In case you missed it, last week was eventful in the world of cyber security. In addition to a global disruption to Honda’s systems, a cyberattack also halted operations of Australian beverage giant Lion.
Lion is known for beer brands XXXX, Tooheys and James Squires, and milk brands Dairy Farmers and Pura. The company employs over 7000 staff across Australia in its breweries, manufacturing, distribution and call centres.
Lion shut down all of its systems as a precautionary measure, which caused disruption to its suppliers, customers, broader supply chain and brewing process.
Although Lion has yet to reveal the exact details of the attack, the consensus amongst threat analysts is that Lion had been hit by the ‘REvil’ ransomware gang.
REvil’s modus operandi is to publish samples of stolen data on the dark web, then auction off to scammers sensitive the information exfiltrated, such as of bank and other financial details.
Ironically, last week’s cyber-attack comes after Lion completed a multi-million-dollar IT transformation project. The two-year project centralised 500 applications running across the cloud-based SAP Hana platform.
The timing of the cyber-attack and resulting disruption to Lion’s business has come at a terrible time. Lion acknowledged to the Sydney Morning Herald that the attack “could not have come at a worst time…This has been the most devasting time on record for the hospitality industry.”
As COVID-19 restrictions begin to ease, the hospitality industry in Australia and New Zealand are in the early stages of re-opening its doors. Lion’s cyber-attack has impacted pubs and clubs trying to recover, restock and rebuild following the COVID-19 restrictions.
With workforces spread thinly over different geographies, the need to protect sensitive company data and networks with a cast iron security shield is never more urgent.
Thomas Peer Solutions has over 10 years’ experience in business continuity management. We are currently offering ANZ based organisations free cyber resiliency assessments where we will benchmark your cyber recovery and data protection environment against industry best practices.
Fill out the contact form below to arrange a convenient time for us to assess your environment.