- Hitachi Vantara, a Hitachi subsidiary, confirmed suffering a ransomware attack
- Working to restore their services, had to close parts of their infrastructure, affecting many customers and services
- The media say this is the work of the Ransomware Akira operation
Hitachi Vantara was forced to take parts of his off -line infrastructure to counteract a ransomware infection. The company confirmed the news in a written statement shared with the media.
Hitachi Vantara is an infrastructure and data analysis company. It is a subsidiary of the Japanese giant Hitachi, and provides storage systems, cloud solutions and data management software.
Many of its customers are large companies from different industries, including finance, medical care, manufacturing and government sectors. Lufthansa, Disney, national banks and government organizations use Hitachi Vantara services.
Akira ransomware
In a written statement shared with Bleepingcompter, the company said it suffered a ransomware attack that interrupted its network:
“On April 26, 2025, Hitachi Vantara experienced a ransomware incident that has resulted in an interruption of some of our systems,” said Hitachi Vantara to the publication, underlining that the servers were removed to contain the incident, brought third -party experts to help, and that it is working “as quickly as possible” to restore its operations.
While he did not say who the threat actors were, Bleepingcomputer He affirms that this is the work of the Akira Ransomware operation, citing a source familiar with the matter. The same source also states that the group robbed confidential files of the Hitachi Vantara network and requests a rescue payment.
Hitachi Vantara’s cloud services have dodged a bullet, according to the publication, but added that to contain the incident, the company had to interrupt the Hitachi Vantara systems and the manufacture of Hitachi Vantara. On the other hand, customers with autohospedic environments can still access their data.
Akira emerged for the first time in 2023, aimed at companies in different industries with the usual double -extension tactics. It focuses on medium and large organizations on manufacturing, education, finance and medical care, and enters VPN vulnerabilities and stolen credentials. Some of its most notable victims include Nissan Oceania, Stanley Steemer and Bluefield University.
Through Bleepingcomputer