Cyber Security News

Fuji Electric Indonesia Hit by Ransomware Attack

Fuji Electric Indonesia has fallen victim to a ransomware attack, impacting its operations and raising concerns about data security and business continuity.

The attack was publicly disclosed by Fuji Electric’s headquarters on December 2, 2024, through an official notice, which highlighted the immediate steps taken by the company to address the situation and mitigate its effects.

Fuji Electric Indonesia, a subsidiary of the global energy and electrical equipment giant, has been a key player in the Southeast Asian market, providing critical infrastructure and technology solutions.

The ransomware attack has not only disrupted its internal operations but also affected its ability to deliver services to its clients. The company has been working diligently to contain the breach and restore its systems to full functionality.

Free Webinar on Best Practices for API vulnerability & Penetration Testing:  Free Registration

Upon discovering the attack, Fuji Electric Indonesia immediately activated its cybersecurity response plan. This involved shutting down affected systems to prevent further damage and initiating an investigation with the aid of cybersecurity experts.

The company is also collaborating with law enforcement agencies to identify the perpetrators behind the attack.

Details about the specific ransomware used have not been disclosed, but Fuji Electric has assured stakeholders that efforts are ongoing to recover encrypted data without succumbing to demands for ransom payments.

The incident raises critical questions about the cybersecurity measures in place within large industrial organizations and the vulnerability of such entities to sophisticated cyber threats. Ransomware attacks have become increasingly prevalent, targeting not just corporate entities but also critical infrastructure across sectors.

This attack underscores the need for robust cybersecurity protocols and continued vigilance against evolving cyber threats.

Fuji Electric has committed to keeping its customers and partners informed as it progresses through the recovery process.

In the notice, the company expressed its regret over the inconvenience caused and reaffirmed its dedication to resolving the issue promptly while reinforcing its cybersecurity defenses to prevent future incidents.

Analyse Real-World Malware & Phishing Attacks With ANY.RUN - Get up to 3 Free Licenses

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

Attackers Exploit Microsoft Entra Billing Roles to Escalate Privileges in Organizational Environments

A startling discovery by BeyondTrust researchers has unveiled a critical vulnerability in Microsoft Entra ID…

2 days ago

Threat Actors Exploit Google Apps Script to Host Phishing Sites

The Cofense Phishing Defense Center has uncovered a highly strategic phishing campaign that leverages Google…

2 days ago

Dadsec Hacker Group Uses Tycoon2FA Infrastructure to Steal Office365 Credentials

Cybersecurity researchers from Trustwave’s Threat Intelligence Team have uncovered a large-scale phishing campaign orchestrated by…

2 days ago

Beware: Weaponized AI Tool Installers Infect Devices with Ransomware

Cisco Talos has uncovered a series of malicious threats masquerading as legitimate AI tool installers,…

2 days ago

Pure Crypter Uses Multiple Evasion Methods to Bypass Windows 11 24H2 Security Features

Pure Crypter, a well-known malware-as-a-service (MaaS) loader, has been recognized as a crucial tool for…

2 days ago

Attackers Exploit Microsoft Entra Billing Roles to Escalate Privileges

A recent discovery by security researchers at BeyondTrust has revealed a critical, yet by-design, security…

2 days ago