Japanese Optics Giant Hoya Corporation Hit by Hunters International Ransomware

Hoya Corporation Disrupted by Hunters International Ransomware; $10M Ransom Demanded

CRITICAL
April 27, 2026
4m read
RansomwareData BreachCyberattack

Impact Scope

Affected Companies

Hoya Corporation

Industries Affected

ManufacturingHealthcare

Geographic Impact

Japan (global)

Related Entities

Threat Actors

Hunters International

Full Report

Executive Summary

Hoya Corporation, a leading Japanese manufacturer of optical products including lenses and medical equipment, confirmed in April 2024 that it had suffered a significant ransomware attack. The attack, attributed to the Hunters International ransomware group, disrupted the company's production capabilities and order processing systems. The threat actors employed a double-extortion strategy, not only encrypting Hoya's data but also claiming to have exfiltrated 2 terabytes of files. They demanded a $10 million ransom. This attack underscores the vulnerability of the manufacturing sector to cybercrime and the severe operational and financial consequences that can result from a successful ransomware incident.

Threat Overview

The Hunters International ransomware group is a relatively new but active player in the ransomware landscape, believed to be a rebrand or offshoot of the notorious Hive ransomware operation. The group operates a Ransomware-as-a-Service (RaaS) model and is known for its aggressive tactics and double-extortion model. Their typical attack pattern involves gaining initial access to a network, moving laterally to compromise as many systems as possible, exfiltrating sensitive data, and then deploying the ransomware to encrypt files.

Technical Analysis

While the specific initial access vector for the Hoya breach was not disclosed, ransomware groups like Hunters International commonly use methods such as:

  • Exploiting unpatched vulnerabilities in public-facing services (e.g., VPNs, RDP).
  • Phishing campaigns to steal employee credentials.
  • Using stolen credentials purchased from initial access brokers.

Once inside the network, the attackers would have likely used tools like Cobalt Strike or Mimikatz to escalate privileges, move laterally, and identify high-value data. The exfiltration of 2 TB of data would have occurred prior to the final encryption stage.

MITRE ATT&CK Mapping

Impact Assessment

The attack on Hoya Corporation has had a multi-faceted impact:

  • Operational Disruption: The shutdown of production and ordering systems directly impacts revenue and customer relationships. For a manufacturer, this can halt the entire supply chain.
  • Financial Cost: The direct costs include the potential ransom payment, incident response and recovery efforts, and lost revenue. The $10 million demand is a significant financial threat.
  • Data Breach: The alleged theft of 1.7 million files could expose sensitive intellectual property, employee data, and customer information, leading to regulatory fines (e.g., under GDPR) and lawsuits.
  • Reputational Damage: A major cyberattack can damage a company's reputation and erode customer trust.

IOCs — Directly from Articles

No specific Indicators of Compromise (IOCs) were provided in the source articles.

Cyber Observables — Hunting Hints

To hunt for activity related to Hunters International and similar ransomware groups:

Type
Process Name
Value
Cobalt Strike beacon
Description
Monitor for the presence of common C2 framework beacons on endpoints and servers.
Type
Command Line Pattern
Value
vssadmin.exe delete shadows
Description
Look for commands used to delete volume shadow copies to prevent easy recovery.
Type
Network Traffic Pattern
Value
Large, unexpected data outflows
Description
Monitor for unusually large data transfers from your network to unknown external destinations.

Detection & Response

  • Endpoint Detection and Response (EDR): An EDR solution is critical for detecting the lateral movement and defense evasion techniques used by ransomware groups before the final encryption stage.
  • Network Monitoring: Monitor network traffic for large-scale data exfiltration and C2 communications. D3FEND's Network Traffic Analysis is crucial.
  • Backup Integrity: Regularly test your backups and ensure they are stored offline or in an immutable format, isolated from the primary network.

Mitigation

  1. Secure Initial Access Vectors: Patch all public-facing systems, enforce strong MFA on all remote access solutions, and conduct regular phishing awareness training.
  2. Network Segmentation: Segment the network to separate critical manufacturing systems (OT) from the corporate IT network. This can limit the spread of a ransomware infection.
  3. Immutable Backups: Maintain offline, immutable backups of all critical data. This is the most important mitigation for recovering from a ransomware attack without paying the ransom. This is an application of D3FEND's File Restoration capability.
  4. Principle of Least Privilege: Ensure that user and service accounts have only the minimum permissions necessary to perform their functions. This can slow down or stop an attacker's lateral movement.

Timeline of Events

1
April 27, 2026
This article was published

MITRE ATT&CK Mitigations

While this refers to data at rest, the key mitigation for ransomware is having secure, offline backups.

Mapped D3FEND Techniques:

Segmenting IT and OT networks can prevent a ransomware infection on the corporate side from spreading to critical production systems.

Mapped D3FEND Techniques:

Enforcing MFA on all remote access points is a critical first line of defense against initial access via stolen credentials.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

The cornerstone of ransomware resilience is a robust backup and restoration strategy. Hoya Corporation's ability to recover without paying the $10 million ransom depends entirely on this. Organizations must implement the 3-2-1 backup rule: three copies of data, on two different media types, with one copy off-site and offline (or immutable). Backups must be regularly tested to ensure they are viable. For manufacturing environments, this must include not just data but also system images and configurations for critical OT and SCADA systems. By having secure, tested backups, an organization can restore its operations, rendering the encryption part of the ransomware attack ineffective and removing the primary leverage for the ransom demand.

To detect a ransomware attack like the one on Hoya before it reaches the final encryption stage, organizations need to employ advanced process behavior analysis, typically through an EDR solution. Configure your EDR to detect the precursor activities of a ransomware attack. This includes alerting on processes that attempt to disable security tools, delete volume shadow copies (vssadmin.exe), or enumerate network shares on a large scale. Crucially, monitor for processes that rapidly read, encrypt, and write a large number of files. This 'file entropy' analysis can often detect the ransomware executable in the act and terminate it before it can do widespread damage. This technique shifts the defense from trying to block a known file hash to blocking a malicious behavior, which is far more effective against new or polymorphic ransomware variants.

Sources & References

Ransomware attacks in 2024 | Kaspersky official blog
Kaspersky (blog.kaspersky.com) January 31, 2025
Major Cyber Attacks, Data Breaches & Ransomware Attacks in April 2024
Security and Compliance (securityandcompliance.com) May 1, 2024

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

ransomwareHunters InternationalHoya Corporationmanufacturingdata breachcyberattack

📢 Share This Article

Help others stay informed about cybersecurity threats