฃ270-440 million ($362-591 million).

What was the most significant data compromised in an incident?

Most Significant Data Compromised: The most significant data compromised in an incident were Contact information of 6.5 million members, names, residential addresses, email addresses, phone numbers and dates of birth.

What was the most significant system affected in an incident?

Most Significant System Affected: The most significant system affected in an incident were IT systems, Windows domain.

Response to the Incidents

What containment measures were taken in the most recent incident?

Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were Shut down several IT systems, Taking multiple systems offline and Engaging with the UKโ€™s National Cyber Security Centre (NCSC).

Data Breach Information

What was the most sensitive data compromised in a breach?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Contact information of 6.5 million members, names, residential addresses, email addresses, phone numbers and dates of birth.

What was the number of records exposed in the most significant breach?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 6.5M.

Lessons Learned and Recommendations

What was the most significant recommendation implemented to improve cybersecurity?

Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Robust multi-factor authentication, Vigilant monitoring of privileged accounts, Rapid assimilation of threat intelligence.

References

What is the most recent source of information about an incident?

Most Recent Source: The most recent source of information about an incident are BBC Breakfast show, BleepingComputer and Britain's Cyber Monitoring Centre (CMC).

Investigation Status

What is the current status of the most recent investigation?

Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.

Initial Access Broker

What was the most recent entry point used by an initial access broker?

Most Recent Entry Point: The most recent entry point used by an initial access broker was an Social engineering and password reset.

What Do We Measure?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge