Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Ransomware

Pharmaceutical Giant Eisai Takes Systems Offline Following Ransomware Attack

Japanese pharmaceutical company Eisai says it has taken systems offline after falling victim to a ransomware attack.

Japanese pharmaceutical giant Eisai this week announced that it has fallen victim to a ransomware attack that forced it to take certain systems offline.

Headquartered in Tokyo, the company has manufacturing facilities in Asia, Europe, and North America, and has subsidiaries on both American continents, in Asia-Pacific, Africa, and Europe. Last year, the company reported more than $5 billion in revenue.

The ransomware attack, the company says in an incident notification on its website, was identified on June 3, and resulted in the encryption of multiple servers.

Eisai says it immediately implemented its incident response plan, which involved taking systems offline to contain the attack, and launched an investigation.

“Eisai Group immediately established a company-wide task force, and is working on recovery efforts with the advice of external experts and undertaking measures to understand the scope of the incident. Additionally, Eisai Group has consulted with law enforcement,” the company announced.

The attack, Eisai says, impacted servers both in Japan and overseas, including logistics systems, which are yet to be restored. The company’s corporate websites and email systems remain operational.

Eisai says it has yet to determine whether any data was compromised or stolen during the attack.

“Any potential impact of this incident on the consolidated earnings forecast of this fiscal year is currently under careful examination,” the company also said.

Advertisement. Scroll to continue reading.

SecurityWeek is not aware of any ransomware gangs taking responsibility for this attack.

Eisai disclosed the incident roughly a week after health insurer Point32Health and biotechnology firm Enzo Biochem revealed that the personal information of millions of users was compromised in ransomware attacks.

Related: Verizon 2023 DBIR: Human Error Involved in Many Breaches, Ransomware Cost Surges

Related: Personal Information of 9 Million Individuals Stolen in MCNA Ransomware Attack

Related: 3.3 Million Impacted by Ransomware Attack at California Healthcare Provider

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Understand how to go beyond effectively communicating new security strategies and recommendations.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Ransomware

A SaaS ransomware attack against a company’s Sharepoint Online was done without using a compromised endpoint.

Cybercrime

Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.

Ransomware

Several major organizations are confirming impact from the latest zero-day exploits hitting Fortra's GoAnywhere software.

Data Breaches

Sony shares information on the impact of two recent unrelated hacker attacks carried out by known ransomware groups. 

Data Breaches

KFC and Taco Bell parent company Yum Brands says personal information was compromised in a January 2023 ransomware attack.

Ransomware

Alphv/BlackCat ransomware group files SEC complaint against MeridianLink over its failure to disclose an alleged data breach caused by the hackers.

Management & Strategy

Industry professionals comment on the recent disruption of the Hive ransomware operation and its hacking by law enforcement.