Japan’s Askul resumes limited online sales 6 weeks after ransomware attack

Japanese office and household goods retailer Askul has partially restarted online sales for corporate customers about six weeks after a ransomware attack disrupted its ordering and logistics systems.

Askul said Wednesday that corporate customers can now purchase a limited range of products on its platform and the company plans to gradually add more items as it restores its systems. Online shopping for individuals on Askul’s Lohaco website will reopen once the company fully restores its services for corporate clients. 

Since the October attack, businesses had been forced to submit orders by fax. Askul warned that deliveries may be slower than usual while operations continue to recover, and noted that it has strengthened security measures across its systems.

The attack, claimed by the ransomware group RansomHouse, exposed contact information and inquiry details from users of Askul, Lohaco and Soloel Arena, as well as supplier data stored on internal servers. The incident disrupted supply chains for several Japanese retailers, including Ryohin Keikaku, operator of the popular Muji lifestyle brand. Muji said in November that names, addresses and phone numbers of some customers may have been leaked.

Askul said shipments for corporate partners, including Ryohin Keikaku, follow a separate recovery timeline, which has not been disclosed.

The attack on Askul is part of a broader wave of disruptive ransomware incidents hitting major Japanese firms. Brewer Asahi revealed last week that a ransomware attack earlier this year potentially exposed data belonging to roughly 1.5 million customers, as well as thousands of employees, family members and external partners. The company spent two months containing the incident and is still normalizing shipments, with some products expected to face delays into February.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

Discover the AI Tools Fueling the Next Cybercrime Wave — Watch the Webinar

Next Post

Brazil Hit by Banking Trojan Spread via WhatsApp Worm and RelayNFC NFC Relay Fraud

Related Posts

Secure AI at Scale and Speed — Learn the Framework in this Free Webinar

AI is everywhere—and your company wants in. Faster products, smarter systems, fewer bottlenecks. But if you're in security, that excitement often comes with a sinking feeling. Because while everyone else is racing ahead, you're left trying to manage a growing web of AI agents you didn’t create, can’t fully see, and weren’t designed to control. Join our upcoming webinar and learn how to make AI
Read More

New Browser Security Report Reveals Emerging Threats for Enterprises

According to the new Browser Security Report 2025, security leaders are discovering that most identity, SaaS, and AI-related risks converge in a single place, the user’s browser. Yet traditional controls like DLP, EDR, and SSE still operate one layer too low. What’s emerging isn’t just a blindspot. It’s a parallel threat surface: unmanaged extensions acting like supply chain implants, GenAI
Read More

China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services

The China-linked advanced persistent threat (APT) group known as APT31 has been attributed to cyber attacks targeting the Russian information technology (IT) sector between 2024 and 2025 while staying undetected for extended periods of time. "In the period from 2024 to 2025, the Russian IT sector, especially companies working as contractors and integrators of solutions for government agencies,
Read More