Japanese global logistics company confirms ransomware attack

Avatar

A major Japanese logistics provider confirmed this week that it had fallen victim to a ransomware attack, disrupting some of its systems.

The Tokyo-based Kintetsu World Express (KWE), which offers air and sea cargo services globally, has not yet identified the specific threat actor behind the attack. In a statement on Wednesday, the company said it is in the process of restoring affected systems.

“We will notify customers immediately if we determine their data has been compromised,” it added. 

KWE specializes in freight forwarding, or the coordination of shipments on behalf of businesses. It’s a subsidiary of Kintetsu Group Holdings, a major Japanese railway holding company. The logistics firm operates in over 30 countries with numerous offices worldwide.

The attack was first discovered on April 23, when KWE reported service disruptions affecting certain customers. However, no additional details were provided at that time.

The company has not said if a ransom was demanded, and if so, whether it would pay. The investigation into the incident is ongoing.

This is not the first cyberattack targeting KWE. Last April, a hacker group known as 888 claimed responsibility for breaching the data of hundreds of KWE’s clients.

Cybersecurity threats targeting Japanese companies have escalated in recent months. Trend Micro, a cybersecurity firm, reported that at least 46 entities across Japan, including banks and government agencies, have been attacked since late 2024.

Earlier this year, Japan’s largest mobile carrier, NTT Docomo, disclosed a distributed denial-of-service (DDoS) attack that temporarily disrupted its services. In December, it was reported that a major Japanese media company known for producing manga, anime, and video games, Kadokawa, allegedly paid nearly $3 million to Russia-linked hackers known as BlackSuit following a data breach.

Other Japanese companies dealing with cyberattacks over the past year include watchmaker Casio, electric motor manufacturer Nidec, automotive parts manufacturer Yorozu, and the research and development organization Monohakobi.

Japan’s major financial institutions, including Mitsubishi UFJ Bank, Resona Bank, and Mizuho Bank, also experienced disruptions in internet banking services due to alleged cyberattacks, according to local media reports.

CybercrimeIndustryNewsNews Briefs
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

[Free Webinar] Guide to Securing Your Entire Identity Lifecycle Against AI-Powered Threats

Next Post

Co-op announces ‘attempted’ cyberattack in wake of M&S incident

Related Posts

BlackLock Ransomware Exposed After Researchers Exploit Leak Site Vulnerability

In what's an instance of hacking the hackers, threat hunters have managed to infiltrate the online infrastructure associated with a ransomware group called BlackLock, uncovering crucial information about their modus operandi in the process. Resecurity said it identified a security vulnerability in the data leak site (DLS) operated by the e-crime group that made it possible to extract
Avatar
Read More

New Security Flaws Found in VMware Tools and CrushFTP — High Risk, No Workaround

Broadcom has issued security patches to address a high-severity security flaw in VMware Tools for Windows that could lead to an authentication bypass. Tracked as CVE-2025-22230, the vulnerability is rated 7.8 on the ten-point Common Vulnerability Scoring System (CVSS). "VMware Tools for Windows contains an authentication bypass vulnerability due to improper access control," Broadcom said in an
Avatar
Read More

Hackers Use TikTok Videos to Distribute Vidar and StealC Malware via ClickFix Technique

The malware known as Latrodectus has become the latest to embrace the widely-used social engineering technique called ClickFix as a distribution vector. "The ClickFix technique is particularly risky because it allows the malware to execute in memory rather than being written to disk," Expel said in a report shared with The Hacker News. "This removes many opportunities for browsers or security
Avatar
Read More