Japan’s Askul resumes limited online sales 6 weeks after ransomware attack

Japanese office and household goods retailer Askul has partially restarted online sales for corporate customers about six weeks after a ransomware attack disrupted its ordering and logistics systems.

Askul said Wednesday that corporate customers can now purchase a limited range of products on its platform and the company plans to gradually add more items as it restores its systems. Online shopping for individuals on Askul’s Lohaco website will reopen once the company fully restores its services for corporate clients. 

Since the October attack, businesses had been forced to submit orders by fax. Askul warned that deliveries may be slower than usual while operations continue to recover, and noted that it has strengthened security measures across its systems.

The attack, claimed by the ransomware group RansomHouse, exposed contact information and inquiry details from users of Askul, Lohaco and Soloel Arena, as well as supplier data stored on internal servers. The incident disrupted supply chains for several Japanese retailers, including Ryohin Keikaku, operator of the popular Muji lifestyle brand. Muji said in November that names, addresses and phone numbers of some customers may have been leaked.

Askul said shipments for corporate partners, including Ryohin Keikaku, follow a separate recovery timeline, which has not been disclosed.

The attack on Askul is part of a broader wave of disruptive ransomware incidents hitting major Japanese firms. Brewer Asahi revealed last week that a ransomware attack earlier this year potentially exposed data belonging to roughly 1.5 million customers, as well as thousands of employees, family members and external partners. The company spent two months containing the incident and is still normalizing shipments, with some products expected to face delays into February.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

Discover the AI Tools Fueling the Next Cybercrime Wave — Watch the Webinar

Next Post

Brazil Hit by Banking Trojan Spread via WhatsApp Worm and RelayNFC NFC Relay Fraud

Related Posts

Critical Node.js Vulnerability Can Cause Server Crashes via async_hooks Stack Overflow

Node.js has released updates to fix what it described as a critical security issue impacting "virtually every production Node.js app" that, if successfully exploited, could trigger a denial-of-service (DoS) condition. "Node.js/V8 makes a best-effort attempt to recover from stack space exhaustion with a catchable error, which frameworks have come to rely on for service availability," Node.js's
Read More

CrashFix Chrome Extension Delivers ModeloRAT Using ClickFix-Style Browser Crash Lures

Cybersecurity researchers have disclosed details of an ongoing campaign dubbed KongTuke that used a malicious Google Chrome extension masquerading as an ad blocker to deliberately crash the web browser and trick victims into running arbitrary commands using ClickFix-like lures to deliver a previously undocumented remote access trojan (RAT) dubbed ModeloRAT. This new escalation of ClickFix has
Read More

Trend Micro Apex Central RCE Flaw Scores 9.8 CVSS in On-Prem Windows Versions

Trend Micro has released security updates to address multiple security vulnerabilities impacting on-premise versions of Apex Central for Windows, including a critical bug that could result in arbitrary code execution. The vulnerability, tracked as CVE-2025-69258, carries a CVSS score of 9.8 out of a maximum of 10.0. The vulnerability has been described as a case of remote code execution
Read More