Japanese retailer Askul halts online orders, shipments after ransomware attack

Japanese office and household goods retailer Askul has halted online orders and product shipments after a ransomware attack crippled its systems, disrupting operations for several major retailers that rely on its logistics network.

The Tokyo-based company said the cyberattack, discovered over the weekend, caused system failures that forced it to suspend operations across its three e-commerce sites — Askul for office supplies, Lohaco for household goods and Soloel Arena for corporate clients.

All new orders and user registrations are suspended, existing shipments canceled, and customer inquiries are unavailable due to service disruptions, the company said in a statement on Sunday.

“We are currently investigating the extent of the impact, including the possible leak of personal and customer data,” Askul added.

The incident has also rippled through Japan’s retail sector. Muji, a household and lifestyle chain that uses Askul’s affiliated logistics company, suspended its domestic online shopping service and parts of its mobile app.

“We are working with Askul to restore operations, but the resumption date remains undetermined,” Muji said Monday, adding that its physical stores and delivery services were unaffected.

Other Japanese retailers — including household goods chain Loft and Sogo & Seibu — also reported disruptions, halting online orders and some product shipments tied to Askul’s logistics systems.

The attack on Askul is the latest of ransomware attacks and other cybersecurity incidents in Japan.  Earlier this month, Japan’s largest brewer, Asahi, said a cyberattack claimed by the Russian-speaking Qilin ransomware gang disrupted production and delayed product launches across the country. Asahi later said personal data may have been illegally accessed.

In a separate case last week, Sagawa Express, one of Japan’s largest transportation companies, reported unauthorized logins to customer accounts traced to compromised credentials, though it said business systems were unaffected.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

Judge bars NSO from targeting WhatsApp users with spyware, reduces damages in landmark case

Next Post

Five New Exploited Bugs Land in CISA’s Catalog — Oracle and Microsoft Among Targets

Related Posts

CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and National Security Agency (NSA), along with international partners from Australia and Canada, have released guidance to harden on-premise Microsoft Exchange Server instances from potential exploitation. "By restricting administrative access, implementing multi-factor authentication, enforcing strict transport security
Read More

CountLoader Broadens Russian Ransomware Operations With Multi-Version Malware Loader

Cybersecurity researchers have discovered a new malware loader codenamed CountLoader that has been put to use by Russian ransomware gangs to deliver post-exploitation tools like Cobalt Strike and AdaptixC2, and a remote access trojan known as PureHVNC RAT. "CountLoader is being used either as part of an Initial Access Broker's (IAB) toolset or by a ransomware affiliate with ties to the LockBit,
Read More

EvilAI Malware Masquerades as AI Tools to Infiltrate Global Organizations

Threat actors have been observed using seemingly legitimate artificial intelligence (AI) tools and software to sneakily slip malware for future attacks on organizations worldwide. According to Trend Micro, the campaign is using productivity or AI-enhanced tools to deliver malware targeting various regions, including Europe, the Americas, and the Asia, Middle East, and Africa (AMEA) region.
Read More