
Co-op Cyber Attack: £206m Cost, Data Breach & Updates
When 6.5 million Co-op members woke up to news their personal details had been stolen, it marked one of the most significant retail data breaches in recent UK history. The attack exposed names, addresses, phone numbers, and dates of birth belonging to members—though passwords and bank details remained secure.
Sales loss: £206m · Profit hit: £80m · Members affected: 6.5 million · Arrests made: 4 · Attack date: April 2024
Quick snapshot
- Malicious cyber-attack confirmed by Co-op (Security Affairs)
- £206m sales loss, £80m profit impact (Security Affairs)
- 4 individuals arrested by UK NCA (Security Affairs)
- Whether DragonForce hackers operated alone or had accomplices beyond the four arrested
- Full timeline of data exfiltration before detection
- Precise amount Co-op will ultimately pay in GDPR compensation claims
- April 2024: Attack occurs; Co-op disconnects networks to avoid ransomware lockdown
- May 2024: DragonForce contacts BBC claiming responsibility; provides stolen data proof
- July 2024: NCA arrests four suspects aged 17–20 across London and West Midlands
- Ongoing class-action lawsuits seek compensation for affected members
- ICO regulatory investigation may result in £15–20 million fine
- Co-op faces potential £325 million exposure if all 6.5 million members claim GDPR compensation
Key figures from the incident provide a financial snapshot of the breach’s scale.
| Label | Value |
|---|---|
| Incident Date | April 2024 |
| Data Affected | 6.5 million members |
| Sales Loss | £206m |
| Profit Impact | £80m |
| Arrests | 4 by NCA |
| Targets | Co-op, M&S, Harrods |
Has Co-op been hacked?
Yes. Co-op suffered a malicious cyber-attack in April 2024 that compromised data belonging to 6.5 million current and past members. The breach exposed names, addresses, email addresses, phone numbers, membership details, and dates of birth. Co-op initially stated there was “no evidence that customer data was compromised,” but later confirmed threat actors had accessed member information when DragonForce ransomware group contacted the BBC in May 2024 with proof of the stolen data.
Attack details
DragonForce ransomware-as-a-service was used to compromise Microsoft Teams and Windows Active Directory, according to cybersecurity analysis from The Small Business Cybersecurity Guy. Hackers shared screenshots of their first extortion message via Microsoft Teams on 25 April 2024. Co-op avoided a full ransomware lockdown by immediately disconnecting its networks—a move that limited encryption damage but didn’t prevent data theft.
Data stolen
The stolen information included names, addresses, email addresses, phone numbers, membership details, and dates of birth, according to Security Affairs. Critically, passwords, bank details, credit card details, and transaction information were not extracted. DragonForce claimed to have private information of 20 million people who signed up to Co-op’s membership scheme, though Co-op confirmed the actual breach affected 6.5 million members. The same threat actors also claimed responsibility for the M&S attack and told the BBC they attempted to hack Harrods.
Official confirmation
Co-op officially confirmed the breach in July 2024 after weeks of initially declaring there was “no evidence that customer data was compromised.” A Co-op spokesperson promised ongoing updates through their dedicated cyber incident page. The Cyber Monitoring Centre subsequently labeled the attacks on M&S and Co-op as a Category 2 systemic event in June 2024, estimating combined losses between £270 million and £440 million.
The gap between Co-op’s initial denial and eventual confirmation highlights a common corporate dilemma: balancing public reassurance against incomplete incident assessments. Members who received the initial “no evidence” message may have waited months before understanding their data was at risk.
What did the Co-op cyber attack cost?
The financial toll has been substantial and multi-layered. Co-op reported £206 million in lost sales and an £80 million hit to profits, with direct incident costs totaling £20 million for IT restoration, forensic investigation, and incident response. The retailer offered £10 discount vouchers to all 6.5 million affected members, which could reach £65 million if every member claimed. Sales declined 2% over the 12 weeks following the incident.
Sales impact
Total sales impact reached £206 million (approximately $275 million USD), with a 2% decline over the 12 weeks post-incident, according to Security Affairs. Co-op’s cost per affected customer was £12, remarkably lower than comparable breaches—TalkTalk’s 2015 breach cost £382–489 per customer, while Tesco Bank paid £525 per affected account in 2016.
Profit loss
The £80 million earnings impact figure was confirmed by Co-op in September 2024. Direct incident costs added another £20 million for IT restoration, forensic investigation, and incident response. Co-op did not have cyber insurance coverage for ransomware attacks, leaving the company to absorb these costs directly.
Broader effects
Industry analysts estimate potential ICO (Information Commissioner’s Office) fines of £15–20 million based on breach scale and precedents. The ICO can fine up to £17.5 million or 4% of worldwide turnover, whichever is higher. Multiple class-action lawsuits are currently in progress against Co-op, and at the lower end of GDPR compensation (£50 per person), Co-op faces potential £325 million in member compensation exposure. Co-op’s final bill could reach £400–500 million once all costs, compensation, and fines are settled.
Co-op’s £12 cost per affected customer looks efficient compared to past UK breaches—but that figure excludes the massive ClassAction lawsuit exposure and potential ICO fine that could add hundreds of millions more to the final bill.
Is the Co-op back to normal after a cyber attack?
Co-op announced a return to normal trading following the cyber-attack, with the retailer restoring systems and resuming regular operations. The company credited colleagues for their response during the incident and committed to ongoing updates through official channels. However, the legal and financial fallout continues, with class-action lawsuits and regulatory investigations still pending.
Recovery timeline
The path to recovery involved immediate network disconnection to prevent ransomware spread, followed by weeks of system restoration and forensic investigation. Direct incident costs totaled £20 million for IT restoration, forensic investigation, and incident response. The UK National Cyber Security Centre classified the attacks alongside the M&S breach as a coordinated campaign by the DragonForce ransomware group.
Return to trading
Co-op confirmed return to normal trading and committed to providing regular updates through their dedicated cyber incident page. A Co-op spokesperson stated the company would continue updating affected members as more information became available. The retailer also offered £10 discount vouchers to all 6.5 million affected members as a goodwill gesture, though this required a minimum £40 spend to redeem.
Ongoing updates
The recovery narrative remains incomplete. Class-action lawsuits continue to work through courts, the ICO investigation proceeds, and the four arrested suspects aged 17–20 face charges including Computer Misuse Act offences, blackmail, money laundering, and participation in organized crime. Electronic devices were seized from all suspects for digital forensic analysis.
Can I claim for Co-op data breach?
Yes—if you were a Co-op member whose data was compromised, you may be eligible for compensation under UK GDPR and data protection law. Multiple class-action lawsuits are already in progress, and individual claims for data breach compensation typically range from £25–£150 per person for basic breaches, according to Legal Expert. To pursue a claim, you must demonstrate that failings by the data controller (Co-op) caused the breach.
Eligibility check
If you were a current or past Co-op member at the time of the April 2024 breach, your personal data was likely exposed. Co-op confirmed that threat actors accessed data belonging to current and past members. At the lower end of GDPR compensation (£50 per person), Co-op faces potential £325 million in member compensation exposure if all 6.5 million members claim.
Compensation process
Data breach compensation can include material damage (financial losses) and non-material damage (psychiatric injuries). Under Legal Expert guidance, severe psychiatric injury compensation ranges from £54,830 to £115,730 under Judicial College Guidelines. Multiple law firms are already pursuing ClassAction lawsuits against Co-op on behalf of affected members, with no-win no-fee arrangements available.
GDPR claims
Under UK GDPR, you have the right to claim compensation if you suffered harm due to a data breach caused by the data controller’s failures. Co-op initially told members there was “no evidence” their data was compromised—later proven incorrect—which may strengthen arguments around delayed notification and compounded distress. Compensation can include moderate PTSD claims ranging from £8,180 to £23,150, with less severe cases receiving £3,950 to £8,180.
Fraudsters are already exploiting the breach. Members should verify all communications claiming to be from Co-op or legal firms—scammers are using phishing emails and fake claim sites targeting people worried their data was stolen.
What to do after Co-op cyber attack?
If you were a Co-op member, take immediate steps to protect yourself: check whether your data was exposed, monitor for suspicious activity, and be alert to phishing attempts. Consider joining a compensation claim through a reputable legal service, but verify the firm is legitimate before sharing any personal information.
Check if affected
Co-op has notified affected members directly. If you received a notification from Co-op about the breach, your data was likely among the stolen information. If you’re unsure whether you were affected, monitor your email for communications from Co-op’s official channels. The retailer committed to updating members through their cyber incident page.
Signs of hack
Watch for: unexpected passwords or security alerts on accounts linked to your Co-op membership details; phishing emails using your name, address, or phone number; unfamiliar login attempts on accounts using your email; and any suspicious financial activity. While passwords and bank details were not stolen in this breach, scammers may use the personal information to craft convincing phishing attempts.
Next steps
Change passwords on accounts using the same email or phone number exposed in the breach. Enable two-factor authentication where available. Document any suspicious contacts for potential legal evidence. Consider joining an established ClassAction lawsuit rather than filing individually—group claims reduce legal costs and increase collective bargaining power. Report phishing attempts to the National Cyber Security Centre’s reporting service.
How to check if your data was breached and take action
- Review your inbox: Look for official Co-op communications about the cyber incident. Check spam folders for notifications that may have been filtered.
- Monitor accounts: Watch bank statements and online accounts linked to your Co-op membership details for the next 12 months.
- Report phishing: Forward suspicious emails claiming to be from Co-op to NCSC (National Cyber Security Centre) and your email provider.
- Consider legal action: Research reputable ClassAction law firms handling the Co-op breach case. Verify their credentials through the Solicitors Regulation Authority before signing any agreements.
- Strengthen security: Update passwords on related accounts and enable two-factor authentication wherever possible.
Timeline of events
The Co-op cyber attack unfolded over several months, with key developments from initial breach through law enforcement action.
| Date | Event |
|---|---|
| April 2024 | Cyber-attack occurs on Co-op systems; network disconnection prevents ransomware lockdown |
| May 2024 | DragonForce contacts BBC claiming responsibility; provides proof of stolen data from Co-op |
| July 2024 | Co-op reveals 6.5 million members data stolen; NCA arrests four suspects aged 17–20 |
| September 2024 | Co-op announces financial costs: £206m sales loss, £80m profit impact |
What’s confirmed and what’s still unclear
Confirmed facts
- Attack in April 2024 confirmed malicious
- 6.5 million members’ data stolen
- Financial figures from Co-op: £206m sales, £80m profits
- Four arrests by UK NCA in July 2024
- DragonForce ransomware group responsible
- M&S and Harrods also targeted by same group
What’s unclear
- Whether the four arrested individuals acted alone or coordinated with others
- Full extent of data exfiltration timeline before detection
- How Co-op’s security systems were penetrated initially
- Final amount Co-op will pay in compensation settlements
- Whether additional retailers were targeted beyond public knowledge
What experts are saying
The four arrested individuals faced charges of Computer Misuse Act offences, blackmail, money laundering, and participation in organized crime. Electronic devices were seized from all four suspects for digital forensic analysis. One suspect is Latvian, with arrests occurring in London and West Midlands.— Security Affairs (Cybersecurity news outlet)
Co-op’s cost per affected customer was £12, compared to TalkTalk’s 2015 breach at £382–489 per customer. This relatively low per-customer cost reflects Co-op’s quick network disconnection that prevented full ransomware encryption.— The Small Business Cybersecurity Guy (Cybersecurity industry analyst)
The Co-op breach reveals a troubling reality for UK retailers: even well-resourced organizations remain vulnerable to sophisticated ransomware groups. DragonForce’s ability to simultaneously target Co-op, M&S, and attempt Harrods demonstrates the coordinated nature of modern cyber threats. The contrast between Co-op’s swift technical response (disconnecting networks within hours) and its delayed public acknowledgment (weeks of “no evidence” statements) illustrates how operational security and corporate communication don’t always align.
For UK consumers, the lesson is structural rather than personal: no amount of password hygiene protects you when the organization holding your data is breached. The ClassAction route offers collective recourse, but the legal process spans years—meaning affected members face immediate fraud risk while waiting for resolution.
Related reading: Co-op Store Closures Threaten 300 Southern Outlets · New Digital ID UK: Mandatory Plans Dropped to Voluntary
The Co-op cyber attack, costing £206m in sales and breaching 6.5m members’ data, is tracked closely in this 2025 timeline and updates amid arrests and recovery efforts.
Frequently asked questions
How much did Co-op cyber attack cost?
Co-op reported £206 million in lost sales and an £80 million hit to profits. Direct incident costs added another £20 million for IT restoration and forensic investigation. With potential ICO fines of £15–20 million and ClassAction compensation exposure of up to £325 million, the final bill could reach £400–500 million.
Was Co-op cyber attack linked to other retailers?
Yes. DragonForce ransomware group claimed responsibility for attacks on Co-op and M&S, and told the BBC they attempted to hack Harrods. The Cyber Monitoring Centre classified these as a Category 2 systemic event in June 2024, estimating combined losses between £270 million and £440 million.
What is the average payout for a data breach?
Under GDPR, individual claims for data breach compensation typically range from £25–£150 per person for basic breaches. At £50 per person for 6.5 million affected Co-op members, potential exposure is £325 million. Psychiatric injury claims can be substantially higher—severe PTSD compensation ranges from £59,860 to £100,670 under Judicial College Guidelines.
How can I tell if I was part of a data breach?
Co-op has directly notified affected members. Check your email (including spam folders) for official Co-op communications about the cyber incident. If you received a notification, your data was likely among the stolen information. You can also monitor your accounts for suspicious activity linked to your membership details.
What are the signs your computer has been hacked?
Watch for: unexpected password reset emails; unknown login notifications; slow performance or unfamiliar programs running; new toolbar or browser extensions you didn’t install; ransom messages demanding payment; and unfamiliar transactions in bank statements. In this breach, passwords and bank details were not stolen, but scammers may use personal information for phishing.
Will Co-op survive a cyber attack?
Co-op announced return to normal trading and continues operating. However, the financial impact is significant—£80 million profit hit plus potential fines and compensation claims that could reach £400–500 million. The retailer has no cyber insurance for ransomware attacks, meaning costs are absorbed directly. Whether long-term brand damage affects membership numbers remains to be seen.
What is the latest update on Co-op cyber attack?
Four individuals aged 17–20 were arrested by the UK NCA in July 2024 in connection with the cyberattacks. They face charges including Computer Misuse Act offences, blackmail, money laundering, and participation in organized crime. Electronic devices were seized for forensic analysis. ClassAction lawsuits continue through courts, and the ICO investigation remains ongoing.