Fuji Shuts Down Servers Due to Possible Ransomware Attack

Share: 

Fuji’s servers are down due to a possible ransomware attack.

Photo by Rahul Pandit from Pexels.

Bleeping Computer reports that Advanced Intel CEO Vitali Kremez told them Fuji servers were infected with the Qbot malware on May 15, 2021.

“Based on our unique threat prevention platform Andariel, FUJIFILM Corporate appeared to be infected with Qbot malware based on May 15, 2021. Since the underground ransomware turmoil, the Qbot malware group currently works with the REvil ransomware group,” he said.

One of a string of ransomware attacks to affect people around the world – with two prominent instances being the pipeline shutdown in the southeastern United States and the meat processing plant work stoppage – the Fujifilm attack largely follows the same pattern seen in those instances.

The message on the Fuji website regarding the downed servers reads in full:

“FUJIFILM Corporation is currently carrying out an investigation into possible unauthorized access to its server from outside of the company. As part of this investigation, the network is partially shut down and disconnected from external correspondence.

We want to state what we understand as of now and the measures that the company has taken. In the late evening of June 1, 2021, we became aware of the possibility of a ransomware attack. As a result, we have taken measures to suspend all affected systems in coordination with our various global entities.

We are currently working to determine the extent and the scale of the issue. We sincerely apologize to our customers and business partners for the inconvenience this has caused.”

Did you notice the Fuji message on their website? Let us know your theories as to what is going on in the comments below.

Don’t forget to check out our other photography news on Light Stalking at this link right here.

[Fuji]

About Author

Kehl is our staff photography news writer and has over a decade of experience in online media and publishing and you can get to know him better here

Leave a Reply

Your email address will not be published. Required fields are marked *