Cyberattack on Japanese beer giant Asahi limits shipping, call center operations

Japanese beverage company Asahi said a recent cyberattack has caused a system failure that is impacting its ability to ship orders and manage its call center. 

Asahi published a statement on Monday warning customers that the incident was affecting its operations in Japan. Due to the system failure caused by the cyberattack, Asahi suspended order and shipment operations at group companies in Japan as well as call center operations and some customer service desks. 

“At this time, there has been no confirmed leakage of personal information or customer data to external parties,” the statement said. 

“We are actively investigating the cause and working to restore operations; however, there is currently no estimated timeline for recovery. The system failure is limited to our operations within Japan. We sincerely apologize for any inconvenience caused to our customers and business partners.”

Asahi owns dozens of beverage brands including Peroni, Grolsch and more. The company reported more than $9 billion in revenue for the first half of 2025 and has about 30 factories across Japan. 

Asahi did not respond to requests for comment about whether the company is dealing with a ransomware attack. No cybercriminal group has taken credit for the attack as of Tuesday morning. 

Beverage companies have been targeted by hacking groups over the last two years, with multiple large breweries or distribution firms in Russia, Germany, Belgium and Sweden facing ransomware attacks. 

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

Researchers Disclose Google Gemini AI Flaws Allowing Prompt Injection and Cloud Exploits

Next Post

Phantom Taurus: New China-Linked Hacker Group Hits Governments With Stealth Malware

Related Posts

Securing the Open Android Ecosystem with Samsung Knox

Raise your hand if you’ve heard the myth, “Android isn’t secure.” Android phones, such as the Samsung Galaxy, unlock new ways of working. But, as an IT admin, you may worry about the security—after all, work data is critical. However, outdated concerns can hold your business back from unlocking its full potential. The truth is, with work happening everywhere, every device connected to your
Read More

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

The North Korean threat actors behind the Contagious Interview campaign have once again tweaked their tactics by using JSON storage services to stage malicious payloads. "The threat actors have recently resorted to utilizing JSON storage services like JSON Keeper, JSONsilo, and npoint.io to host and deliver malware from trojanized code projects, with the lure," NVISO researchers Bart Parys, Stef
Read More

Preparing for the Digital Battlefield of 2026: Ghost Identities, Poisoned Accounts, & AI Agent Havoc

BeyondTrust’s annual cybersecurity predictions point to a year where old defenses will fail quietly, and new attack vectors will surge. Introduction The next major breach won’t be a phished password. It will be the result of a massive, unmanaged identity debt. This debt takes many forms: it’s the “ghost” identity from a 2015 breach lurking in your IAM, the privilege sprawl from thousands of new
Read More