Company Details
dfi-retail-group
7,954
136,875
43
dfiretailgroup.com
184
DFI_2599660
Completed


DFI Retail Group Company CyberSecurity Posture
dfiretailgroup.comDFI Retail Group (the ‘Group’) is a leading Asian retailer, driven by its purpose to “Sustainably Serve Asia for Generations with Everyday Moments”. As at 31 May 2025, the Group, its associates and joint ventures operated over 7,700 outlets and employed over 85,000 people. The Group had total annual revenue in 2024 exceeding US$24.9 billion. The Group is dedicated to delivering quality, value and service to Asian consumers through a compelling retail experience, supported by an extensive store network and highly efficient supply chains. The Group, including associates and joint ventures, operates a portfolio of well-known brands across five key divisions: health and beauty, convenience, food, home furnishings, and restaurants. The Group’s parent company, DFI Retail Group Holdings Limited, is incorporated in Bermuda and has a primary listing in the equity shares (transition) category of the London Stock Exchange, with secondary listings in Bermuda and Singapore. The Group’s businesses are managed from Hong Kong. DFI Retail Group is a member of the Jardine Matheson Group.
Company Details
dfi-retail-group
7,954
136,875
43
dfiretailgroup.com
184
DFI_2599660
Completed
Between 700 and 749

DRG Global Score (TPRM)XXXX

Description: The Dairy Farm Group was targeted by the REvil ransomware group. The attackers compromised the group's network and encrypted their devices. They demanded the ransom of about $30 million for the exchange of decryptor keys.
Description: On July 10, 2015, the California Office of the Attorney General reported a data breach involving Mandarin Oriental that occurred on June 18, 2014. The breach was a result of a malware attack that potentially exposed names and credit card numbers of some guests, but no PIN numbers or security codes were confirmed to have been accessed.


No incidents recorded for DFI Retail Group in 2026.
No incidents recorded for DFI Retail Group in 2026.
No incidents recorded for DFI Retail Group in 2026.
DRG cyber incidents detection timeline including parent company and subsidiaries

DFI Retail Group (the ‘Group’) is a leading Asian retailer, driven by its purpose to “Sustainably Serve Asia for Generations with Everyday Moments”. As at 31 May 2025, the Group, its associates and joint ventures operated over 7,700 outlets and employed over 85,000 people. The Group had total annual revenue in 2024 exceeding US$24.9 billion. The Group is dedicated to delivering quality, value and service to Asian consumers through a compelling retail experience, supported by an extensive store network and highly efficient supply chains. The Group, including associates and joint ventures, operates a portfolio of well-known brands across five key divisions: health and beauty, convenience, food, home furnishings, and restaurants. The Group’s parent company, DFI Retail Group Holdings Limited, is incorporated in Bermuda and has a primary listing in the equity shares (transition) category of the London Stock Exchange, with secondary listings in Bermuda and Singapore. The Group’s businesses are managed from Hong Kong. DFI Retail Group is a member of the Jardine Matheson Group.

Somos Supermercados Peruanos S.A. (SPSA), la cadena más grande de supermercados en Perú, orgullosos de ser 100% capital peruano y pertenecer al Grupo Intercorp. Tenemos más de 400 tiendas a nivel nacional y 4 formatos: - PlazaVea, nuestra marca líder en recordación y participación de mercado. -
PERSONE OLTRE LE COSE. Conad è una storia fatta di imprenditori, commercianti, clienti e comunità. Un lungo viaggio che inizia nella metà degli anni ’60: nel 1962 nasce a Bologna il Consorzio Nazionale Dettaglianti, una società cooperativa a responsabilità limitata costituita da 14 gruppi d’acquisto

We're a 45 year-old, $8 billion national tool retailer with the energy, enthusiasm, and growth potential of a start-up. We have over 1,600 stores in 48 states across the country and are opening several new locations every week. We offer our customers more than 7,000 tools and accessories, from hand

Dollarama was founded by third-generation retailer and Canadian entrepreneur, Larry Rossy. It all started with one store, in Matane, Quebec, in 1992, and quickly grew over the next two decades to become a household name and shopping destination for Canadians from coast to coast. Dollarama today is

Türkiye'de modern perakende sektörünün öncülüğünü yapmakta olan Migros günümüzde çok geniş kullanım alanına sahip mağazalarında, gıda ve ihtiyaç maddelerinin yanı sıra kırtasiye, züccaciye, beyaz eşya, kitap ve konfeksiyon gibi bölümleriyle hemen hemen tüm müşteri gereksinimlerini karşılamaktadır.

QuikTrip Corporation is a privately held company headquartered in Tulsa, Oklahoma. Founded in 1958, QuikTrip has grown to a more than $11 billion company with 800+ stores in eleven states. Those revenues place QuikTrip #29 on the Forbes listing of largest privately held companies. QuikTrip’s strate

Mais do que varejo, somos um ecossistema que conecta produtos, serviços, crédito e logística com dedicação total! Estamos presentes na mente, no coração e na casa de milhões de brasileiros, com um portfólio de marcas que há décadas faz parte da vida das pessoas: Casas Bahia, Ponto Frio, Extra.com.
At Chewy, our mission is to be the most trusted and convenient destination for pet parents and partners, everywhere. We view pets and pet parents as family and are obsessed with meeting their needs and exceeding customer expectations through every interaction. Behind the scenes, our talented teams

At Nordstrom, we empower our employees to set their sights high and blaze their own trails. This is a place where your success and growth are truly a result of your own efforts and achievements. Our teams are made up of motivated people who work hard to become leaders within the company, at all
.png)
DFI Retail Group, Reckitt, Jio-bp, United Breweries, Liberty Mutual Insurance, Wella, BIC and Borjomi led across industries and attracted...
These days it's easy to simply buy an index fund, and your returns should (roughly) match the market. But investors can...
Finding a business that has the potential to grow substantially is not easy, but it is possible if we look at a few key...
In its renewed drive to draw more secondary listings, the bourse operator's strategic priority is to encourage companies to issue shares...
Explore the top-performing Singapore stocks in 2025 and find out which companies are gaining the most in the market.
The company bridges the gap between tech talent and skills aggregation through an integrated ecosystem, attracting and nurturing tech...
DFI Retail Group Holdings ( SGX:D01 ) First Half 2025 Results Key Financial Results Revenue: US$4.39b (flat on 1H...
Asian retailer DFI Retail Group has disclosed the divestiture of 315,309,310 shares in Philippines' multi-format retailer Robinsons Retail...
While it may not be enough for some shareholders, we think it is good to see the DFI Retail Group Holdings Limited...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of DFI Retail Group is http://www.DFIretailgroup.com.
According to Rankiteo, DFI Retail Group’s AI-generated cybersecurity score is 747, reflecting their Moderate security posture.
According to Rankiteo, DFI Retail Group currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, DFI Retail Group has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, DFI Retail Group is not certified under SOC 2 Type 1.
According to Rankiteo, DFI Retail Group does not hold a SOC 2 Type 2 certification.
According to Rankiteo, DFI Retail Group is not listed as GDPR compliant.
According to Rankiteo, DFI Retail Group does not currently maintain PCI DSS compliance.
According to Rankiteo, DFI Retail Group is not compliant with HIPAA regulations.
According to Rankiteo,DFI Retail Group is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
DFI Retail Group operates primarily in the Retail industry.
DFI Retail Group employs approximately 7,954 people worldwide.
DFI Retail Group presently has no subsidiaries across any sectors.
DFI Retail Group’s official LinkedIn profile has approximately 136,875 followers.
DFI Retail Group is classified under the NAICS code 43, which corresponds to Retail Trade.
No, DFI Retail Group does not have a profile on Crunchbase.
Yes, DFI Retail Group maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/dfi-retail-group.
As of January 22, 2026, Rankiteo reports that DFI Retail Group has experienced 2 cybersecurity incidents.
DFI Retail Group has an estimated 15,594 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Ransomware and Cyber Attack.
Title: REvil Ransomware Attack on Dairy Farm Group
Description: The Dairy Farm Group was targeted by the REvil ransomware group. The attackers compromised the group's network and encrypted their devices. They demanded the ransom of about $30 million for the exchange of decryptor keys.
Type: Ransomware
Threat Actor: REvil
Motivation: Financial
Title: Mandarin Oriental Data Breach
Description: A malware attack potentially exposed names and credit card numbers of some guests, but no PIN numbers or security codes were confirmed to have been accessed.
Date Detected: 2014-06-18
Date Publicly Disclosed: 2015-07-10
Type: Data Breach
Attack Vector: Malware
Common Attack Types: The most common types of attacks the company has faced is Ransomware.

Data Compromised: Names, Credit card numbers
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Credit Card Numbers and .

Entity Name: Mandarin Oriental
Entity Type: Hospitality
Industry: Hospitality

Type of Data Compromised: Names, Credit card numbers

Ransom Demanded: $30 million
Ransomware Strain: REvil
Data Encryption: True

Source: California Office of the Attorney General
Date Accessed: 2015-07-10
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: California Office of the Attorney GeneralDate Accessed: 2015-07-10.
Last Ransom Demanded: The amount of the last ransom demanded was $30 million.
Last Attacking Group: The attacking group in the last incident was an REvil.
Most Recent Incident Detected: The most recent incident detected was on 2014-06-18.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2015-07-10.
Most Significant Data Compromised: The most significant data compromised in an incident were Names, Credit Card Numbers and .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Names and Credit Card Numbers.
Highest Ransom Demanded: The highest ransom demanded in a ransomware incident was $30 million.
Most Recent Source: The most recent source of information about an incident is California Office of the Attorney General.
.png)
SummaryA command injection vulnerability (CWE-78) has been found to exist in the `wrangler pages deploy` command. The issue occurs because the `--commit-hash` parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of `--commit-hash` to execute arbitrary commands on the system running Wrangler. Root causeThe commitHash variable, derived from user input via the --commit-hash CLI argument, is interpolated directly into a shell command using template literals (e.g., execSync(`git show -s --format=%B ${commitHash}`)). Shell metacharacters are interpreted by the shell, enabling command execution. ImpactThis vulnerability is generally hard to exploit, as it requires --commit-hash to be attacker controlled. The vulnerability primarily affects CI/CD environments where `wrangler pages deploy` is used in automated pipelines and the --commit-hash parameter is populated from external, potentially untrusted sources. An attacker could exploit this to: * Run any shell command. * Exfiltrate environment variables. * Compromise the CI runner to install backdoors or modify build artifacts. Credits Disclosed responsibly by kny4hacker. Mitigation * Wrangler v4 users are requested to upgrade to Wrangler v4.59.1 or higher. * Wrangler v3 users are requested to upgrade to Wrangler v3.114.17 or higher. * Users on Wrangler v2 (EOL) should upgrade to a supported major version.
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.