Co-op CEO Resigns as Cyber-Attack Fallout Leads to £126 Million Loss

Co-op Group CEO Steps Down After Major Cyber-Attack Contributes to £126M Loss

HIGH
March 26, 2026
4m read
CyberattackData BreachRansomware

Impact Scope

Affected Companies

The Co-op Group

Industries Affected

Retail

Geographic Impact

United Kingdom (national)

Related Entities

Other

The Co-op Group Shirine Khoury-Haq

Full Report

Executive Summary

The chief executive of the UK's The Co-op Group, Shirine Khoury-Haq, has resigned following a year of immense financial and operational turmoil for the retailer. The company announced it had swung from a £45 million profit to a £126 million underlying pre-tax loss for the fiscal year ending January 3, 2026. A major contributing factor cited for this downturn was a significant cyber-attack that occurred in April 2025. The company quantified the financial fallout of the hack, stating it directly impacted revenues by £285 million and contributed £107 million to the profit loss. This event serves as a powerful real-world example of how a cybersecurity failure can have catastrophic consequences that extend to the very top of an organization's leadership.


Incident and Business Impact

While details of the April 2025 cyber-attack itself are sparse, its consequences were severe and publicly visible. The attack forced the company to shut down some of its core IT systems, leading to a cascade of operational problems, particularly in its large network of convenience stores.

  • Operational Disruption: The IT shutdown led to payment processing issues and product shortages, directly impacting sales and the customer experience.
  • Financial Damage: The Co-op Group was unusually transparent about the financial cost, breaking it down as:
    • £285 million impact on revenues.
    • £107 million contribution to the overall profit loss.
  • Leadership Change: The CEO's departure, while officially a "personal decision," comes directly on the heels of these devastating financial results. In her statement, Khoury-Haq referenced the aftermath of the cyber-attack as a key factor in the company's need for a new long-term strategy, implying the incident was a pivotal event.

This incident is a textbook case study for boards and executives on the tangible, bottom-line impact of cyber risk. The attack didn't just cause a data breach; it crippled core business operations, destroyed revenue, and ultimately contributed to a change in executive leadership.


Threat Context

The type of cyber-attack was not specified, but the described impact (system shutdowns, payment problems) is highly characteristic of a ransomware attack. In a typical retail ransomware scenario, attackers would gain access to the network, move laterally to compromise critical systems like point-of-sale (POS) and inventory management servers, and then encrypt them (T1486 - Data Encrypted for Impact).

The inability to process payments and manage stock would force store closures or severely limited operations, leading directly to the revenue losses described. The £107 million profit loss would include not only lost revenue but also the immense costs of incident response, system recovery, and business transformation efforts post-incident.

The CEO's resignation was also preceded by reports of a "toxic" workplace culture, but the financial devastation from the cyber-attack provides a clear and quantifiable business reason for a leadership reset.


Lessons Learned for Other Organizations

The Co-op Group's experience offers several critical lessons for other businesses, particularly in the retail sector:

  1. Cyber Risk is Business Risk: This incident proves that a cyber-attack is not just an IT problem. It can be an existential threat to business operations, financial stability, and leadership continuity.
  2. Quantify the Impact: The Co-op's willingness to quantify the financial damage is rare and valuable. It provides a concrete example that other CISOs can use to justify security investments to their boards.
  3. Resilience is Key: The focus of cybersecurity must extend beyond prevention to include resilience—the ability to withstand and quickly recover from an attack. For a retailer, this means having robust, tested plans for operating stores and processing payments even if primary IT systems are unavailable.
  4. Accountability at the Top: The CEO's departure underscores that ultimate accountability for managing cyber risk rests with the executive leadership and the board of directors.

To prevent a similar fate, organizations must invest in foundational security controls, including robust backups (M1053 - Data Backup), network segmentation (M1030 - Network Segmentation), and a well-rehearsed incident response plan.

Timeline of Events

1
April 1, 2025
A major cyber-attack hits The Co-op Group, causing significant operational disruption.
2
January 3, 2026
The Co-op Group's fiscal year ends, ultimately resulting in a £126 million pre-tax loss.
3
March 26, 2026
The Co-op Group announces the financial loss and the resignation of CEO Shirine Khoury-Haq.
4
March 26, 2026
This article was published
5
March 29, 2026
Shirine Khoury-Haq's resignation becomes effective.

MITRE ATT&CK Mitigations

Maintaining and testing isolated, immutable backups is the most critical defense for recovering from a destructive attack like ransomware.

Properly segmenting the network could have limited the ransomware's spread, potentially protecting critical systems like payment processing or isolating individual stores from a central compromise.

Mapped D3FEND Techniques:

Sources & References

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

business impactfinancial lossretailCEOaccountabilitycase study

📢 Share This Article

Help others stay informed about cybersecurity threats