#1 Middle East & Africa Trusted Cybersecurity News & Magazine |

33 C
Dubai
Sunday, June 22, 2025
HomeAsiaLens Giant Hoya Hit with $10 Million Ransomware Demand: A Closer Look...

Lens Giant Hoya Hit with $10 Million Ransomware Demand: A Closer Look at the Attack

Date:

Related stories

Iran’s State TV Hijacked to Broadcast Protest Videos Satellite Hack amid Rising Tensions

On 18 June 2025, Iran’s state broadcaster, Islamic Republic of Iran...

Monster 7.3 Tbps DDoS Attack Blocked by Cloudflare in Historic Mitigation

In mid‑May 2025, Cloudflare successfully deflected the largest DDoS...

CISA Adds Actively Exploited Apple and TP-Link Vulnerabilities to KEV Catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has...
spot_imgspot_imgspot_imgspot_img

Japanese optics giant Hoya Corporation, a leading manufacturer of lenses and medical equipment, recently became the target of a ransomware attack. The attack disrupted production and order processing at some of their facilities, highlighting the ongoing threat ransomware poses to businesses of all sizes.

Let’s delve deeper into the details of the attack, the ransom demand, and explore measures organizations can take to protect themselves from similar threats.

The Attack Unfolds: Disruption and Investigation

On March 30, 2024, Hoya discovered an “IT system incident” in one of their overseas offices. The incident impacted production and order processing systems at several business divisions, causing disruptions and delays. External forensic investigators determined the incident was likely caused by unauthorized access to Hoya’s servers, suggesting a ransomware attack.

Hunters International: The Culprit Behind the Demand

The cybercriminal group responsible for the attack is believed to be Hunters International, a ransomware operation known for targeting various industries. Hoya confirmed a $10 million ransom demand associated with the attack. The company has not disclosed whether they are considering paying the ransom or not.

Ransomware: A Growing Threat for Businesses

Ransomware attacks are a growing concern for businesses worldwide. These attacks involve encrypting an organization’s data, rendering it inaccessible until a ransom is paid. The attackers then threaten to leak or sell the stolen data if the ransom isn’t met.

The Hoya incident serves as a stark reminder of the potential consequences of ransomware attacks:

  • Operational Disruption: Production delays and order processing disruptions can lead to significant financial losses.
  • Data Breach Risk: If attackers exfiltrate data before encryption, it can lead to customer information leaks and reputational damage.
  • Financial Losses: Even if the ransom isn’t paid, the cost of recovering from a ransomware attack can be substantial.

10 Ways to Bolster Your Organization’s Defenses

While ransomware attacks pose a serious threat, there are steps organizations can take to mitigate the risk:

  1. Regular Backups: Maintain consistent backups of critical data to facilitate swift recovery in case of an attack.
  2. Patch Management: Prioritize timely software updates and patching of vulnerabilities to address potential security gaps.
  3. Employee Education: Train employees to identify and avoid phishing attempts, a common tactic used to gain access to systems.
  4. Endpoint Security Solutions: Deploy endpoint security solutions that monitor and protect devices from malware and unauthorized access.
  5. Network Segmentation: Implement network segmentation to isolate sensitive data and limit the potential impact of a breach.
  6. Multi-Factor Authentication (MFA): Enforce MFA wherever possible to add an extra layer of security beyond passwords.
  7. Incident Response Plan: Develop a comprehensive incident response plan outlining procedures for responding to a cyberattack.
  8. Penetration Testing: Conduct regular penetration testing to identify and address security weaknesses in systems.
  9. Cybersecurity Insurance: Consider cyber insurance to help mitigate financial losses associated with data breaches and cyberattacks.
  10. Stay Informed: Subscribe to reputable cybersecurity news sources to stay updated on emerging threats and tactics.

Conclusion

The Hoya ransomware attack underscores the importance of proactive cybersecurity measures. By prioritizing data backups, employee education, robust security solutions, and a well-defined incident response plan, organizations can significantly reduce their risk of falling victim to ransomware attacks and minimize potential damage if one occurs.

Ouaissou DEMBELE
Ouaissou DEMBELEhttp://cybercory.com
Ouaissou DEMBELE is a seasoned cybersecurity expert with over 12 years of experience, specializing in purple teaming, governance, risk management, and compliance (GRC). He currently serves as Co-founder & Group CEO of Sainttly Group, a UAE-based conglomerate comprising Saintynet Cybersecurity, Cybercory.com, and CISO Paradise. At Saintynet, where he also acts as General Manager, Ouaissou leads the company’s cybersecurity vision—developing long-term strategies, ensuring regulatory compliance, and guiding clients in identifying and mitigating evolving threats. As CEO, his mission is to empower organizations with resilient, future-ready cybersecurity frameworks while driving innovation, trust, and strategic value across Sainttly Group’s divisions. Before founding Saintynet, Ouaissou held various consulting roles across the MEA region, collaborating with global organizations on security architecture, operations, and compliance programs. He is also an experienced speaker and trainer, frequently sharing his insights at industry conferences and professional events. Ouaissou holds and teaches multiple certifications, including CCNP Security, CEH, CISSP, CISM, CCSP, Security+, ITILv4, PMP, and ISO 27001, in addition to a Master’s Diploma in Network Security (2013). Through his deep expertise and leadership, Ouaissou plays a pivotal role at Cybercory.com as Editor-in-Chief, and remains a trusted advisor to organizations seeking to elevate their cybersecurity posture and resilience in an increasingly complex threat landscape.

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Latest stories

spot_imgspot_imgspot_imgspot_img

LEAVE A REPLY

Please enter your comment!
Please enter your name here