...

Deep Code

contact@decodecybercrime.com

From Multinationals to Microbrands: How Infostealer Malware Is Undermining UK Business Resilience

From Multinationals to Microbrands: How Infostealer Malware Is Undermining UK Business Resilience

The Scale and Severity of Cyber Attacks Hitting UK Businesses

UK businesses are under growing cyber pressure. In 2024 alone, over 7.7 million attacks were recorded, with phishing, indirect breaches, and ransomware leading the charge. According to the Cyber Security Breaches Survey 2025, 43% of UK businesses and 30% of UK charities experienced at least one cyber breach or attack in the 12 months prior to April 2025—translating to approximately 612,000 businesses and 61,000 charities.

Of these, around 20% were confirmed victims of actual cybercrime. While ransomware accounted for only 1% (~19,000 businesses), the impact was severe. Public ransomware disclosures surged in Q2 2025 with 276 incidents, a 63% YoY increase. The healthcare (52), government (45), and services (33) sectors were hardest hit.

Notable attacks—such as those affecting M&S, Co-op, and logistics firm KNP—highlighted operational and financial risks. Despite the abundant NCSC guidance, only ~35,000 Cyber Essentials certifications have been issued across 5.5 million UK businesses, leaving a vast majority exposed.

Case in Point: KNP Logistics and the Cost of One Weak Password

In June 2025, a ransomware attack by the Akira group brought down KNP Logistics, a 158-year-old transport firm. Hackers accessed critical infrastructure after guessing a weak employee password, encrypted key systems, and demanded a ransom up to £5 million. Despite having cyber insurance, the firm couldn’t recover—leading to its collapse and the loss of ~700 jobs. This stark example underscores the ripple effects of compromised credentials.

Infostealer Infections: A Silent, Widespread Threat

While ransomware grabs headlines, infostealer malware operates quietly—harvesting credentials, browser data, and authentication tokens to fuel future breaches. According to data from Infostealers.info, over 123,000 infostealer infections were recorded in the UK by July 2025 (excluding ULP logs), with infections rising steadily month-on-month.

These infections affect organizations of all sizes, from enterprise giants to small and micro firms. Our research leveraged Infostealers.info to profile the exposure across the UK market, segmented by company size and sector. The findings make a compelling case for integrating infostealer monitoring into proactive defense strategies.

Sector-by-Sector Impact in 2025

Sector Notable Incidents
Healthcare 52 ransomware cases (Q2 2025)
Government & Public 45 ransomware cases
Services 33 attacks (professional and technical)
Retail M&S and Co-op breaches; projected £300M loss for M&S
Construction, Hospitality, Arts Elevated ransomware rates

Breach Exposure by Business Size

  • Large enterprises: 74% reported breaches; ~14% suffered ransomware attacks.
  • Medium enterprises: 67% reported at least one incident.
  • Small/micro businesses: Lower reported rates, but likely underreported.

Infostealer Exposure Among Top Public Companies (By Revenue)

Company Sector Website Total Compromises ULP Logs Infostealer Logs
Tesco Retail tesco.com 68,376 55,257 13,119
Vodafone Telecommunications vodafone.com 64,257 52,094 12,163
Shell Oil & Gas / Energy shell.com 47,852 39,483 8,369
HSBC Banking hsbc.co.uk 14,402 12,585 1,817
BP Oil & Gas / Energy bp.com 12,417 9,619 2,798
Unilever Consumer Goods unilever.com 9,162 7,768 1,394
Barclays Banking barclays.co.uk 6,345 5,321 1,024
AstraZeneca Pharma astrazeneca.com 1,250 1,038 212
Lloyds Banking lloydsbank.com 873 769 104
Rio Tinto Mining riotinto.com 794 632 162

Case Study: Unilever

  • 9,000+ Compromises (February 2022–July 2025)
  • 2,300+ @unilever.com emails compromised (417 infostealer logs)
  • Top URL paths compromised: idp.unilever[.]com/adfs, ul-amigopod-e.unilever[.]com, web3.inpartner[.]unilever.com, uflp.unilever[.]com/tgwebhost
  • ~42% reused passwords, ~60% patterned passwords

*Note: Patterned passwords refer to those following easily predictable structures, such as sequential numbers, company-related terms, dates, or simple keyboard patterns (e.g., “123456” or “qwerty”).

Privately-Owned Companies by Turnover: Infostealer Exposure

Company Sector Website Compromises ULP Logs Stealer Logs
Wise Fintech payments wise.com 138,932 84,898 54,034
MoneySuperMarket Personal finance platform moneysupermarket.com 39,159 33,667 5,492
M&S Supply Chain Retail logistics marksandspencer.com 17,075 14,171 2,904
Auto Trader Digital automotive marketplace autotrader.co.uk 13,583 11,779 1,804
Pets at Home Retail pet care services petsathome.com 4,854 3,948 906

Case Study: M&S Supply Chain

  • 17,000+ Compromises (February 2022–August 2025)
  • Two confirmed employee email compromises (1 associated with an infostealer log; 1 with a ULP log)
  • Most affected mail providers: Gmail (5,889), Hotmail (1,415), Yahoo (656)
  • Frequently targeted login paths included: “MSResUserRegistration”, “MSResLogin”, “MSCheckoutLoginFormCmd”
  • ~57% reused passwords, 11% patterned

*Note: Patterned passwords refer to those following easily predictable structures, such as sequential numbers, company-related terms, dates, or simple keyboard patterns (e.g., “123456” or “qwerty”).

Small & Micro Business Compromises

Company Sector Website Compromises ULP Stealer Logs
Simmer Eats Meal subscriptions simmereats.com 123 70 53
Montirex Apparel montirex.com 27 20 7
Healf Health retail healf.com 12 7 5
Dfyne Activewear dfyne.com 6 4 2
Odd Muse Fashion oddmuse.co.uk 5 4 1

Case Study: Simmer Eats

  • 123 infections, 44 in 2025 alone
  • Top affected mail domains: Gmail (83), Hotmail (11), Outlook (10)
  • Top compromises by URL Path: simmereats[.]com/login (55), simmereats[.]com/join-now/account (41)
  • 65 unique passwords: 90% strong, yet 47% patterned

Conclusion: Why Infostealer Monitoring Must Be Central to Cyber Strategy

Infostealer malware represents a silent yet potent threat across every level of the UK economy. From Fortune 100 multinationals to thriving microenterprises, compromised credentials are now a common entry point for ransomware, fraud, and long-term infiltration.

Despite rising awareness of cyber threats, many UK businesses remain underprepared—especially across their supply chains, which often act as soft entry points for attackers. The cases of KNP Logistics, and Unilever, show how just a handful of compromised credentials can cascade into catastrophic disruptions.

Infostealer monitoring, credential hygiene, and real-time threat intelligence must now be integrated into the core of UK organizations’ cyber defence frameworks—not only to mitigate present-day vulnerabilities, but to build resilience against tomorrow’s compromises.

Proactive defence is not a luxury—it’s a business continuity imperative.

administrator

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Seraphinite AcceleratorOptimized by Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.