Japanese retailer Askul halts online orders, shipments after ransomware attack

Japanese office and household goods retailer Askul has halted online orders and product shipments after a ransomware attack crippled its systems, disrupting operations for several major retailers that rely on its logistics network.

The Tokyo-based company said the cyberattack, discovered over the weekend, caused system failures that forced it to suspend operations across its three e-commerce sites — Askul for office supplies, Lohaco for household goods and Soloel Arena for corporate clients.

All new orders and user registrations are suspended, existing shipments canceled, and customer inquiries are unavailable due to service disruptions, the company said in a statement on Sunday.

“We are currently investigating the extent of the impact, including the possible leak of personal and customer data,” Askul added.

The incident has also rippled through Japan’s retail sector. Muji, a household and lifestyle chain that uses Askul’s affiliated logistics company, suspended its domestic online shopping service and parts of its mobile app.

“We are working with Askul to restore operations, but the resumption date remains undetermined,” Muji said Monday, adding that its physical stores and delivery services were unaffected.

Other Japanese retailers — including household goods chain Loft and Sogo & Seibu — also reported disruptions, halting online orders and some product shipments tied to Askul’s logistics systems.

The attack on Askul is the latest of ransomware attacks and other cybersecurity incidents in Japan.  Earlier this month, Japan’s largest brewer, Asahi, said a cyberattack claimed by the Russian-speaking Qilin ransomware gang disrupted production and delayed product launches across the country. Asahi later said personal data may have been illegally accessed.

In a separate case last week, Sagawa Express, one of Japan’s largest transportation companies, reported unauthorized logins to customer accounts traced to compromised credentials, though it said business systems were unaffected.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

Judge bars NSO from targeting WhatsApp users with spyware, reduces damages in landmark case

Next Post

Five New Exploited Bugs Land in CISA’s Catalog — Oracle and Microsoft Among Targets

Related Posts

Why Early Threat Detection Is a Must for Long-Term Business Growth

In cybersecurity, speed isn’t just a win — it’s a multiplier. The faster you learn about emerging threats, the faster you adapt your defenses, the less damage you suffer, and the more confidently your business keeps scaling. Early threat detection isn’t about preventing a breach someday: it’s about protecting the revenue you’re supposed to earn every day. Companies that treat cybersecurity as a
Read More

LockBit, Qilin, and DragonForce Join Forces to Dominate the Ransomware Ecosystem

Three prominent ransomware groups DragonForce, LockBit, and Qilin have announced a new strategic ransomware alliance, once underscoring continued shifts in the cyber threat landscape. The coalition is seen as an attempt on the part of the financially motivated threat actors to conduct more effective ransomware attacks, ReliaQuest said in a report shared with The Hacker News. "Announced shortly
Read More

APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign

A Pakistan-nexus threat actor has been observed targeting Indian government entities as part of spear-phishing attacks designed to deliver a Golang-based malware known as DeskRAT. The activity, observed in August and September 2025 by Sekoia, has been attributed to Transparent Tribe (aka APT36), a state-sponsored hacking group known to be active since at least 2013. It also builds upon a prior
Read More