Breaking

UK retail chain ‘The Works’ hit by a Cyberattack forcing it to shutdown stores

UK retail chain ‘The Works‘ announced that it has shutdown multiple stores after the firm was hit by a cyber attack that involved unauthorized access to its network. The company has 530 stores in the UK and Ireland, that is known for sale of books, stationery, art, toys, and craft materials with a yearly revenue of about $300 million.

However, the nature of the cyberattack is yet to be revealed with certain assumptions around interrupted replenishment deliveries, extended online order fulfillment times, and has affected the safety of payments.

The announcement doesn’t go into many details about the nature of the incident, but it appears to have interrupted replenishment deliveries, extended online order fulfillment times, and compromised the safety of payments.

The Works managing and handling the cyber incident

The Works has switched to external debit and credit payment processors to address the situation and has claimed the same to be safe. The company said the same on their notice of the cybersecurity incident.

“All debit and credit card payment data are processed securely outside the Group’s systems, via accredited third-party networks and, therefore, there is no risk that this payment data has been accessed improperly.”

The firm also added that the hackers haven’t accessed any of their client payment data as per their investigation of the incident so far. Since the investigations are only begun we can’t rule out the fact that the customer data could have been compromised.

Investigation done by the firms along with the forensic experts can revela further details on the state of the incident. According to The Works, the ongoing situation is “unlikely to have a material adverse impact on its forecasts or financial position”, confirming that there will be minimum hindrance on their normal operations.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, and Twitter.

You can reach out to us via Twitter/ Facebook or mail us at admin@thecybersecuritytimes.com for advertising requests.

Share the article with your friends
John Greenwood

He has been working with Cybersec and Infosec market for 12+ years now. Passionate about AI, Cybersecurity, Info security, Blockchain and Machine Learning. When he is not occupied with cybersecurity, he likes to go on bike rides!

Recent Posts

Top 9 Best Log Management Tools for 2025

Discover the best log management tools for efficient system management and monitoring. Learn about the…

6 months ago

Top 4 Remote Support Tools for 2025- Best Remote Support Solution

Taking remote of devices and managing them will make thing simple for IT admins. In…

6 months ago

Top 5 Best Unified Endpoint Management (UEM) Software for 2025

In 2024, the Unified Endpoint Management Software market will continue to evolve and here are…

6 months ago

Top 5 Threat Intelligence Tools For 2025

Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…

7 months ago

Top 5 Best Microsoft Intune Alternatives to Consider for 2025

Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…

8 months ago

Recast Software: Advanced Endpoint Management and Security Tools for IT Teams

Recast Software offers a suite of tools designed to enhance and simplify endpoint management in…

1 year ago