Ransomware victim disclosure
← All victimsFujitsu Limited
listed as fujitsu.com · Claimed by Marketo · listed 4 years ago
Status timeline
- Listed
Dec 7, 2021
- Data leaked
At a glance
- Group
- Marketo
- Status
- Data leaked
- Country
- Japan
- Sector
- Technology
- Listed on leak site
- Dec 7, 2021
About the victim
AI dossier — public-source company profileFujitsu Limited is a Japanese multinational information and communications technology corporation headquartered in Kawasaki, Kanagawa, Japan. The company provides a broad range of technology products, solutions, and services including computing hardware, software, telecommunications equipment, and IT consulting. Fujitsu is one of the largest IT services companies in the world by revenue and employee count, operating across more than 100 countries.
- Industry
- Information Technology Services & Hardware
- Address
- 1-1, Kamikodanaka 4-chome, Nakahara-ku, Kawasaki, Kanagawa 211-8588, Japan
- Employees
- 124000
- Founded
- 1935
Attack summary
Severity: high — Fujitsu is a major global IT services and hardware provider; any confirmed data exfiltration from such a company carries significant risk of exposure of sensitive business, client, and potentially government/defence contract data. The 'data_published' status indicates material has been released, elevating severity, though the absence of a detailed leak post prevents a 'critical' classification without confirmed regulated data categories at scale.The Marketo group claims to have obtained data from Fujitsu and has listed the disclosure as data_published, indicating exfiltration and publication of stolen data. No specific ransom demand, data volume, or detailed description of the stolen data categories was captured in the available leak post.
Data the group says was taken
AI dossier — extracted from the leak post- Unknown — no leak post content available
Sources
- Victim sitefujitsu.com
Source
Indexed 4 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
