Fujifilm is investigating a likely ransomware attack that resulted in the organization closing down part of its network.
The business is investigating “doable unauthorized entry” to its server, it mentioned in a statement.

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).
➤ Get Mullvad VPN with 12% Discount
The company first recognized the “possibility” of a ransomware attack on June 1 and took swift action to discontinue all compromised devices.
“We are now working to identify the extent and the scale of the issue,” it reported on its web site, and that it “apologises to its shoppers and organization companions for the inconvenience this has induced.
“For some entities, this impacts all types of communications, such as e-mails and incoming calls, which arrive by way of the company’s network devices,” explained the business.
In an before statement, Fujifilm verified that the cyber-attack is preventing the company from accepting and processing orders.
Japanese corporations have experienced other noteworthy breaches in the latest months. In March, Yamabiko, a Tokyo-headquartered maker of electricity instruments and agricultural and industrial machinery, was evidently added to the info leak internet site made use of by the Babuk group.
In May perhaps, a subsidiary of Japanese tech giant Toshiba admitted to suffering a cybersecurity breach, reportedly triggered by the DarkSide ransomware gang.
Ransomware hackers have absent soon after greater targets in 2021. This thirty day period noticed a ransomware attack on the world’s most significant meat processing company and May perhaps saw a sophisticated ransomware attack on Bose, which resulted in the unauthorized access of personal info on existing and former staff.
Some areas of this write-up are sourced from:
www.infosecurity-journal.com