Privacy Ninja



        • Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

Fujifilm Resumes Normal Operations After Ransomware Attack

Fujifilm Resumes Normal Operations After Ransomware Attack

Japanese multinational conglomerate Fujifilm says that it has resumed normal business and customer operations following a ransomware attack that forced it to shut the entire network on June 4.

At roughly 10:0 AM EST, Fujifilm asked employees to immediately shut off their computers and all servers on the network after an ongoing network outage blocked access to email, the billing system, and an internal reporting system.

No evidence of stolen data so far

“After that, from June 4th, we started operating servers and computers that were confirmed to be safe, and resumed communication on the network that had been blocked,” Fujifilm said in a statement issued earlier today.

“We are pleased to inform you that by today, normal operations for customers and business partners, such as reception of inquiries and orders and shipments of our products, have been restored.”

Although in most ransomware attacks, the threat actors are also exfiltrating data before encrypting the victims’ systems, Fujifilm stated that the “investigations completed so far have found no evidence of information leakage to the outside world.”

Also Read: This Educator Aims to Make Good Cyber Hygiene a Household Practice

“In addition, countermeasures against this unauthorized access have already been implemented. We will continue to monitor and continue to strengthen information security,” Fujifilm added.

We deeply apologize for causing a great deal of inconvenience and concern to our customers and business partners. – Fujifilm Corporation

The ransomware attack

While Fujifilm did not reveal the name of the ransomware operation that managed to breach its network and take it down on June 4, Advanced Intel CEO Vitali Kremez told BleepingComputer that some of the company’s systems were infected with the Qbot trojan last month.

“A network infection attributed to QBot automatically results in risks associated with future ransomware attacks,” Kremez said.

Qbot trojan’s operators have a long history of working with ransomware gangs, providing them with remote access to previously infected networks.

The ProLock and Egregor ransomware groups are known to have partnered with Qbo in the past but, after those operations shut down, REvil is the new ransomware gang that has been using the botnet to gain access to victims’ networks.

While these are only theories at the moment, we will know soon enough who was behind the attack since, if data was stolen in the attack, it will likely be released on a ransomware data leak site and used as leverage to force Fujifilm to pay the ransom.

Ransomware attack alert on Fujifilm's site
Ransomware attack alert on Fujifilm’s site

Fujifilm is far from the first Japanese company to have had its network breached in recent years, with KawasakiNECMitsubishi Electric, and defense contractors Kobe Steel and Pasco also having disclosed security incidents and, in some cases, even data leaks.

Also Read: The 5 Phases of Penetration Testing You Should Know

Tokyo-based Japanese multinational conglomerate FujiFilm reported revenues of $20.1 billion in 2020, and it employs 37,151 people worldwide. 

FujiFilm initially started in optical film and cameras and expanded to other activity domains, including pharmaceuticals, storage devices, and photocopiers and printers (XEROX).



Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection


We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.


Click one of our contacts below to chat on WhatsApp

× Chat with us