Japanese beer giant Asahi says ransomware attack may have exposed data of 1.5 million people

Japanese brewer Asahi said on Thursday that a ransomware attack on its systems earlier this year may have exposed the personal data of about 1.5 million customers, as well as thousands of employees, their family members and external contacts.

The company said the compromised information includes names, gender, addresses and phone numbers, but not credit-card details. Asahi has seen no evidence the data has been published online and said the impact appears limited to systems managed in Japan.

The disclosure follows a two-month investigation into the late-September incident, which forced production shutdowns, delayed product launches and disrupted order processing and shipping nationwide — causing shortages of Asahi’s beer and soft drinks. The company controls roughly 40% of Japan’s beer market, including its flagship Super Dry brand.

According to Asahi, attackers infiltrated its data-center network via equipment at one of its domestic sites and deployed ransomware that encrypted several active servers and personal computers. Some employee laptops on loan from the company were also compromised.

Asahi said it has spent roughly two months containing the attack and is gradually restoring shipments. It aims to normalize logistics operations by February, although some products will continue to face delays. The company has also pushed back its annual financial results by 50 days due to disruptions in its accounting systems.

“We will do our utmost to fully restore our systems as quickly as possible,” President Atsushi Katsugi said, adding that the company is implementing new security measures to prevent a recurrence.

Asahi did not identify the attacker, but in October the Russian-speaking Qilin ransomware gang claimed responsibility, alleging it stole financial data, employee records and internal forecasts. Asahi’s CEO said Thursday the company has not paid a ransom.

Qilin, active since 2022, operates a ransomware-as-a-service model and has previously targeted hospitals, government agencies and private firms.

Japan has faced several major cyber incidents in recent months. Office-supply retailer Askul said data on customers and suppliers was leaked after an October ransomware attack claimed by the RansomHouse group. Other victims include logistics provider Kintetsu World Express, mobile carrier NTT Docomo and media conglomerate Kadokawa.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

Legacy Python Bootstrap Scripts Create Domain-Takeover Risk in Multiple PyPI Packages

Next Post

CISA Adds Actively Exploited XSS Bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

Related Posts

OneLogin Bug Let Attackers Use API Keys to Steal OIDC Secrets and Impersonate Apps

A high-severity security flaw has been disclosed in the One Identity OneLogin Identity and Access Management (IAM) solution that, if successfully exploited, could expose sensitive OpenID Connect (OIDC) application client secrets under certain circumstances. The vulnerability, tracked as CVE-2025-59363, has been assigned a CVSS score of 7.7 out of 10.0. It has been described as a case of
Read More

New AI-Targeted Cloaking Attack Tricks AI Crawlers Into Citing Fake Info as Verified Facts

Cybersecurity researchers have flagged a new security issue in agentic web browsers like OpenAI ChatGPT Atlas that exposes underlying artificial intelligence (AI) models to context poisoning attacks. In the attack devised by AI security company SPLX, a bad actor can set up websites that serve different content to browsers and AI crawlers run by ChatGPT and Perplexity. The technique has been
Read More