Advertisement

Starbucks, UK grocers impacted by ransomware attack on Blue Yonder

Listen to this article
0:00
Learn more. This feature uses an automated voice, which may result in occasional errors in pronunciation, tone, or sentiment.
This photograph shows the logo of US multinational company Starbucks on a building facade in Paris, on October 16, 2024. (Photo by Grégoire CAMPIONE / AFP)

A ransomware attack on supply chain management software provider Blue Yonder has impacted global operations at various companies in the United States and United Kingdom, affecting major retailers such as Starbucks and several UK-based supermarket chains. 

Starbucks has reported difficulties in processing payroll and managing employee schedules due to the incident, telling the Wall Street Journal that locations have resorted to manual calculations for employee pay. While the situation does not affect customer service, Starbucks assured its employees that they would receive their due compensation for all hours worked. 

The attack on Arizona-based Blue Yonder, which is a division of Japanese electronics conglomerate Panasonic, was identified this past weekend as a ransomware incident targeting its managed services hosted environment. The company, boasting a clientele of over 3,000 customers, is working alongside external cybersecurity experts to address the breach. Blue Yonder has yet to provide a timeline for when services might be fully restored.

Beyond Starbucks, the attack has affected several major UK supermarket chains, including Morrisons and Sainsbury’s. Morrisons told grocery trade publication The Grocer that its fresh and produce warehouse management systems were disrupted. Sainsbury’s acknowledged a temporary impact on its operations, though services have since been restored. 

Advertisement

While Blue Yonder has not detailed the full extent of the attack’s impact across its customer base, the breach underscores the significant risks posed by cybercriminals targeting critical supply chain infrastructures. Attacks like those targeting software used to power enterprise-level organizations – MoveIT, CDK, 3CX, Kaseya, among others — have become increasingly common as cybercriminals take advantage of lax cybersecurity practices. 

The identity of the ransomware perpetrators remains unknown, and it is unclear if any customer data has been compromised.

Greg Otto

Written by Greg Otto

Greg Otto is Editor-in-Chief of CyberScoop, overseeing all editorial content for the website. Greg has led cybersecurity coverage that has won various awards, including accolades from the Society of Professional Journalists and the American Society of Business Publication Editors. Prior to joining Scoop News Group, Greg worked for the Washington Business Journal, U.S. News & World Report and WTOP Radio. He has a degree in broadcast journalism from Temple University.

Latest Podcasts