Ransomware crisis disrupts beer supplies and exposes personal data
Japan’s largest brewer, Asahi Group Holdings, is recovering from a ransomware attack that shut down digital operations across the country, slowed brewery production, and triggered drink shortages on store shelves. The incident began on September 29 when the company detected a disruption at one of its data centers. Systems were isolated within hours, yet the intruder had already moved through parts of the network, encrypted data, and disabled key services used to take orders and ship products. For days, staff reverted to pen, paper, and fax to keep deliveries moving, and some shops reported dwindling stocks of popular beers and soft drinks as shipments stalled.
- Ransomware crisis disrupts beer supplies and exposes personal data
- How the attack unfolded
- Who is Qilin and why manufacturers are at risk
- What information may be at risk
- Why a digital outage stopped the beer
- Response and recovery
- Japan confronts a wider ransomware wave
- What companies can do now
- What affected people should do
- Key Points
The company has now confirmed that personal data held in systems managed in Japan was, or may have been, exposed. Based on the preliminary investigation results published in late November, information tied to approximately 1.914 million people is at risk, including about 1.525 million customers. The company says the exposure also may affect around 107,000 current and former employees, approximately 168,000 family members of staff, and roughly 114,000 external contacts. Potentially exposed data includes names, gender, dates of birth, postal addresses, email addresses, and phone numbers. Credit card details do not appear in the compromised sets. Only 18 items of employee related personal information have been definitively confirmed as leaked, and the company is preparing notifications for those affected.
Ransomware group Qilin has claimed responsibility and listed Asahi on its leak site, asserting that it stole about 27 gigabytes of company files. While Asahi’s investigation has not confirmed a public release of stolen data, the incident forced a sweeping response across domestic operations. Shipments are gradually resuming as systems come back online, and the company has postponed the release of full year financial results to focus on restoration and security hardening. Asahi says the disruption was limited to systems in Japan, and its global brands, including Peroni, Pilsner Urquell, Grolsch, and Fuller’s Brewery in the United Kingdom, did not experience outages.
How the attack unfolded
Asahi’s internal review describes a rapid escalation. Around 7:00 a.m. Japan time on September 29, staff discovered encrypted files on the network and isolated an affected data center. Later forensic work indicates the initial breach likely began with compromised equipment at another Asahi site, allowing the attackers to move inside the network before the isolation step took place. The adversaries then pushed ransomware across multiple servers and connected devices, disrupting order entry, distribution, and customer support systems that the company depends on to run day to day operations.
Why double extortion raises the stakes
Modern ransomware attacks often involve data theft before the encryption phase, a tactic known as double extortion. The attacker steals sensitive files, then scrambles data or systems to stall operations, and finally threatens to publish the stolen content if a ransom is not paid. In this case, Qilin says it took about 9,300 files. Asahi reports that it has not seen confirmable evidence of a public data dump, yet the threat alone pressures victims to weigh business continuity, privacy risks, and reputational damage while they restore systems and investigate the breach.
Who is Qilin and why manufacturers are at risk
Qilin is a ransomware as a service operation. Rather than a single monolithic group, it runs a platform that offers malware and infrastructure to affiliates. Those affiliates break into targets and split any profits. Security researchers have tracked hundreds of claimed attacks by Qilin since its emergence in 2022. Reporting this year shows Qilin as one of the most active ransomware crews in the world, with manufacturing listed as a top sector under pressure. The group’s tools are built to hit both corporate information technology environments and, when reachable, industrial systems. Qilin’s codebase includes components in Rust and C, which can be deployed across Windows, Linux, and VMware ESXi systems. Threat intelligence also indicates that Qilin tells its affiliates to avoid targets in certain countries, including Russia and Belarus.
Ransomware operators favor companies that cannot easily mask an outage. Manufacturers fall into that category. Production lines, batch scheduling, packaging, and logistics are tightly integrated with business systems that run in data centers and the cloud. If those digital systems go dark, production suffers, even when programmable logic controllers on the factory floor remain untouched. Analysts tracking cyberattacks against manufacturers estimate that downtime can cost large firms close to two million dollars per day. In the Asia Pacific region, reported ransomware activity has risen sharply since 2024, with manufacturers among the most affected organizations.
What information may be at risk
Asahi says the only confirmed exposure so far involves 18 items of employee information from company laptops. However, on the balance of evidence, the investigation concluded that a much larger set of personal data on servers could have been accessed by the attacker. The affected categories include customers who contacted support desks, current and former employees, their family members, and external business contacts who received ceremonial messages. The company has emphasized that payment card data is not part of the compromised sets. The investigation remains active, and direct notifications will be sent to impacted individuals.
Based on Asahi’s advisory, the types of personal data that may have been exposed include:
- Full name and contact details (address, email, phone)
- Gender and date of birth
- Company relationship details for employees, former staff, and family members
- Business contact information for external partners and contacts
For those who interacted with Asahi’s customer service, the immediate risk is targeted phishing. Attackers may use real names and contact details to draft convincing messages. These messages often mimic order confirmations, refunds, or delivery notices to prompt a reply or get a recipient to click a link. Recipients should be wary of unsolicited communications and avoid opening attachments or entering credentials on sites reached through email links.
Kevin Marriott, a senior manager of cyber at Immersive, says the data theft complicates the recovery because customer trust and operational recovery timelines move on different tracks, creating pressure on the team working to restore systems. He added that it may take months to reach full stability. Asahi has not provided a final recovery date.
“The theft of customer data adds further pressure to the Asahi team, in addition to the possibility that operations may not be fully restored until February.”
Why a digital outage stopped the beer
Breweries lean on a web of connected systems that blend the enterprise and the production floor. Order management, raw material planning, batch recipes, packaging schedules, warehousing, and logistics are all orchestrated by software. If the corporate network is encrypted or taken offline, that orchestration halts. Even if tanks and bottling machines remain physically intact, the lack of order visibility and scheduling can stop the line. That is what happened across Asahi’s domestic operations, where the company said it had to process orders by hand and rely on phone and fax as contingencies.
Security teams that study industrial incidents stress that attackers often enter through the corporate network, then pivot toward equipment that supports the plant, such as servers that handle file shares, authentication, scheduling, or remote access. Without network segmentation and strong authentication, a compromise in one part of the business can cascade through different sites. The Asahi incident shows how interruptions to digital systems can idle a national distribution network in hours. Many Japanese retailers reported dwindling stocks of Asahi Super Dry, and convenience stores warned customers to expect delays. The company has restarted production at several plants and is ramping shipments as systems come back online.
In a public apology, Asahi Group President and CEO Atsushi Katsuki addressed customers, partners, and employees as the company worked to restore normal service.
“I would like to sincerely apologise for any difficulties caused to our stakeholders by the recent system disruption. We are making every effort to restore the system as quickly as possible, while implementing alternative measures to ensure continued product supply to our customers.”
Response and recovery
Asahi established an emergency response structure, brought in outside specialists, and set a multi month program to contain the breach, bring systems back online, and strengthen defenses. The company describes a broad effort to raise its baseline security, including tighter network communication controls, upgraded monitoring, new backup designs to reduce recovery time, more rigorous employee training, stronger governance, and regular external audits. Shipments are resuming in stages, and teams continue to check system integrity and rebuild parts of the network that were taken offline during containment. The company also postponed the release of full year financial results to prioritize response and recovery tasks.
Security leaders say the case underlines the need to harden the overlap between corporate IT and industrial systems. Jason Revill, global security practice technology lead at Avanade, said companies will reduce the blast radius of breaches by adopting a zero trust approach in which all access is continuously verified.
“The Asahi cyberattack highlights a growing risk in operational technology and information technology coverage networks, and why Zero Trust principles are critical for every organization.”
Japan confronts a wider ransomware wave
Ransomware is straining organizations across Japan and the wider Asia Pacific region. Japan’s National Police Agency has reported record levels of ransomware cases since 2024, and surveys of Japanese companies show shutdowns frequently last more than a week, with some stretching much longer and carrying heavy recovery costs. Recent incidents at large firms in Japan, including in optics and publishing, forced multi week suspensions and triggered material losses.
Lawmakers and agencies have moved to strengthen defenses. A new framework for active cyber defense was partially enacted in 2025, aimed at reducing harm from ongoing attacks against critical sectors. Private companies still bear the immediate burden of prevention and response. Sector experts warn that attackers are getting faster at moving through networks and encrypting systems, shrinking the window for detection and containment. That trend is visible in short timelines between initial compromise and ransomware deployment.
Chris Dimitriadis, Chief Global Strategy Officer at ISACA, warns that the speed and precision of recent attacks leave organizations little room to react without regular practice and investment.
“The window to detect and stop an attack is shrinking, with criminal tactics moving faster. Organizations need proactive cybersecurity prevention and training as core business priorities, with frequent incident response exercises and a culture of shared digital responsibility.”
What companies can do now
Brewers, food producers, and other manufacturers that rely on complex logistics can reduce risk by tackling the soft spots that ransomware crews exploit. Several steps stand out for leaders reviewing their security posture after the Asahi incident:
- Map the connection between corporate IT and plant systems, then segment networks to limit lateral movement. Enforce multi factor authentication for remote access and administrative roles.
- Harden identity systems and remove unused accounts. Monitor logins for unusual behavior and require strong passwords with phishing resistant second factors.
- Prioritize patching on internet facing equipment, remote access gateways, and directory services. Continuously monitor for vulnerabilities in both IT and operational environments.
- Build reliable, regularly tested backups that are isolated from everyday network access. Ensure the ability to restore critical business systems and plant support services quickly.
- Deploy endpoint detection and response across servers and workstations, and ensure alerting flows to a team that can triage and act around the clock.
- Create and rehearse an incident response plan with executives, legal, operations, and communications. Tabletop exercises and live drills make real events less chaotic.
- Improve supplier risk management. Review security expectations for managed service providers and critical vendors, and require timely notification of breaches.
- Inventory operational technology and supporting systems. Remove unnecessary connectivity, reduce remote access pathways, and validate changes through change control.
What affected people should do
While the investigation continues, individuals who interacted with Asahi can reduce their exposure to fraud and identity abuse by taking a few practical steps:
- Be cautious with unsolicited calls, texts, or emails that request personal information. Do not click links or open attachments from unknown senders.
- Treat any message referencing recent orders or deliveries with care. Verify directly with the company website or customer service using a trusted phone number.
- Change passwords on any accounts that use the same email address you used to contact Asahi, especially if you reused passwords. Enable multi factor authentication where available.
- Monitor bank and card statements for unusual charges. While Asahi says payment card data was not exposed, criminals may try related scams.
- Watch mailbox and email for signs of targeted phishing over the coming months. Attackers often recycle breached contact lists.
- Consider enrolling in identity protection or credit monitoring services if you believe your personal data was exposed.
Key Points
- Asahi detected a ransomware attack on September 29 that disrupted ordering, shipments, and customer support across Japan.
- Personal data tied to about 1.914 million people, including approximately 1.525 million customers, may have been exposed. Credit card data does not appear to be involved.
- Qilin claimed responsibility and says it stole about 27 gigabytes of data from Asahi. The company has not confirmed any public leak of stolen information.
- Production and deliveries were hindered as staff resorted to manual processing. Stores in Japan reported shortages, though shipments are now resuming.
- Asahi limited the disruption to domestic systems. International brands owned by the group reported no outages.
- The company is strengthening defenses with tighter network controls, new backups, enhanced monitoring, training, and outside audits.
- Experts warn that ransomware crews target manufacturers because downtime is costly and difficult to hide, and that rapid detection and network segmentation are essential.
- Japan is facing a broader ransomware surge, and authorities have taken steps to bolster national defense, while companies are urged to improve prevention and incident readiness.