Cyber Security News

Fuji Electric Indonesia Hit by Ransomware Attack

Fuji Electric Indonesia has fallen victim to a ransomware attack, impacting its operations and raising concerns about data security and business continuity.

The attack was publicly disclosed by Fuji Electric’s headquarters on December 2, 2024, through an official notice, which highlighted the immediate steps taken by the company to address the situation and mitigate its effects.

Fuji Electric Indonesia, a subsidiary of the global energy and electrical equipment giant, has been a key player in the Southeast Asian market, providing critical infrastructure and technology solutions.

The ransomware attack has not only disrupted its internal operations but also affected its ability to deliver services to its clients. The company has been working diligently to contain the breach and restore its systems to full functionality.

Free Webinar on Best Practices for API vulnerability & Penetration Testing:  Free Registration

Upon discovering the attack, Fuji Electric Indonesia immediately activated its cybersecurity response plan. This involved shutting down affected systems to prevent further damage and initiating an investigation with the aid of cybersecurity experts.

The company is also collaborating with law enforcement agencies to identify the perpetrators behind the attack.

Details about the specific ransomware used have not been disclosed, but Fuji Electric has assured stakeholders that efforts are ongoing to recover encrypted data without succumbing to demands for ransom payments.

The incident raises critical questions about the cybersecurity measures in place within large industrial organizations and the vulnerability of such entities to sophisticated cyber threats. Ransomware attacks have become increasingly prevalent, targeting not just corporate entities but also critical infrastructure across sectors.

This attack underscores the need for robust cybersecurity protocols and continued vigilance against evolving cyber threats.

Fuji Electric has committed to keeping its customers and partners informed as it progresses through the recovery process.

In the notice, the company expressed its regret over the inconvenience caused and reaffirmed its dedication to resolving the issue promptly while reinforcing its cybersecurity defenses to prevent future incidents.

Analyse Real-World Malware & Phishing Attacks With ANY.RUN - Get up to 3 Free Licenses

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

Resecurity introduces Government Security Operations Center (GSOC) at NATO Edge 2024

Resecurity, a global leader in cybersecurity solutions, unveiled its advanced Government Security Operations Center (GSOC)…

3 hours ago

Reserachers Uncovered Zloader DNS Tunneling Tactics For Stealthy C2 Communication

Zloader, a sophisticated Trojan, has recently evolved with features that enhance its stealth and destructive…

3 hours ago

US Charged Chinese Hackers for Exploiting Thousands of Firewall

The US Treasury Department's Office of Foreign Assets Control (OFAC) has sanctioned Sichuan Silence Information…

3 hours ago

DMD Diamond Launches Open Beta for v4 Blockchain Ahead of 2025 Mainnet

DMD Diamond - one of the oldest blockchain projects in the space has announced the start…

3 hours ago

Hackers Deploy Weaponized LNK Files for Malicious Payload Delivery

Researchers reported a phishing attack on December 4th, 2024, where malicious emails purportedly from the…

3 hours ago

APT-C-60 Hackers Penetrate Org’s Network Using a Weapanized Google Drive link

The Japan Computer Emergency Response Team Coordination Center (JPCERT/CC) has confirmed an advanced cyber attack…

5 hours ago