> Back to All Posts

Askul Data Breach Confirms 740,000 Records Stolen

Askul data breach

The Askul data breach has confirmed a significant ransomware incident involving one of Japan’s largest office supply and e-commerce companies. After weeks of investigation, Askul revealed that attackers stole roughly 740,000 customer records during a cyberattack that disrupted internal systems and logistics operations.

What initially appeared to be a technical failure later proved to be a coordinated ransomware intrusion linked to the RansomHouse group. The incident highlights how modern ransomware campaigns increasingly prioritize data theft and extortion over simple system encryption.

How the Attack Was Discovered

Askul detected the incident in October 2025 after internal systems began failing and order processing was disrupted. As response teams investigated the outage, they uncovered signs of unauthorized access across multiple systems, indicating a deliberate attack rather than an isolated malfunction.

Further analysis confirmed that attackers had moved through the network, deployed ransomware, and exfiltrated sensitive data. RansomHouse later claimed responsibility and published samples of the stolen information, following its usual pressure-based extortion strategy.

Once the scope became clear, Askul reported the breach to Japan’s Personal Information Protection Commission and began notifying affected parties.

Scope of the Stolen Data

The Askul data breach affected a broad range of records tied to both customers and business operations. Investigators determined that approximately 590,000 records related to business customer service accounts, reflecting Askul’s strong focus on corporate clients.

Another 132,000 records belonged to individual customers. In addition, roughly 15,000 business partner records and about 2,700 records linked to executives and employees were confirmed as stolen.

Askul stated that it has not confirmed the exposure of payment card information. The company continues forensic reviews to verify that no financial data was compromised.

Operational Disruption and Business Impact

Beyond data exposure, the ransomware attack caused significant operational disruption. Automated logistics systems and internal order processing tools were taken offline, leading to shipment delays and service interruptions across the business.

Askul temporarily suspended online sales while stabilizing affected systems. Limited ordering later resumed as restoration efforts progressed, though full recovery required staged system reactivation.

The incident illustrates how cyberattacks against digital infrastructure can quickly translate into real-world supply chain disruptions, especially for logistics-driven businesses.

How Attackers Gained Access

Investigators believe the attackers gained initial access through compromised credentials associated with an outsourced partner. The account reportedly lacked multi-factor authentication, making it a weak entry point into Askul’s environment.

After gaining access, the attackers conducted internal reconnaissance, disabled security tools, and deleted backups to hinder recovery efforts. These steps increased operational pressure and strengthened the extortion phase of the attack.

RansomHouse’s Extortion Strategy

RansomHouse operates as a data-extortion-focused ransomware group, emphasizing public leaks over prolonged encryption. Its approach relies on reputational damage and regulatory consequences to force victims into negotiations.

In the Askul data breach, the group released stolen data after talks failed, reinforcing its reputation for aggressive disclosure tactics rather than quiet settlements.

Final Thoughts

The Askul data breach demonstrates how ransomware attacks now extend far beyond locked systems and ransom notes. Data theft, third-party access risks, and operational downtime have become central to the damage these incidents cause.

For organizations relying on complex vendor ecosystems, the attack underscores the importance of strict access controls, enforced authentication, and continuous monitoring. As ransomware groups continue refining extortion tactics, preventing initial compromise remains the most effective defense.

Janet Andersen

Janet is an experienced content creator with a strong focus on cybersecurity and online privacy. With extensive experience in the field, she’s passionate about crafting in-depth reviews and guides that help readers make informed decisions about digital security tools. When she’s not managing the site, she loves staying on top of the latest trends in the digital world.