The chief executive of the UK's The Co-op Group, Shirine Khoury-Haq, has resigned following a year of immense financial and operational turmoil for the retailer. The company announced it had swung from a £45 million profit to a £126 million underlying pre-tax loss for the fiscal year ending January 3, 2026. A major contributing factor cited for this downturn was a significant cyber-attack that occurred in April 2025. The company quantified the financial fallout of the hack, stating it directly impacted revenues by £285 million and contributed £107 million to the profit loss. This event serves as a powerful real-world example of how a cybersecurity failure can have catastrophic consequences that extend to the very top of an organization's leadership.
While details of the April 2025 cyber-attack itself are sparse, its consequences were severe and publicly visible. The attack forced the company to shut down some of its core IT systems, leading to a cascade of operational problems, particularly in its large network of convenience stores.
This incident is a textbook case study for boards and executives on the tangible, bottom-line impact of cyber risk. The attack didn't just cause a data breach; it crippled core business operations, destroyed revenue, and ultimately contributed to a change in executive leadership.
The type of cyber-attack was not specified, but the described impact (system shutdowns, payment problems) is highly characteristic of a ransomware attack. In a typical retail ransomware scenario, attackers would gain access to the network, move laterally to compromise critical systems like point-of-sale (POS) and inventory management servers, and then encrypt them (T1486 - Data Encrypted for Impact).
The inability to process payments and manage stock would force store closures or severely limited operations, leading directly to the revenue losses described. The £107 million profit loss would include not only lost revenue but also the immense costs of incident response, system recovery, and business transformation efforts post-incident.
The CEO's resignation was also preceded by reports of a "toxic" workplace culture, but the financial devastation from the cyber-attack provides a clear and quantifiable business reason for a leadership reset.
The Co-op Group's experience offers several critical lessons for other businesses, particularly in the retail sector:
To prevent a similar fate, organizations must invest in foundational security controls, including robust backups (M1053 - Data Backup), network segmentation (M1030 - Network Segmentation), and a well-rehearsed incident response plan.
Maintaining and testing isolated, immutable backups is the most critical defense for recovering from a destructive attack like ransomware.
Properly segmenting the network could have limited the ransomware's spread, potentially protecting critical systems like payment processing or isolating individual stores from a central compromise.
A major cyber-attack hits The Co-op Group, causing significant operational disruption.
The Co-op Group's fiscal year ends, ultimately resulting in a £126 million pre-tax loss.
The Co-op Group announces the financial loss and the resignation of CEO Shirine Khoury-Haq.
Shirine Khoury-Haq's resignation becomes effective.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.