Suspected cyberattack disrupts Circle K chain’s operations in Hong Kong

Convenience store chain Circle K said a “network disruption” has paralyzed its Hong Kong operations for several days, forcing nearly 400 outlets across the city to suspend most electronic payment and loyalty services.

The retailer said the incident, first reported over the weekend, affected e-payment systems, email services, and loyalty programs. Circle K stores remain “open and operating,” and customers can still pay with cash or Octopus, Hong Kong’s widely used contactless smart card.

“As we cannot rule out a possible cyberattack, we have acted quickly to secure customer, employee and supplier data, and are working with law enforcement and third-party forensics experts to determine the cause, scope and extent of this breach,” the company said in a statement on Facebook on Monday.

The company has not issued further updates and did not respond to Recorded Future News’ request for comment. As of Tuesday, customers on its Hong Kong social media page were still reporting outages and complaining about the expiration of loyalty points and coupons, urging the firm to extend deadlines.

Circle K Hong Kong is owned by the Canadian company Alimentation Couche-Tard, which operates Circle K stores throughout North America and elsewhere. 

A Circle K outlet in Causeway Bay, Hong Kong’s main retail district, displayed notices saying e-payments were suspended due to a “network outage,” according to local media reports.

Circle K Hong Kong’s former parent, Convenience Retail Asia (CRA) — which licensed the brand in the 1980s and sold it back to Alimentation Couche-Tard in 2020  — also reported a network disruption on Monday. CRA said its internal systems were affected and that it had notified law enforcement, though it is unclear whether the incidents are linked.

Circle K outlets have been repeatedly targeted in cyber incidents worldwide. In January, the chain’s largest U.S. franchisee, Gas Express, disclosed that hackers had stolen names, Social Security numbers and driver’s license details. In June 2024, a ransomware group reportedly claimed responsibility for breaching Circle K Atlanta.

In 2023, researchers also found a Circle K dataset left exposed online, containing partial payment card details, customer loyalty numbers and employee contact information. The company said it had fixed the issue but did not comment further.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

Jaguar Land Rover extends shutdown again following cyberattack

Next Post

U.S. Secret Service Seizes 300 SIM Servers, 100K Cards Threatening U.S. Officials Near UN

Related Posts

⚡ Weekly Recap: Cisco 0-Day, Record DDoS, LockBit 5.0, BMC Bugs, ShadowV2 Botnet & More

Cybersecurity never stops—and neither do hackers. While you wrapped up last week, new attacks were already underway. From hidden software bugs to massive DDoS attacks and new ransomware tricks, this week’s roundup gives you the biggest security moves to know. Whether you’re protecting key systems or locking down cloud apps, these are the updates you need before making your next security
Read More

CISA Warns of Two Malware Strains Exploiting Ivanti EPMM CVE-2025-4427 and CVE-2025-4428

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday released details of two sets of malware that were discovered in an unnamed organization's network following the exploitation of security flaws in Ivanti Endpoint Manager Mobile (EPMM). "Each set contains loaders for malicious listeners that enable cyber threat actors to run arbitrary code on the compromised server,"
Read More

Mustang Panda Deploys SnakeDisk USB Worm to Deliver Yokai Backdoor on Thailand IPs

The China-aligned threat actor known as Mustang Panda has been observed using an updated version of a backdoor called TONESHELL and a previously undocumented USB worm called SnakeDisk. "The worm only executes on devices with Thailand-based IP addresses and drops the Yokai backdoor," IBM X-Force researchers Golo Mühr and Joshua Chung said in an analysis published last week. The tech giant's
Read More