TECHNOLOGY

KFC, Pizza Hut guardian shuts UK restaurants after cyber attack

A ransomware attack on Yum! Brands, the guardian organisation of restaurants in conjunction with KFC and Pizza Hut, used to be pressured to shut approximately 300 retail outlets within the UK following a ransomware attack by an unspecified community

Alex Scroxton

By

Published: 19 Jan 2023 14:32

Yum! Brands, the organisation within the encourage of iconic restaurant and mercurial meals franchises in conjunction with KFC, Pizza Hut and Taco Bell, used to be pressured to discontinuance approximately 300 retail outlets all over the UK on Wednesday 18 January following a ransomware attack by an as-but unspecified community.

The US-primarily based mostly restaurant operator talked about that on detecting the incident, it applied deliberate response protocols, deployed containment measures to forestall the malware spreading – in conjunction with taking particular methods offline – and applied enhanced monitoring for extra enlighten.

In a press starting up, it talked about it had moreover begun an investigation, engaged cyber safety forensics and notified guidelines enforcement within the US.

“Less than 300 restaurants within the UK had been closed for sooner or later, however all retail outlets are now operational,” talked about an organization spokesperson.

“The company is actively engaged in entirely restoring affected methods, which is anticipated to be largely total within the arrival days.

“Even supposing data used to be taken from the company’s network and an investigation is ongoing, at this stage there may maybe be rarely any evidence that customer databases had been stolen.

“While this incident caused non permanent disruption, the company is conscious of no other restaurant disruptions and doesn’t question this tournament to hold a cloth negative impact on its industry, operations or monetary outcomes,” they talked about.

Rapid7 senior vice-president and chief scientist Raj Samani commented: “Whilst it’s untimely to scrutinize the total extent of the ransomware attack, concentrating on the provision of methods is a tactic that has been extraordinarily in style among probability actors over the last couple of years.

“We noticed it last week with the attack on Royal Mail, and even supposing curiously Yum! Brands used to be in a position to in a position to rapidly get better operationally, corporations being closed and operations unavailable, in particular all over 300 retail outlets, can hold indispensable monetary and reputational impact.

“On a particular train, Yum! Brands confirmed there used to be no evidence customer databases had been stolen. On the other hand, from our bag study we know that other file classes are usually stolen by probability actors – for instance, finance and accounting recordsdata, which is included in 63% of ransomware data disclosures,” talked about Samani.

“Because the investigation continues, we would lend a hand the sharing of indicators of the attack such that it must lend a hand the defences of alternative organisations to mitigate future incidents concentrating on other corporations,” he added.

The Yum! Brands incident joins a rising checklist of ransomware victims to this point in 2023, demonstrating that there has been no let-up in attack volumes.

A pair of of the extra high-profile UK victims hold included Royal Mail, which is convalescing its global export products and services following a suspected LockBit attack, and The Guardian newspaper, which used to be hit fair correct sooner than Christmas and is still dealing with the impact a month on.

Other victims to be disclosed to this point this year encompass a need of UK faculties and universities, which had been collectively hit by the Vice Society ransomware operation, whereas last December’s attack on Rackspace, which disrupted hosted Exchange products and services for hundreds, used to be revealed this month to be the work of the Play ransomware community.

Read extra on Hackers and cybercrime prevention

Related Articles

Leave a Reply

Your email address will not be published.

Back to top button