Cyber attack leaves 20 million at risk 

A cyber attack on a co-op, leaving 20 million customers at risk, is a headline that makes your stomach drop. This week, the United Kingdom Co-op Group confirmed that a criminal group known as DragonForce infiltrated its security systems,

A cyber attack on a co-op, leaving 20 million customers at risk, is a headline that makes your stomach drop. This week, the United Kingdom Co-op Group confirmed that a criminal group known as DragonForce infiltrated its security systems, stealing customer and employee data, including names, email addresses, phone numbers, and possibly more.  Scattered Spider, another group believed to be responsible, is being considered to have had some involvement. 

Cyber attacks started with hackers impersonating employees while contacting the retailers’ cybersecurity help desks. Reports allege that the hackers convinced the help desks to reset the impersonated employees’ passwords so they could gain access to the network. The reality is, the scheme worked.

What does a cyber attack mean for the consumer?

What does such a large hack mean for you, what’s at stake, and whether you can do anything about it? You might not suffer a loss immediately. But if someone fraudulent got your name, address, telephone number, and email address, they sell those details to scammers to be weaponized in various scams, from phishing emails that mimic legitimate businesses to phone calls that sound eerily convincing.  So what can you do?

Step 1: Assume Your Data Is Out ThereYour data cannot be “un-leaked. This doesn’t mean panic—it implies action. Whether or not you’ve received a notification from any of your contacts, it’s safest to assume your personal information is circulating.

Step 2: Change Your Passwords—Everywhere. If you use the same or similar passwords across different sites, now’s the time to fix that.

  • Use a password manager to generate strong, unique passwords.
  • Enable two-factor authentication (2FA) on all accounts
  • Avoid password reuse. Cyber attacks start checking those credentials on dozens of other sites if a hack reveals your email and password.

Step 3: Be Suspicious of Emails, Calls, and Texts. Hackers now have more data to make their phishing attempts convincing. Expect to see fraudulent emails that include your name or appear to come from other legitimate sources like your bank or mobile provider.

  • Never click links or download attachments from unexpected messages.
  • If in doubt, contact the organization directly using an official channel.

Step 4: Monitor Your Accounts and Credit. Keep a close eye on your bank and credit card transactions. Even small, odd charges can be a test by scammers to see if an account is active.

  • Set up account alerts so you’re notified of any transaction.
  • Use a credit monitoring service if you want real-time updates on any changes to your credit profile.

Expect attempts to rise

My Fraudster app can protect you and is the ultimate mobile app to consider if you’re tired of being bombarded by fraudulent messages and scams and want to take control of your digital security. The app is available for IOS and Android devices and is free to use. Users can customize their settings to receive push notifications, browse the latest frauds and scams, and access tips on protecting themselves.

Download Fraudster today to learn about the latest scams and fraudulent activities. With this app, you can take control of your personal information and finances and keep yourself safe from the threats of the digital age. For more information about Fraudster and its mission to fight fraud, visit its website at http://www.FraudsterApp.com

Terry Cutler

I’m Terry Cutler, the creator of Internet Safety University, an educational system helping to defend corporations and individuals against growing cyber threats. I’m a federal government-cleared cybersecurity expert (a Certified Ethical Hacker), and the founder of Cyology Labs, a first-line security defence firm headquartered in Montréal, Canada. In 2020, I wrote a bestselling book about the secrets of internet safety from the viewpoint of an ethical hacker. I’m a frequent contributor to National & Global media coverage about cyber-crime, spying, security failures, internet scams, and social network dangers families and individuals face daily.