{
	"id": "77a2a14c-b2f7-413f-bdbc-1475f3991aea",
	"created_at": "2026-04-06T03:36:32.060544Z",
	"updated_at": "2026-04-10T03:21:27.375631Z",
	"deleted_at": null,
	"sha1_hash": "0b75625c1be3c275bbaad1f4dbb2ee9f6f7c6c96",
	"title": "Japanese tech firm Oomiya hit by LockBit 3.0. Multiple supply chains potentially impacted",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 602610,
	"plain_text": "Japanese tech firm Oomiya hit by LockBit 3.0. Multiple supply\r\nchains potentially impacted\r\nBy Pierluigi Paganini\r\nPublished: 2022-10-17 · Archived: 2026-04-06 02:50:38 UTC\r\nThe IT infrastructure of the Japanese tech company Oomiya was infected with the\r\nLockBit 3.0 ransomware.\r\nOne of the affiliates for the LockBit 3.0 RaaS hit the Japanese tech company Oomiya. Oomiya is focused on\r\ndesigning and manufacturing microelectronics and facility system equipment.\r\nThe business of Omiya Kasei is divided into four major areas, manufacturing and designing chemical and\r\nindustrial products, designing electronic materials, pharmaceutical development, and factory manufacturing.\r\nhttps://securityaffairs.co/wordpress/137243/cyber-crime/oomiya-lockbit-3-0-ransomware.html\r\nPage 1 of 2\n\nLockbit 3.0 operators claim to have stolen data from the company and threaten to leak it by October 20, 2022 if\r\nthe company will not pay the ransom. At this time, the ransomware gang has yet to publish samples of the alleged\r\nstolen documents.\r\nThis incident could have a significant impact of third party organizations because Oomiya is in the supply chain of\r\nmajor organizations worldwide in multiple industries, including manufacturing, semiconductors, automotive,\r\ncommunications, and healthcare.\r\nThe Lockbit affiliates are the most active in this period, bolows data shared by DarkFeed that demonstrates the\r\nmalware has hit hundreds of organizations.\r\nFollow me on Twitter: @securityaffairs and Facebook\r\n[adrotate banner=”9″] [adrotate banner=”12″]\r\nPierluigi Paganini\r\n(SecurityAffairs – hacking, Oomiya)\r\n[adrotate banner=”5″]\r\n[adrotate banner=”13″]\r\nSource: https://securityaffairs.co/wordpress/137243/cyber-crime/oomiya-lockbit-3-0-ransomware.html\r\nhttps://securityaffairs.co/wordpress/137243/cyber-crime/oomiya-lockbit-3-0-ransomware.html\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://securityaffairs.co/wordpress/137243/cyber-crime/oomiya-lockbit-3-0-ransomware.html"
	],
	"report_names": [
		"oomiya-lockbit-3-0-ransomware.html"
	],
	"threat_actors": [],
	"ts_created_at": 1775446592,
	"ts_updated_at": 1775791287,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/0b75625c1be3c275bbaad1f4dbb2ee9f6f7c6c96.pdf",
		"text": "https://archive.orkl.eu/0b75625c1be3c275bbaad1f4dbb2ee9f6f7c6c96.txt",
		"img": "https://archive.orkl.eu/0b75625c1be3c275bbaad1f4dbb2ee9f6f7c6c96.jpg"
	}
}