DragonForce Ransomware Attack on Co-op's IT Networks
- Rescana
- May 5
- 2 min read

Detailed Report on the DragonForce Cyber Attack on Co-op
Introduction: The DragonForce cyber attack on Co-op has emerged as a significant data breach event involving the exfiltration of customer and employee data. This attack has been linked to a ransomware group known for using extortion tactics. The Co-op has confirmed the breach and is working with national security agencies to manage the fallout. This report compiles all the known details of the attack, the tactics employed by the attackers, and the potential implications for businesses and customers.
Incident Overview: The cyber attack on Co-op was carried out by a group identified as DragonForce. The attackers managed to infiltrate Co-op's IT networks, claiming to have accessed a substantial amount of customer and employee data, including names, addresses, emails, and phone numbers. They have also threatened to release this data unless a ransom is paid.
Details of the Breach: - The attackers contacted Co-op's head of cyber security via an internal Microsoft Teams chat, showcasing their access to the company's internal communications. - Screenshots of extortion messages were shared with the BBC, demonstrating the attackers' demands. - DragonForce claims to have accessed the private information of 20 million individuals signed up to Co-op's membership scheme. - The breach has prompted Co-op to implement immediate security measures, including verifying meeting participants and keeping cameras on during calls.
Exploitation in the Wild: The tactics employed by DragonForce include ransomware deployment and data exfiltration, fitting the pattern of early-stage attacks observed in similar incidents. The group operates as a ransomware cartel, allowing affiliates to use their malicious software for conducting attacks. The attack on Co-op is part of a broader campaign targeting major UK retailers, including M&S and Harrods.
Tactics and Techniques: - Initial Access: Exploitation of vulnerability in internal communication systems (e.g., Microsoft Teams). - Exfiltration: Stealing large volumes of customer and employee data. - Extortion: Using stolen data to demand ransom payments under threat of public release. - Affiliates Model: Offering their ransomware platform for use by other attackers.
References and Research Links: 1. BleepingComputer Report: Link 2. The Independent Article: Link 3. DragonForce Ransomware Analysis: Picus Security 4. Background on DragonForce Operations: SentinelOne Blog
Mitigation Strategies: - Enhance email and internal communication security to prevent unauthorized access. - Regularly update and patch systems to close vulnerabilities. - Implement comprehensive data encryption and backup strategies to minimize data loss risk. - Train employees on recognizing phishing and social engineering tactics used by attackers. - Establish a robust incident response plan to quickly address and mitigate any breaches.
Conclusion: The DragonForce attack on Co-op highlights the ongoing threat of ransomware groups exploiting vulnerabilities in organizational networks. Businesses must prioritize cybersecurity measures and maintain vigilance against such coordinated attacks, ensuring that sensitive data is protected and that rapid response mechanisms are in place to address breaches when they occur.