Article Details
Scrape Timestamp (UTC): 2025-11-27 13:22:33.883
Source: https://www.theregister.com/2025/11/27/asahi_ransomware_numbers/
Original Article Text
Click to Toggle View
Asahi admits ransomware gang may have spilled almost 2M people's data. Brewer finally tallies fallout from September attack as it pushes earnings into 2026. Asahi has finally done the sums on September's ransomware attack in Japan, conceding the crooks may have helped themselves to personal data tied to almost 2 million people. Back on September 29, Asahi disclosed a "system failure caused by a cyberattack" that knocked out ordering, shipping, and call center systems across its Japanese operations. Days later, the attack was claimed by the Qilin ransomware crew, which reckons it stole some 27 GB of internal files – including employee records, contracts, financial documents, and other sensitive assets. Fast forward to November 27, Asahi has finally posted a full breakdown of who and what might be affected. The tally includes 1.525 million people who contacted its customer service centers, 114,000 external contacts who received condolence or congratulatory telegrams, 107,000 current or former employees, and 168,000 of their family members. The exposed data includes names, addresses, phone numbers, email addresses, and in some cases date of birth and gender – but credit card information is not on the list. Asahi notes that the exposed data was limited to systems managed in Japan, and none has yet been published. The company also pledges to notify individuals whose data is confirmed to have been compromised – but with nearly two million people in scope, that's a mammoth mailing list. In its latest update, Asahi said attackers entered via compromised network equipment at a Group datacenter facility in Japan and deployed ransomware on the same day, encrypting data on multiple live servers and some connected PCs. This forced a broad operational suspension – order processing systems were shut down, shipments paused, and customer service lines silenced. The company isolated the datacenter within hours, but ransomware gangs don't need much time when the door is already open. The disruption even interfered with Asahi's annual earnings cadence. The company has delayed the release of its full-year earnings report for the fiscal period ending December 31 by more than 50 days past the financial year close. That's a significant delay in anyone's calendar, especially a brewer with investors, distributors, and retailers waiting for guidance. The company has made clear that it is restoring systems cautiously and in phases. Product shipments are resuming in stages as isolated systems are validated as secure. The earnings delay suggests full operational normalization will take longer than planned, with Reuters reporting that logistics may not be fully restored until February. While Asahi may be brewing again at factories, the investigation confirms a sharper flavor of exposure – personal records first, PR headache second, and earnings punted firmly into 2026. If breach disclosures were beer, this one would need a dedicated production line.
Daily Brief Summary
Asahi has confirmed a ransomware attack in September affected nearly 2 million individuals, compromising personal data such as names, addresses, and contact information.
The Qilin ransomware group claimed responsibility, reportedly stealing 27 GB of sensitive internal files, including employee records and financial documents.
The attack disrupted Asahi's operations, halting order processing, shipments, and customer service, and delaying the company's annual earnings report by over 50 days.
Entry was gained through compromised network equipment at a Japanese datacenter, with ransomware deployed on live servers and connected PCs, causing widespread operational suspension.
Asahi is notifying affected individuals and restoring systems cautiously, with product shipments resuming in phases as systems are validated for security.
The breach has significant implications for Asahi's business continuity, with logistics potentially not fully restored until February, affecting investor and distributor confidence.
This incident underscores the critical need for robust cybersecurity measures to protect sensitive data and maintain operational resilience in the face of cyber threats.