Ransomware victim disclosure
← All victimsZojirushi
Claimed by akira · listed 13 days ago
Status timeline
- Listed
May 8, 2026
- Data leaked
At a glance
- Group
- akira
- Status
- Data leaked
- Country
- JP
- Sector
- Manufacturing
- Listed on leak site
- May 8, 2026
About the victim
AI dossier — public-source company profileZojirushi is a Japanese manufacturer specializing in high-quality home appliances, including rice cookers, water boilers and warmers, breadmakers, coffee makers, and vacuum insulated containers. The company is headquartered in Japan and is known internationally for its consumer kitchen and beverage products. It operates at a scale consistent with a mid-to-large consumer goods manufacturer with global distribution.
- Industry
- Home Appliances & Vacuum Insulated Products Manufacturing
Attack summary
Severity: high — The group claims exfiltration of 38 GB of data including employee PII (passport scans — regulated personal data), financial records, and contracts. The combination of identity documents and significant business data constitutes a serious breach; however, the data has not yet been fully published and exact scale of PII impact is unconfirmed, placing this at high rather than critical.Akira claims to have exfiltrated approximately 38 GB of corporate data from Zojirushi, including employee personal information (passport scans and other identity documents), detailed financial records, project files, and contracts, with publication described as imminent.
Data the group says was taken
AI dossier — extracted from the leak post- Employee passport scans
- Employee personal identity documents
- Detailed financial records
- Project files
- Contracts
What the group claims
Zojirushi specializes in high-quality home appliances, offering a range of products including r ice cookers, water boilers and warmers, breadmakers, coffee makers, and various vacuum insulate d containers. We will upload 38gb of corporate data soon. Employee personal information (passport and other d ocs scans), detailed financials, projects, contracts and so on.
Source
Indexed 13 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
