Choya Umeshu, a well-regarded Japanese plum wine producer, reported a ransomware attack on September 13, 2024, which disrupted its systems and may have compromised customer and transaction data. The ransomware encrypted critical systems, halting operations temporarily. An investigation revealed that attackers gained unauthorized access to the servers of Kantsu Co., Ltd., Choya’s shipping subcontractor, potentially exposing customer details stored for shipping purposes, including names, addresses, and phone numbers.
The system outage at Kantsu’s servers, detected on September 12, was attributed to a ransomware infection that led to unauthorized access. External security specialists were brought in to assess whether any customer data had been leaked. While no evidence of misuse or secondary damage, such as unauthorized transactions, has been found, there remains a possibility of data leakage due to the extent of the attack on Kantsu’s systems. The network was shut down promptly, and shipping operations were resumed once systems were secured.
According to Choya, the compromised data did not include payment information, such as credit card details, as these were not stored with Kantsu. The affected customer records relate to those who made purchases through Choya’s online store between March 17, 2024, and September 12, 2024. To address any potential concerns, Choya has been contacting impacted customers individually via email and written notices to ensure they are informed and aware of the situation.
Choya has reported the incident to the Personal Information Protection Commission and is consulting with law enforcement authorities. The company has also enlisted external security experts to maintain continuous monitoring of its systems to prevent data leaks and further attacks. Choya has committed to enhancing security measures, restoring systems safely, and ensuring ongoing communication with affected customers. Any new developments will be promptly disclosed to all stakeholders to maintain transparency and prevent future security breaches.
Reference: