
The effects of cyber attacks against co-op may be more harmful than ever, when clear hackers proud of the company’s huge quantities, including customer information to steal huge amounts of data.
“Dragonforce” hackers contacted BBCSharing screenshots of their communication with the company, where they claim to steal “customer databases, and cum-up member card data”.
Cum-up later appeared to confirm the theft, said in a statement BlappingCopper“As a result of the ongoing forensic investigation, now we know that hackers were able to use and extract data from one of our systems. ,
Co-up customer data stolen
“Accessed data included information related to a significant number of our current and previous members,” the statement of the co-op continued.
“This data includes names and contact details such as individual data of co-up group members, and it does not include members’ passwords, banks or credit card details, information related to any member or customer products or services.”
In an attempt to prove yourself, BBC Dragonforce shared databases including user names and passwords of all co-up employees, as well as a sample of 10,000 customer data including co-up membership card number, name, home addresses, emails and phone numbers.
Hackers say that more than 20 million people have registered, or registered in the past, with the award schedule of the co-op, which means the limit of affected users can be very large.
Dragonforce stated that he contacted the co-opp head and other officials through Microsoft teams, sharing screenshots of forcible recovery messages with the BBC.
The co-op told the employees that they maintain their cameras using Microsoft teams for meetings, as well as not to record or transfer the call, and to verify that all participants were real co-ope employees-suggested that hackers were actually able to reach internal systems.
There are more than 2,500 supermarkets as well as 800 funeral homes and an insurance business in the co-op, and about 70,000 employees are employed across the UK.
The attack on the co-op was the third in several incidents to influence Britain’s leading retailers, with Marx and Spencer and Herods also a hit in recent times.
Dragonforce told BBC He was also responsible for other attacks, but apparently did not share any evidence to prove it, and refused to expand.
How can I be safe?
Although it is still not known how accurate the claims of dragonforce are, co-up customers should be cautious to be on the safe side in the next few days, and their information has been affected if their information to overtake any result.
In such an event where it is not clear whether, if any, the data is affected – the first thing is that your password connected to your co -up account is to change, as well as any other sites with the same credentials – we have placed a guide together to ensure how you are safe as possible.
Next, and perhaps the most important step, is vigilance. With your name and email address, a criminal can send sophisticated social engineering attacks, aimed at handing over more information to you, or inadvertently to trick to download malware.
Ensure that you do dual examination of any unexpected communication and email address – especially against valid email addresses (these can be found on Google).
Especially beware of any email that asks you to enter any information, click on a link or scan the QR code. Fishing attacks using QR code are becoming more common, and are more dangerous than ever, so make sure that whatever you scan are already verified.
If a criminal emails you, it will be most likely. First, the email knows that comes from communication – if it is instead of G00gel or M1Crosoft is instead of their legitimate address, just remove the email. If you get an unexpected text, email, or phone call from anyone who claims to be a “friend”, then by a number or address you recognize, especially a number that tells you to sign in, send money, buy a gift card, to be very suspicious.

