Japanese retailer Askul confirms data leak after cyberattack claimed by Russia-linked group

Japanese office and household goods retailer Askul confirmed that customer and supplier data was leaked following a ransomware attack earlier in October, which disrupted operations across its e-commerce platforms.

The company said the breach exposed contact information and inquiry details from users of its online stores — Askul, Lohaco and Soloel Arena — as well as supplier data stored on its internal servers. “We sincerely apologize for the inconvenience and concern caused to our customers, business partners, and other related parties,” Askul said in a statement on Friday.

The attack disrupted supply chains for major Japanese retailers, including Ryohin Keikaku, which operates the popular household and lifestyle brand Muji, and The Loft, which also runs lifestyle stores. Both firms rely on Askul’s logistics network but have not said whether their own data was compromised.

While Askul did not specify the number of affected individuals or entities, the RansomHouse extortion group has claimed responsibility for the attack, alleging that it stole 1.1 terabytes of data.

Askul said it was aware of statements made by the group and is investigating the incident.

RansomHouse, a cybercrime group that emerged in March 2022, is known for its extortion tactics: rather than encrypting data, the group threatens to release all exfiltrated information publicly. The group calls itself as a “force for good” and claims to expose vulnerabilities in companies.

Cybersecurity researchers have previously linked RansomHouse to Russia-aligned threat actors, including Alphv/BlackCat, LockBit 3.0 and RagnarLocker.

The Askul incident adds to a string of cyberattacks on Japanese companies in recent months. In October, Asahi Group Holdings, the country’s largest brewer, reported a ransomware attack claimed by the Russian-speaking Qilin gang that disrupted production. Last week, auto parts manufacturer TEIN said ransomware crippled its headquarters network, halting operations across affiliated firms.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

Cybercriminals Exploit Remote Monitoring Tools to Infiltrate Logistics and Freight Networks

Next Post

Malicious VSX Extension “SleepyDuck” Uses Ethereum to Keep Its Command Server Alive

Related Posts

SolarWinds Fixes Four Critical Web Help Desk Flaws With Unauthenticated RCE and Auth Bypass

SolarWinds has released security updates to address multiple security vulnerabilities impacting SolarWinds Web Help Desk, including four critical vulnerabilities that could result in authentication bypass and remote code execution (RCE). The list of vulnerabilities is as follows - CVE-2025-40536 (CVSS score: 8.1) - A security control bypass vulnerability that could allow an unauthenticated
Read More

New Albiriox MaaS Malware Targets 400+ Apps for On-Device Fraud and Screen Control

A new Android malware named Albiriox has been advertised under a malware-as-a-service (MaaS) model to offer a "full spectrum" of features to facilitate on-device fraud (ODF), screen manipulation, and real-time interaction with infected devices. The malware embeds a hard-coded list comprising over 400 applications spanning banking, financial technology, payment processors, cryptocurrency
Read More

Five Malicious Chrome Extensions Impersonate Workday and NetSuite to Hijack Accounts

Cybersecurity researchers have discovered five new malicious Google Chrome web browser extensions that masquerade as human resources (HR) and enterprise resource planning (ERP) platforms like Workday, NetSuite, and SuccessFactors to take control of victim accounts. "The extensions work in concert to steal authentication tokens, block incident response capabilities, and enable complete account
Read More