
A significant cybersecurity breach involving Nagasaki Ship Equipment Co., Ltd. (長崎船舶装備株式会社) has come to light as the Qilin ransomware group has publicly claimed responsibility for an alleged attack.
The Qilin ransomware group has alleged that it successfully infiltrated Nagasaki Ship Equipment's systems, claiming to have exfiltrated sensitive data related to the company’s business operations.
The company, headquartered in Nagasaki, Japan, disclosed that on April 24, 2025, it detected unauthorized access to its internal servers.
According to the company’s statement, the incident led to the leakage of certain business partner information. Importantly, no personal data of employees or customers has been reported as compromised at this stage.
This revelation aligns with their ongoing modus operandi of targeting businesses tied to critical infrastructure or maritime industries.
Nagasaki Ship Equipment Co., Ltd. has not detailed the scale of the leaked business partner information. While specific details regarding the nature of the breached data have not been disclosed publicly, it is evident that the incident could have repercussions on supply chain relationships and operational trust.
The Qilin ransomware group, also known as "Qilin RaaS" (Ransomware-as-a-Service), has been active in targeting corporate systems, using sophisticated double-extortion tactics.
Typically, their methods include exploiting unpatched systems, phishing techniques, and using lateral movement to gain control over essential servers. The group is believed to operate globally, often directing its efforts toward sectors such as manufacturing, maritime, and critical infrastructure entities.