Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Incidents

Asahi Breach Hits Two Million Users

November 28, 2025
Reading Time: 4 mins read
in Incidents
Qilin Ransomware Hits Korean MSP

The Japanese beer corporation Asahi disclosed on a recent Thursday that a disruptive ransomware attack in September successfully exfiltrated the personal information of about two million individuals. The incident was revealed on the same day it occurred, September 29th, and led to the continued partial disruption of the company’s operations in Japan as systems were gradually brought back online. The Qilin ransomware group later claimed responsibility in early October by adding Asahi to its dark web leak site and alleging the theft of 27 gigabytes of data from the company’s systems, confirming earlier announcements from Asahi that data had been compromised.

The personal data stolen affects several groups, with the largest being 1,525,000 individuals who had contacted Asahi’s customer services, whose names, addresses, phone numbers, and email addresses were compromised. Additionally, the attackers stole names, addresses, and phone numbers for 114,000 people who had received congratulatory or condolence messages from Asahi. For employees, the breach impacted 107,000 individuals, compromising their names, addresses, phone numbers, email addresses, dates of birth, and gender information. The data of 168,000 family members of current and former employees was also stolen, including names, dates of birth, and gender. The company confirmed, however, that the compromised information varied by individual and that no credit card data was exfiltrated, further noting that no instances of the data being published have been confirmed as of a recent Tuesday.

Asahi detailed that the threat actors initiated the breach by hacking network equipment, which they then used to compromise the company’s data center network. This action allowed the attackers to simultaneously deploy ransomware, encrypting data on numerous active servers and various PC devices connected to the network. The company has since been working to contain the ransomware and has committed to restoring systems and devices only in phases after they are confirmed to be secured and clean of malware.

Group president and CEO Atsushi Katsuki stated that Asahi is making every effort to achieve a full system restoration as quickly as possible while implementing measures to prevent recurrence and strengthening information security across the entire organization. Katsuki acknowledged the continued inconvenience but noted that product shipments are resuming in stages as the system recovery progresses. The company’s focus remains on a careful, phased approach to ensure long-term security.

An industry expert noted that the Qilin group is known for leaking data when a ransom is not paid and advised Asahi’s customers to remain vigilant for further updates. The expert emphasized that recovering manufacturing networks, such as Asahi’s, is a time-consuming process due to their complex structure, which may include legacy systems, shadow IT, and connections to supply chains. Because of the complexity and the need to ensure all traces of the compromise are removed, the full return to normalized operations is anticipated to take several months, potentially until February.

Reference:

  • Asahi Data Breach Exposes Personal Information Of Two Million Individuals
Tags: cyber incidentsCyber Incidents 2025Cyber threatsNovember 2025
ADVERTISEMENT

Related Posts

Qilin Ransomware Hits Korean MSP

Mazda Reports No Impact From Oracle Hack

November 28, 2025
Qilin Ransomware Hits Korean MSP

Qilin Ransomware Hits Korean MSP

November 28, 2025
Situsamc Confirms Customer Data Breach

Multiple London Councils Hit By Cyber Attacks

November 27, 2025
Situsamc Confirms Customer Data Breach

Russian Hackers Target US Engineering Firm

November 27, 2025
Situsamc Confirms Customer Data Breach

Situsamc Confirms Customer Data Breach

November 27, 2025
Hacker Takes Over Houston Radio Airwaves

Exchange Online Outage Blocks Mail

November 26, 2025

Latest Alerts

Bloody Wolf Widens Java RAT Campaign

Forge Library Patch Stops Signature Bypass

ShadowV2 Botnet Tests During AWS Outage

Toddycat Tools Steal Outlook And M365 Data

Hackers Use Blender Assets To Spread StealC

ASUS Flags Critical AiCloud Router Flaw

Subscribe to our newsletter

    Latest Incidents

    Mazda Reports No Impact From Oracle Hack

    Asahi Breach Hits Two Million Users

    Qilin Ransomware Hits Korean MSP

    Multiple London Councils Hit By Cyber Attacks

    Russian Hackers Target US Engineering Firm

    Situsamc Confirms Customer Data Breach

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial