Asahi Group

Asahi Group

The **Asahi Group**, a Tokyo-based multinational beverage and food company, fell victim to a **ransomware attack** by the **Qilin ransomware group**. The attackers claimed to have exfiltrated **27 GB of sensitive data**, including **personal details of employees**, **financial documents**, **budgets**, **contracts**, **business development plans**, and **forecasts**. The breach caused **significant operational disruptions**, forcing Asahi to **suspend order and shipment operations in Japan**, as well as **shut down call center and customer service desks**. While the company is gradually resuming operations through manual processes, the incident highlights severe **data exposure risks** and **business continuity threats**.The Qilin group, known for its **technically mature RaaS (Ransomware-as-a-Service) model**, has been highly active, accounting for **16% of global ransomware attacks in August 2025**. This attack follows a pattern of targeting Japanese firms, with Asahi being the latest high-profile victim. The stolen data includes **both internal employee records and critical business intelligence**, raising concerns over **long-term financial, reputational, and competitive damage**. Asahi has not publicly confirmed or denied the ransom demands, but the operational halt underscores the **severe impact on core business functions**.

Source: https://www.infosecurity-magazine.com/news/qilin-ransomware-asahi-cyber-attack/

TPRM report: https://www.rankiteo.com/company/asahigroup-holdings

"id": "asa2592025100725",
"linkid": "asahigroup-holdings",
"type": "Ransomware",
"date": "8/2025",
"severity": "100",
"impact": "5",
"explanation": "Attack threatening the organization's existence"
{'affected_entities': [{'industry': ['beverage (alcoholic and non-alcoholic)',
                                     'food products'],
                        'location': 'Tokyo, Japan',
                        'name': 'Asahi Group',
                        'size': 'large (global brands: Asahi, Peroni, Kozer, '
                                'Pilsner Urquell, Grolsch, Fullers)',
                        'type': 'corporation'}],
 'data_breach': {'data_exfiltration': 'yes (27 GB of files stolen)',
                 'personally_identifiable_information': 'yes (employee '
                                                        'details)',
                 'sensitivity_of_data': 'high (includes personally '
                                        'identifiable and business-sensitive '
                                        'information)',
                 'type_of_data_compromised': ['personal details (employees)',
                                              'financial documents',
                                              'budgets',
                                              'contracts',
                                              'plans',
                                              'development forecasts']},
 'date_publicly_disclosed': '2025-10-07',
 'description': 'The Qilin ransomware group claimed responsibility for a '
                'cyber-attack on Japan’s Asahi Group, alleging the theft of 27 '
                'GB of sensitive data, including employee personal details, '
                'financial documents, budgets, contracts, plans, and '
                'development forecasts. The attack caused significant '
                'operational disruption, including the suspension of order and '
                'shipment operations, as well as call center services in '
                'Japan. Asahi is in the process of resuming operations with '
                'manual processes.',
 'impact': {'brand_reputation_impact': 'potential negative impact due to data '
                                       'breach and operational disruption',
            'data_compromised': ['employee personal details',
                                 'financial documents',
                                 'budgets',
                                 'contracts',
                                 'plans',
                                 'development forecasts'],
            'downtime': 'ongoing (partial recovery with manual processes)',
            'identity_theft_risk': 'high (employee personal details '
                                   'compromised)',
            'operational_impact': ['suspended order and shipment operations',
                                   'suspended call center operations (customer '
                                   'service desks)'],
            'systems_affected': ['servers',
                                 'order and shipment systems',
                                 'call center operations']},
 'initial_access_broker': {'data_sold_on_dark_web': 'likely (Qilin operates a '
                                                    'data leak site)',
                           'high_value_targets': ['employee data',
                                                  'financial and business '
                                                  'documents']},
 'investigation_status': 'ongoing (Asahi has not responded to Qilin’s claims)',
 'motivation': 'financial gain (ransomware-as-a-service)',
 'ransomware': {'data_exfiltration': 'yes (27 GB)',
                'ransomware_strain': 'Qilin'},
 'references': [{'date_accessed': '2025-10-07', 'source': 'Comparitech'},
                {'source': 'ZeroFox Q3 2025 Ransomware Roundup'},
                {'source': 'NCC Group August 2025 Ransomware Report'}],
 'response': {'incident_response_plan_activated': 'yes (manual order and '
                                                  'shipping processes '
                                                  'initiated)',
              'recovery_measures': ['manual order and shipping processes']},
 'threat_actor': 'Qilin ransomware group',
 'title': 'Qilin Ransomware Attack on Asahi Group',
 'type': ['ransomware', 'data breach']}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.