Tuesday, March 11, 2025
HomeCyber Security NewsCasio Hacked - Servers Compromised by a Ransomware Attack

Casio Hacked – Servers Compromised by a Ransomware Attack

Published on

SIEM as a Service

Follow Us on Google News

Casio Computer Co., Ltd. has confirmed a significant cybersecurity breach after its servers were targeted in a sophisticated ransomware attack.

The incident, which occurred on October 5, prompted an immediate forensic investigation involving external security specialists.

Casio deeply regrets any inconvenience this has caused to customers and stakeholders. The investigation revealed that unauthorized access was obtained overseas, leading to system failures and the potential leak of sensitive internal documents.

Casio has issued a series of updates, including a prior notice on October 8 regarding the unauthorized access and its consequences.

Investigation Findings

Preliminary findings indicate that while Casio has taken considerable steps to enhance its cybersecurity posture in response to a rising wave of cyber threats, gaps in defenses against phishing emails and the security of its global network—including overseas offices—were exploited.

Fortunately, the investigation did not reveal any compromise of customer databases or personal information systems.

However, it has been confirmed that sensitive internal documents containing the personal information of employees and business partners were leaked. The company is diligently working to identify affected individuals and will reach out to them directly.

Personal Information Exposed

The leaked data includes:

  • Employee Information: Details of 6,456 individuals, including names, employee numbers, emails, and internal affiliations. A subset of employees had additional personal information such as gender, date of birth, and even family details disclosed.
  • Business Partner Data: Information on 1,931 contacts across Casio and its subsidiaries, including names, email addresses, and company details.
  • Customer Information: Personal details for 91 customers, specifically related to purchases requiring delivery and installation.

While sensitive internal documents were exposed, Casio clarified that no credit card information or insider-related data was compromised.

In light of this incident, Casio is enhancing its IT security protocols across all operations, especially in its overseas offices.

The company has committed to a thorough review of its information management systems and fortifying employee training regarding cybersecurity practices.

Most services affected by the attack have resumed, although some individual services remain temporarily suspended. Casio has expressed sincere apologies for the disruption faced by its users and stakeholders.

Casio has noted that some employees have received unsolicited spam emails possibly linked to the breach.

The company urges those affected to refrain from sharing sensitive information via social media to mitigate potential secondary damage.

Casio is cooperating closely with authorities to address this issue and to take action against any malicious activities stemming from the incident.

Casio is dedicated to rectifying this breach and ensuring the continued security of its systems. The company reaffirms its commitment to providing reliable products and services while fostering a safe working environment for its employees and partners.

Casio extends its deep apologies for any distress caused by this unfortunate event.

ANY.RUN Threat Intelligence Lookup - Extract Millions of IOC's for Interactive Malware Analysis: Try for Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Threat Actors Evade Security Measures to Launch SIM Swap Attacks

SIM swapping fraud continues to pose a significant threat to individuals and financial institutions,...

Ebyte Ransomware Targets Windows Users with Advanced Encryption Techniques

A new ransomware variant, known as Ebyte Ransomware, has emerged as a significant threat...

macOS NULL Pointer Dereference Vulnerability Allow Attackers Exploits Kernel

Historically, NULL pointer dereferences have been a significant vulnerability in operating systems, including macOS....

Apache Camel Vulnerability Allows Attackers to Inject Arbitrary Headers

A newly disclosed security vulnerability in Apache Camel, tracked as CVE-2025-27636, has raised alarms across...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Threat Actors Evade Security Measures to Launch SIM Swap Attacks

SIM swapping fraud continues to pose a significant threat to individuals and financial institutions,...

Ebyte Ransomware Targets Windows Users with Advanced Encryption Techniques

A new ransomware variant, known as Ebyte Ransomware, has emerged as a significant threat...

macOS NULL Pointer Dereference Vulnerability Allow Attackers Exploits Kernel

Historically, NULL pointer dereferences have been a significant vulnerability in operating systems, including macOS....