Cyber Security News

Fuji Electric Indonesia Hit by Ransomware Attack

Fuji Electric Indonesia has fallen victim to a ransomware attack, impacting its operations and raising concerns about data security and business continuity.

The attack was publicly disclosed by Fuji Electric’s headquarters on December 2, 2024, through an official notice, which highlighted the immediate steps taken by the company to address the situation and mitigate its effects.

Fuji Electric Indonesia, a subsidiary of the global energy and electrical equipment giant, has been a key player in the Southeast Asian market, providing critical infrastructure and technology solutions.

The ransomware attack has not only disrupted its internal operations but also affected its ability to deliver services to its clients. The company has been working diligently to contain the breach and restore its systems to full functionality.

Free Webinar on Best Practices for API vulnerability & Penetration Testing:  Free Registration

Upon discovering the attack, Fuji Electric Indonesia immediately activated its cybersecurity response plan. This involved shutting down affected systems to prevent further damage and initiating an investigation with the aid of cybersecurity experts.

The company is also collaborating with law enforcement agencies to identify the perpetrators behind the attack.

Details about the specific ransomware used have not been disclosed, but Fuji Electric has assured stakeholders that efforts are ongoing to recover encrypted data without succumbing to demands for ransom payments.

The incident raises critical questions about the cybersecurity measures in place within large industrial organizations and the vulnerability of such entities to sophisticated cyber threats. Ransomware attacks have become increasingly prevalent, targeting not just corporate entities but also critical infrastructure across sectors.

This attack underscores the need for robust cybersecurity protocols and continued vigilance against evolving cyber threats.

Fuji Electric has committed to keeping its customers and partners informed as it progresses through the recovery process.

In the notice, the company expressed its regret over the inconvenience caused and reaffirmed its dedication to resolving the issue promptly while reinforcing its cybersecurity defenses to prevent future incidents.

Analyse Real-World Malware & Phishing Attacks With ANY.RUN - Get up to 3 Free Licenses

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

Critical Ivanti CSA Vulnerability Allows Attackers Remote Code Execution to Gain Restricted Access

A critical vulnerability has been discovered in the Ivanti Cloud Services Application (CSA), potentially allowing…

17 minutes ago

Critical OpenSSL Vulnerability Let Attackers Launch Man-in-the-Middle Attacks

A high-severity security vulnerability (CVE-2024-12797) has been identified in OpenSSL, one of the most widely…

51 minutes ago

Fortinet FortiOS & FortiProxy Zero-Day Exploited to Hijack Firewall & Gain Super Admin Access

Cybersecurity firm Fortinet has issued an urgent warning regarding a newly discovered zero-day authentication bypass…

10 hours ago

Microsoft Patch Tuesday February 2025: 61 Vulnerabilities Including 25 RCE & 3 0-Day

Microsoft has released its highly anticipated Patch Tuesday security updates for February 2025, addressing a…

11 hours ago

Preventing Attackers from Permanently Deleting Entra ID Accounts with Protected Actions

Microsoft Entra ID has introduced a robust mechanism called protected actions to mitigate the risks…

12 hours ago

Beyond the Horizon: Assessing the Viability of Single-Bit Fault Injection Attacks

The realm of fault injection attacks has long intrigued researchers and security professionals. Among these,…

12 hours ago