{
	"id": "30297bfd-4b82-4df0-bde2-b72b530131e1",
	"created_at": "2026-04-06T00:12:37.520736Z",
	"updated_at": "2026-04-10T13:13:09.801118Z",
	"deleted_at": null,
	"sha1_hash": "3f5059581b25189107f115377696c37974697657",
	"title": "Business technology giant Konica Minolta hit by new ransomware",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 1593125,
	"plain_text": "Business technology giant Konica Minolta hit by new ransomware\r\nBy Lawrence Abrams\r\nPublished: 2020-08-16 · Archived: 2026-04-05 14:01:38 UTC\r\nBusiness technology giant Konica Minolta was hit with a ransomware attack at the end of July that impacted services for\r\nalmost a week, BleepingComputer has learned.\r\nKonica Minolta is a Japanese multinational business technology giant with almost 44,000 employees and over $9 billion in\r\nrevenue for 2019.\r\nThe company offers a wide variety of services and products ranging from printing solutions, healthcare technology, to\r\nproviding managed IT services to businesses.\r\nhttps://www.bleepingcomputer.com/news/security/business-technology-giant-konica-minolta-hit-by-new-ransomware/\r\nPage 1 of 4\n\n0:00\r\nhttps://www.bleepingcomputer.com/news/security/business-technology-giant-konica-minolta-hit-by-new-ransomware/\r\nPage 2 of 4\n\nVisit Advertiser websiteGO TO PAGE\r\nIt started with an outage\r\nOn July 30th, 2020, customers began reporting that Konica Minolta's product supply and support site was not accessible and\r\nwas displaying the outage message shown below.\r\nThe Konica Minolta MyKMBS customer portal is temporarily unavailable. We are working hard to resolve the issue and\r\napologize for any inconvenience this may have caused you. If you need immediate assistance for service, please call our\r\nGlobal Customer Services at 1-800-456-5664 (US) or 1-800-263-4410 (Canada).\r\nThe site remained down for almost a week, and customers stated that they could not get a straight answer as to what was\r\ncausing the outage.\r\nSome Konica Minolta printers were also displaying a 'Service Notification Failed' error, which led Konica Minolta to update\r\ntheir outage message to contain a link to this support document.\r\nAfter some customers stated that their Konica contacts indicated a breach caused the outage, BleepingComputer attempted\r\nto contact the company numerous times via email and phone calls.\r\nBleepingComputer never received a response to our inquiries.\r\nDo you have information about this attack or another ransomware attack? If you have information to share, contact us\r\nsecurely on Signal at +1 (646) 961-3731, via email at lawrence.abrams@bleepingcomputer.com, or using our tips form.\r\nKonica Minolta hit by the RansomEXX ransomware\r\nSoon after, a source shared a copy of the ransom note used in the attack on Konica Minolta with BleepingComputer.\r\nThis ransom note is named '!!KONICA_MINOLTA_README!!.txt,' and as you can see below, clearly targets the Konica\r\nMinolta company.\r\nKonica Minolta ransom note\r\nBleepingComputer also learned that devices in the company were encrypted, and files had the '.K0N1M1N0' extension\r\nappended to them.\r\nThis ransom note belongs to a relatively new ransomware called RansomEXX, which we reported on at the end of June\r\n2020 when it was used in an attack on the Texas Department of Transportation.\r\nLike other enterprise-targeting ransomware operations, RansomEXX is human-operated, which entails threat actors\r\ncompromising a network, and over time, spreading to other devices until they gain administrator credentials.\r\nOnce they gain admin rights and access to the Windows domain controller, they deploy the ransomware on the network and\r\nencrypt all of its devices.\r\nhttps://www.bleepingcomputer.com/news/security/business-technology-giant-konica-minolta-hit-by-new-ransomware/\r\nPage 3 of 4\n\nBased on the RansomEXX ransom notes seen by BleepingComputer, it does not appear that the ransomware operation steals\r\ndata before encrypting devices.\r\nThis tactic may be adopted, though, as the ransomware operation grows.\r\nAutomated Pentesting Covers Only 1 of 6 Surfaces.\r\nAutomated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the\r\nother.\r\nThis whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic\r\nquestions for any tool evaluation.\r\nSource: https://www.bleepingcomputer.com/news/security/business-technology-giant-konica-minolta-hit-by-new-ransomware/\r\nhttps://www.bleepingcomputer.com/news/security/business-technology-giant-konica-minolta-hit-by-new-ransomware/\r\nPage 4 of 4",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://www.bleepingcomputer.com/news/security/business-technology-giant-konica-minolta-hit-by-new-ransomware/"
	],
	"report_names": [
		"business-technology-giant-konica-minolta-hit-by-new-ransomware"
	],
	"threat_actors": [],
	"ts_created_at": 1775434357,
	"ts_updated_at": 1775826789,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/3f5059581b25189107f115377696c37974697657.pdf",
		"text": "https://archive.orkl.eu/3f5059581b25189107f115377696c37974697657.txt",
		"img": "https://archive.orkl.eu/3f5059581b25189107f115377696c37974697657.jpg"
	}
}