top of page

Latest Articles

Top Cybersecurity Incidents in Japan (March 2026 Week 4): Ransomware & Supply Chain Attacks Explained

  • 6 days ago
  • 5 min read

[Incident Highlights from the 4th Week of March]


In March 2026, Japanese companies were hit by a series of cyberattacks. Companies of various industries and sizes were affected, ranging from major electronics component manufacturers to medical publishers, and even attacks via subcontractors. What this week's four incidents reveal is that ransomware and unauthorized access remain the greatest threats, with a particularly sharp increase in attacks via subcontractors and supply chains. What Japanese companies need to focus on now is not only protecting their own systems, but also understanding the security status of their business partners and accelerating their initial response in the event of an incident.



A ransomware attack on Medica Publishing disrupted operations and caused a data breach.

Medica Publishing Co., Ltd., a company that publishes educational materials for doctors and nurses, was hit by a ransomware attack in the early hours of March 13, 2026. The company's systems were encrypted, causing a significant disruption to its operations. A second report on March 25 indicated that system recovery was underway, but there were also reports that the recovery timeline was uncertain. A detailed investigation into the data breach is ongoing, and there is a possibility that confidential medical information has been leaked. (The company is still investigating whether or not data was leaked.) The company is in the process of notifying relevant academic societies and contractors, and there are concerns about the impact on the entire industry.


Potential Unauthorized Access and Data Leakage at Murata Manufacturing Co., Ltd.

Murata Manufacturing Co., Ltd., a global manufacturer of electronic components, confirmed unauthorized access by a third party to its IT environment on March 6, 2026. There are concerns that information concerning external parties and internal company information may have been leaked. The company has launched an initial investigation and is working to understand the extent of the damage. Because this attack targeted a major manufacturing company, there are concerns about ripple effects throughout the entire supply chain, and the company is also disclosing information to its business partners.


Uchiyama Holdings suffers ransomware infection and system failure.

Uchiyama Holdings Co., Ltd. detected abnormal behavior in its systems on March 7, 2026, and announced a cybersecurity incident involving ransomware on March 9. The system failure has disrupted business operations. A second report on March 23 stated that the investigation is still ongoing, and detailed confirmation of whether or not information has been leaked is underway. The company is simultaneously notifying relevant parties and carrying out recovery work.



Ransomware attack and personal information leak via a contractor of Kyoto Shimbun.com

Kyoto Shimbun COM Co., Ltd. announced on March 2, 2026, that it had suffered a ransomware attack via a contractor. On November 28, 2025, a server managed by 47CLUB Co., Ltd., a contractor responsible for prize delivery, was subjected to unauthorized access by the ransomware attacker group "SafePay." As a result, information on approximately 190 winners of the "Kyoto Shimbun 145th Anniversary Appreciation Gift" campaign was leaked. This incident is a typical example of how even if a company's own security measures are robust, security vulnerabilities in a contractor can pose an overall risk.


sauce

1. "Report on Unauthorized Access (Ransomware) Damage and Current Situation (Second Report)" - Medica Publishing Co., Ltd.


2. "Murata Manufacturing Co., Ltd. suffers unauthorized access; possibility of data leak" - ITmedia NEWS


3. "Uchiyama Holdings hit by ransomware attack; investigation ongoing" - ScanNetSecurity


4. "Regarding the partial leak of winner information for the 'Kyoto Shimbun 145th Anniversary Appreciation Gift'" - Kyoto Shimbun


*This article is based on publicly available information from various companies and news reports, and its content may be updated based on future investigations.



Five specific cybersecurity measures that should be implemented on the ground now


1. Multi-layered backup and regular recovery testing

The Medica Publishing case illustrates the increasing difficulty in system recovery during ransomware attacks. Storing backups at multiple locations—on-site, in the cloud, and off-site—and conducting recovery tests at least once a month enables rapid recovery in the event of actual damage.


2. Conducting security audits of contractors and supply chain companies.

It has been suggested that the attacks on Kyoto Shimbun.com may have been caused by the security measures of their outsourced company. It is essential to conduct regular security audits of companies to which critical business operations are outsourced, and to ensure that they meet minimum security standards. Clearly stating security requirements in outsourcing contracts is also crucial.


3. Administrator access control and enforcement of multi-factor authentication (MFA)

The attacks on Murata Manufacturing and Uchiyama Holdings may have targeted administrator privileges as the initial access attempt. By minimizing access to administrator accounts and enforcing multi-factor authentication (MFA) for all administrators, the risk of unauthorized access can be significantly reduced.


4. Development of an incident response plan and regular training

In all four incidents this week, companies are scrambling to respond to the initial stages. Developing incident response plans in advance and conducting quarterly drills enables a swift and appropriate response when actual damage occurs. The process of quickly determining whether or not data has been leaked is particularly important.


5. Introduction of Network Segmentation and Anomaly Detection

To prevent ransomware from spreading horizontally across the entire corporate network, it is effective to segment the network and isolate critical systems. At the same time, implementing systems that detect abnormal network traffic and file access patterns enables early detection of attacks.



How PIPELINE can help you


[Measures against ransomware attacks]

RiskSensor detects unusual communication patterns and file access within the network, enabling early detection of ransomware. ThreatIDR supports detailed investigation of compromised systems and threat visualization, accelerating incident response.


[Detection and response to unauthorized access]

ThreatIDR thoroughly investigates traces of unauthorized access and visualizes attacker behavior. By quickly determining whether administrator privileges have been misused or data has been leaked, the accuracy of incident response is improved.


[Detection and prevention of information leaks]

DatalaiQ detects the leakage of confidential information and prevents unauthorized data exfiltration. It enables data access monitoring and control to prevent information leaks through vendors, thus meeting compliance requirements.


✦ Finally


Thank you for reading this far.

We at PIPELINE Corporation are a group of experts specializing in cybersecurity and threat intelligence.

We face threats together with our customers on-site every day.

"Even if we have a specialized team within the company, we lack the resources," "We don't know where to start," and "We want to prepare realistically, assuming we will be attacked."

We receive many inquiries like this. Regardless of the size of the company, the current situation is that weak points in defenses are easily targeted.

Furthermore, trying to handle everything internally inevitably makes it easier for things to be overlooked.

That's why we focus on practical methods that are useful in the field, rather than idealistic theories, and propose a small-scale, easy-to-implement approach. Even "a small step within your capabilities" can make a big difference in safety.

If you have any concerns at all, please feel free to contact us. Let's work together to find the quickest way to strengthen your security.




Latest Articles

bottom of page