Asahi Group Holdings Ltd., Japan's largest brewing company, has been severely crippled by a ransomware attack that occurred over a month ago. The attack has disabled its central online system for managing orders and shipments, leading to a catastrophic breakdown in its supply chain. The company is now operating at just 10% of its normal shipment capacity, relying on manual processes like phone calls and faxes. This disruption comes at the worst possible time, just before the peak December sales season. The incident has also forced Asahi to delay its third-quarter earnings report due to an inability to access necessary financial data. This attack serves as a stark warning about the devastating impact of ransomware on manufacturing and supply chain operations, especially for organizations reliant on a mix of modern and legacy IT systems.
Details about the specific ransomware group responsible or the initial access vector have not been publicly disclosed. However, the outcome is characteristic of a 'big game hunting' ransomware operation, where attackers specifically target large corporations to cause maximum disruption and extort a significant ransom. The attackers successfully compromised and disabled Asahi's internal online system, which appears to be the central nervous system of its logistics operations.
The business impact on Asahi is severe and multifaceted:
This incident is a textbook example of how ransomware has evolved from simple data encryption to a tool capable of causing kinetic-like effects on physical supply chains.
For organizations facing a similar attack, the response should focus on containment and recovery:
Network Isolation.File Restoration is the core principle here.T1547 - Boot or Logon Autostart Execution) before bringing the network back online.To prevent such attacks, organizations must adopt a defense-in-depth strategy:
M1032 - Multi-factor Authentication).M1051 - Update Software).M1030 - Network Segmentation): Segment IT and OT networks. Prevent lateral movement by restricting communication between different network zones. A workstation compromise should not be able to reach critical manufacturing or logistics servers.Asahi Group's September 2025 ransomware attack attributed to Qilin group. Ongoing production cuts, product shortages, and market share loss persist.
The ransomware attack on Asahi Group Holdings, now attributed to the Qilin group, occurred in September 2025. Reports from November 27, 2025, confirm the company is still experiencing severe operational and financial consequences. The incident has forced ongoing production cuts, leading to product shortages and a significant loss of market share to competitors. The attack crippled manufacturing, supply chain, and communication systems, necessitating a temporary return to manual processes like fax machines, highlighting the deep impact on both IT and OT environments.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats