Japanese retailer Askul halts online orders, shipments after ransomware attack

Japanese office and household goods retailer Askul has halted online orders and product shipments after a ransomware attack crippled its systems, disrupting operations for several major retailers that rely on its logistics network.

The Tokyo-based company said the cyberattack, discovered over the weekend, caused system failures that forced it to suspend operations across its three e-commerce sites — Askul for office supplies, Lohaco for household goods and Soloel Arena for corporate clients.

All new orders and user registrations are suspended, existing shipments canceled, and customer inquiries are unavailable due to service disruptions, the company said in a statement on Sunday.

“We are currently investigating the extent of the impact, including the possible leak of personal and customer data,” Askul added.

The incident has also rippled through Japan’s retail sector. Muji, a household and lifestyle chain that uses Askul’s affiliated logistics company, suspended its domestic online shopping service and parts of its mobile app.

“We are working with Askul to restore operations, but the resumption date remains undetermined,” Muji said Monday, adding that its physical stores and delivery services were unaffected.

Other Japanese retailers — including household goods chain Loft and Sogo & Seibu — also reported disruptions, halting online orders and some product shipments tied to Askul’s logistics systems.

The attack on Askul is the latest of ransomware attacks and other cybersecurity incidents in Japan.  Earlier this month, Japan’s largest brewer, Asahi, said a cyberattack claimed by the Russian-speaking Qilin ransomware gang disrupted production and delayed product launches across the country. Asahi later said personal data may have been illegally accessed.

In a separate case last week, Sagawa Express, one of Japan’s largest transportation companies, reported unauthorized logins to customer accounts traced to compromised credentials, though it said business systems were unaffected.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

Judge bars NSO from targeting WhatsApp users with spyware, reduces damages in landmark case

Next Post

Five New Exploited Bugs Land in CISA’s Catalog — Oracle and Microsoft Among Targets

Related Posts

STAC6565 Targets Canada in 80% of Attacks as Gold Blade Deploys QWCrypt Ransomware

Canadian organizations have emerged as the focus of a targeted cyber campaign orchestrated by a threat activity cluster known as STAC6565. Cybersecurity company Sophos said it investigated almost 40 intrusions linked to the threat actor between February 2024 and August 2025. The campaign is assessed with high confidence to share overlaps with a hacking group known as Gold Blade, which is also
Read More

UNC5221 Uses BRICKSTORM Backdoor to Infiltrate U.S. Legal and Technology Sectors

Companies in the legal services, software-as-a-service (SaaS) providers, Business Process Outsourcers (BPOs), and technology sectors in the U.S. have been targeted by a suspected China-nexus cyber espionage group to deliver a known backdoor referred to as BRICKSTORM. The activity, attributed to UNC5221 and closely related, suspected China-nexus threat clusters, is designed to facilitate
Read More