{
	"id": "94b024c4-9498-44ca-9115-8d1f3dec55ab",
	"created_at": "2026-04-06T00:19:06.080565Z",
	"updated_at": "2026-04-10T13:11:38.653584Z",
	"deleted_at": null,
	"sha1_hash": "6a3f2fa5d0cb1ebae059fda9b6b55ff7145d89e8",
	"title": "Ransomware attack disrupts operations at Australian beverage firm Lion",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 1439108,
	"plain_text": "Ransomware attack disrupts operations at Australian beverage\r\nfirm Lion\r\nBy Pierluigi Paganini\r\nPublished: 2020-06-14 · Archived: 2026-04-05 16:25:32 UTC\r\nSystems at Australian beverages company Lion were infected with a ransomware\r\nthat disrupted to manufacturing processes and customer service.\r\nSystems at Australian beverages company Lion were infected with a ransomware, the security breach caused the\r\ndisruption of manufacturing processes and customer service.\r\nLion is a beverage and food company that operates in Australia and New Zealand, and a subsidiary of Japanese\r\nbeverage giant Kirin. It produces and markets a range of beer, wine, cider, RTDs and spirits, as well as dairy and\r\nother beverages\r\nThe infection took place on June 9, and a few days later the company confirmed that the incident was caused by\r\nransomware.\r\nThe cyberattack will cause a delay in the production of beer, the company announced.\r\nIn response to the attack, the Australian company shut down some manufacturing sites, and some of them have yet\r\nto be resumed. The company also started informing customers about the incident and warned of possible\r\n“temporary shortages.”\r\nhttps://securityaffairs.co/wordpress/104749/cyber-crime/ransomware-attack-hit-lion.html\r\nPage 1 of 2\n\n“Our investigations to date have shown that a system outage has been caused by ransomware. The ransomware\r\ntargeted our computer systems. In response, we immediately shut down key systems as a precaution.” reads a post\r\npublished by the company on its website.\r\n“Our teams are working as hard as they can to service customers and suppliers, implementing new manual\r\nprocesses and investigating all alternative options. We recognise this is imperfect and is causing disruption to our\r\nvalued partners. We also recognise this is happening at an unfortunate time as we emerge from COVID-19\r\nrestrictions,”\r\nLion immediately launched an investigation into the ransomware attack, it confirmed that financial or personal\r\ninformation has not been exposed as a result of the attack.\r\n“We had been hoping to have full access restored by now, but unfortunately this process is taking longer than we\r\nhoped,” continues the post.”There is no evidence that any of the information contained in our system (including\r\nfinancial or personal information) has been affected but this is something that we will review closely as we\r\ncontinue to investigate the incident.”\r\nRecently other Australian companies were hit by a cyber attack, the shipping giant Toll suffered two ransomware\r\nattacks in a few months.\r\nIn May, the Australian flat product steel producer BlueScope Steel Limited was also hit by a cyberattack that\r\ncaused disruptions to some of its operations.\r\nRansomware attacks are threatening production plants worldwide, recently Japanese carmaker Honda announced\r\nit has been hit by a cyberattack that disrupted its business in several countries.\r\n[adrotate banner=”9″] [adrotate banner=”12″]\r\nPierluigi Paganini\r\n(SecurityAffairs – Lion, ransomware)\r\n[adrotate banner=”5″]\r\n[adrotate banner=”13″]\r\nSource: https://securityaffairs.co/wordpress/104749/cyber-crime/ransomware-attack-hit-lion.html\r\nhttps://securityaffairs.co/wordpress/104749/cyber-crime/ransomware-attack-hit-lion.html\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://securityaffairs.co/wordpress/104749/cyber-crime/ransomware-attack-hit-lion.html"
	],
	"report_names": [
		"ransomware-attack-hit-lion.html"
	],
	"threat_actors": [],
	"ts_created_at": 1775434746,
	"ts_updated_at": 1775826698,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/6a3f2fa5d0cb1ebae059fda9b6b55ff7145d89e8.pdf",
		"text": "https://archive.orkl.eu/6a3f2fa5d0cb1ebae059fda9b6b55ff7145d89e8.txt",
		"img": "https://archive.orkl.eu/6a3f2fa5d0cb1ebae059fda9b6b55ff7145d89e8.jpg"
	}
}