Security

Cyber-crime

Supply chain management vendor Blue Yonder succumbs to ransomware

And it looks like major UK retailers that rely on it are feeling the pinch


US-based supply chain SaaS vendor Blue Yonder has revealed a service disruption caused by ransomware, and its customers are reportedly struggling to get goods onto shelves as a result.

The vendor last week informed customers that on November 21 it "experienced disruptions to its managed services hosted environment, which was determined to be the result of a ransomware incident."

On November 23 the firm updated its post with news that "The Blue Yonder team is continuing to work around the clock, together with our external cyber security firms, to safely restore systems, resulting in steady progress."

But the next day it conceded that the work hadn't progressed to the point at which it was willing to forecast when the managed services environment would resume operations.

We've asked Blue Yonder to detail the incident, and it told us it's worked with external cyber security firms "to make progress in their recovery process" and "implemented several defensive and forensic protocols." But that's all we know for now.

Blue Yonder's customers, however, are reportedly suffering.

The Wall Street Journal reports that payroll and staff scheduling systems at "coffee" chain Starbucks are in strife as a result of the incident – but it remains capable of selling its wares.

UK Trade publication The Grocer reports that supply chains are kinked at UK retailers Morrisons and Sainsbury's.

Morrisons told the publication it's reverted to a backup process, "but the outage has caused the smooth flow of goods to our stores to be impacted." Sainsbury's has also reportedly fallen back on its Plan B for supply chain management.

CNN reports that Blue Yonder is working to ensure US-based customers aren't impacted.

The Register asked Blue Yonder for details on how it became infected, the data impacted in the incident, the identity of the attacker, and any ransom demand, but its only response was the generic PR reply above.

The incident highlights the potential for ransomware, or other systems failures, to disrupt vital supply chains – as happened when ransomware took out gas supplier Colonial Pipeline. Thankfully, this attack appears not to be making it hard to shop for Thanksgiving feasts in the US, and has come (hopefully) too far before Christmas to put that holiday's retail peak at risk. ®

Send us news
9 Comments

Ransomware scum blow holes in Cleo software patches, Cl0p (sort of) claims responsibility

But can you really take crims at their word?

Suspected LockBit dev, facing US extradition, 'did it for the money'

Dual Russian-Israeli national arrested in August

What do ransomware and Jesus have in common? A birth month and an unwillingness to die

35 years since AIDS first borked a PC and we're still no closer to a solution

UK ICO not happy with Google's plans to allow device fingerprinting

Also, Ascension notifies 5.6M victims, Krispy Kreme bandits come forward, LockBit 4.0 released, and more

US reportedly mulls TP-Link router ban over national security risk

It could end up like Huawei -Trump's gonna get ya, get ya, get ya

BlackBerry offloads Cylance's endpoint security products to Arctic Wolf

Fresh attempt to mix the perfect cocktail of IoT and Infosec

Deloitte says cyberattack on Rhode Island benefits portal carries 'major security threat'

Personal and financial data probably stolen

Microsoft won't let customers opt out of passkey push

Enrollment invitations will continue until security improves

Australia moves to drop some cryptography by 2030 – before quantum carves it up

The likes of SHA-256, RSA, ECDSA and ECDH won't be welcome in just five years

How Androxgh0st rose from Mozi's ashes to become 'most prevalent malware'

Botnet's operators 'driven by similar interests as that of the Chinese state'

Blocking Chinese spies from intercepting calls? There ought to be a law

Sen. Wyden blasts FCC's 'failure' amid Salt Typhoon hacks

Critical security hole in Apache Struts under exploit

You applied the patch that could stop possible RCE attacks last week, right?