Fujifilm is investigating a likely ransomware attack that resulted in the organization closing down part of its network.
The business is investigating “doable unauthorized entry” to its server, it mentioned in a statement.
Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.
Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).
➤ Activate Your Coupon Code
The company first recognized the “possibility” of a ransomware attack on June 1 and took swift action to discontinue all compromised devices.
“We are now working to identify the extent and the scale of the issue,” it reported on its web site, and that it “apologises to its shoppers and organization companions for the inconvenience this has induced.
“For some entities, this impacts all types of communications, such as e-mails and incoming calls, which arrive by way of the company’s network devices,” explained the business.
In an before statement, Fujifilm verified that the cyber-attack is preventing the company from accepting and processing orders.
Japanese corporations have experienced other noteworthy breaches in the latest months. In March, Yamabiko, a Tokyo-headquartered maker of electricity instruments and agricultural and industrial machinery, was evidently added to the info leak internet site made use of by the Babuk group.
In May perhaps, a subsidiary of Japanese tech giant Toshiba admitted to suffering a cybersecurity breach, reportedly triggered by the DarkSide ransomware gang.
Ransomware hackers have absent soon after greater targets in 2021. This thirty day period noticed a ransomware attack on the world’s most significant meat processing company and May perhaps saw a sophisticated ransomware attack on Bose, which resulted in the unauthorized access of personal info on existing and former staff.
Some areas of this write-up are sourced from:
www.infosecurity-journal.com