Qilin Ransomware Group Claims Responsibility for Breach of Nagasaki Ship Equipment Co., Ltd.

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity & Streaming Writer

A significant cybersecurity breach involving Nagasaki Ship Equipment Co., Ltd. (長崎船舶装備株式会社) has come to light as the Qilin ransomware group has publicly claimed responsibility for an alleged attack. 

The Qilin ransomware group has alleged that it successfully infiltrated Nagasaki Ship Equipment's systems, claiming to have exfiltrated sensitive data related to the company’s business operations.

The company, headquartered in Nagasaki, Japan, disclosed that on April 24, 2025, it detected unauthorized access to its internal servers. 

According to the company’s statement, the incident led to the leakage of certain business partner information. Importantly, no personal data of employees or customers has been reported as compromised at this stage.

Qilin Nagasaki Ship Equipment
Qilin Nagasaki Ship Equipment | Source: HackManac on X

This revelation aligns with their ongoing modus operandi of targeting businesses tied to critical infrastructure or maritime industries.

Nagasaki Ship Equipment Co., Ltd. has not detailed the scale of the leaked business partner information. While specific details regarding the nature of the breached data have not been disclosed publicly, it is evident that the incident could have repercussions on supply chain relationships and operational trust.

The Qilin ransomware group, also known as "Qilin RaaS" (Ransomware-as-a-Service), has been active in targeting corporate systems, using sophisticated double-extortion tactics. 

Typically, their methods include exploiting unpatched systems, phishing techniques, and using lateral movement to gain control over essential servers. The group is believed to operate globally, often directing its efforts toward sectors such as manufacturing, maritime, and critical infrastructure entities.


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: