{
	"id": "6f90be44-3fb3-4037-9231-6c53d719f55b",
	"created_at": "2026-04-06T00:18:59.268127Z",
	"updated_at": "2026-04-10T13:11:56.818564Z",
	"deleted_at": null,
	"sha1_hash": "709785bd47268e1c63c794e8f6fc8b00105ec37d",
	"title": "Bandai Namco confirms hack after ALPHV ransomware data leak threat",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 932429,
	"plain_text": "Bandai Namco confirms hack after ALPHV ransomware data leak threat\r\nBy Lawrence Abrams\r\nPublished: 2022-07-13 · Archived: 2026-04-02 11:19:17 UTC\r\nGame publishing giant Bandai Namco has confirmed that they suffered a cyberattack that may have resulted in the theft of\r\ncustomers' personal data.\r\nBandai Namco is a Japanese publisher of numerous popular video games, including Elden Ring, Dark Souls, Pac-Man,\r\nTekken, Gundam, Soulcalibur, and many more.\r\nThis past Monday, the BlackCat ransomware operation (aka AlphV) claimed to have breached Bandai Namco and stolen\r\ncorporate data during the attack.\r\nhttps://www.bleepingcomputer.com/news/security/bandai-namco-confirms-hack-after-alphv-ransomware-data-leak-threat/\r\nPage 1 of 5\n\nhttps://www.bleepingcomputer.com/news/security/bandai-namco-confirms-hack-after-alphv-ransomware-data-leak-threat/\r\nPage 2 of 5\n\nVisit Advertiser websiteGO TO PAGE\r\nBandai Namco page on AlphV's data leak site\r\nSource: BleepingComputer\r\nToday, Bandai Namco confirmed that they suffered a cyberattack on July 3rd when hackers breached internal systems for\r\noffices in Asian regions, other than Japan.\r\nThe full statement issued today by Bandai Namco can be read below.\r\n\"On July 3, 2022, Bandai Namco Holdings Inc. confirmed that it experienced an unauthorized access by third\r\nparty to the internal systems of several Group companies in Asian regions (excluding Japan). After we confirmed\r\nthe unauthorized access, we have taken measures such as blocking access to the servers to prevent the damage\r\nfrom spreading. In addition, there is a possibility that customer information related to the Toys and Hobby\r\nBusiness in Asian regions (excluding Japan) was included in the servers and PCs, and we are currently identifying\r\nthe status about existence of leakage, scope of the damage, and investigating the cause.\r\nWe will continue to investigate the cause of this incident and will disclose the investigation results as appropriate.\r\nWe will also work with external organizations to strengthen security throughout the Group and take measures to\r\nprevent recurrence.\r\nWe offer our sincerest apologies to everyone involved for any complications or concerns caused by this incident.\"\r\n- Bandai Namco.\r\nWhile Bandai Namco has not provided any technical details regarding the cyberattack, the entry to BlackCat's data leak site\r\nand the company confirming the attack makes it more than likely that they suffered a ransomware attack.\r\nBlackCat has not released any of Bandai Namco's allegedly stolen data at this time.\r\nHowever, ransomware gangs typically hold off on releasing stolen data until they are sure that a company will not pay a\r\nransom.\r\nNow that Bandai Namco has issued a public statement, it would not be surprising to find that the company's data will be\r\nleaked later today or tomorrow.\r\nWho is AlphV/BackCat?\r\nhttps://www.bleepingcomputer.com/news/security/bandai-namco-confirms-hack-after-alphv-ransomware-data-leak-threat/\r\nPage 3 of 5\n\nThe AlphV/BlackCat ransomware operation launched in November 2021 and is believed to be a rebrand of the\r\nDarkSide/BlackMatter gang.\r\nThe ransomware gang gained notoriety as DarkSide after attacking the Colonial Pipeline and feeling the full pressure of\r\ninternational law enforcement.\r\nToday, the group is considered one of the largest ransomware threats targeting the enterprise, hitting companies such as\r\nthe Moncler fashion group and the Swissport airline cargo handling services provider.\r\nThe gang has also been evolving its extortion tactics by launching a new searchable database of stolen data this week,\r\nmaking double-extortion attacks even more damaging for victims.\r\nALPHV/BlackCat ransomware implements search function on leak site\r\nIn April, the FBI published a warning that BlackCat had breached at least 60 entities worldwide and stated that they have\r\n\"extensive networks and experience with ransomware operations.\"\r\nhttps://www.bleepingcomputer.com/news/security/bandai-namco-confirms-hack-after-alphv-ransomware-data-leak-threat/\r\nPage 4 of 5\n\nAutomated Pentesting Covers Only 1 of 6 Surfaces.\r\nAutomated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the\r\nother.\r\nThis whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic\r\nquestions for any tool evaluation.\r\nSource: https://www.bleepingcomputer.com/news/security/bandai-namco-confirms-hack-after-alphv-ransomware-data-leak-threat/\r\nhttps://www.bleepingcomputer.com/news/security/bandai-namco-confirms-hack-after-alphv-ransomware-data-leak-threat/\r\nPage 5 of 5",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://www.bleepingcomputer.com/news/security/bandai-namco-confirms-hack-after-alphv-ransomware-data-leak-threat/"
	],
	"report_names": [
		"bandai-namco-confirms-hack-after-alphv-ransomware-data-leak-threat"
	],
	"threat_actors": [
		{
			"id": "6e23ce43-e1ab-46e3-9f80-76fccf77682b",
			"created_at": "2022-10-25T16:07:23.303713Z",
			"updated_at": "2026-04-10T02:00:04.530417Z",
			"deleted_at": null,
			"main_name": "ALPHV",
			"aliases": [
				"ALPHV",
				"ALPHVM",
				"Ambitious Scorpius",
				"BlackCat Gang",
				"UNC4466"
			],
			"source_name": "ETDA:ALPHV",
			"tools": [
				"ALPHV",
				"ALPHVM",
				"BlackCat",
				"GO Simple Tunnel",
				"GOST",
				"Impacket",
				"LaZagne",
				"MEGAsync",
				"Mimikatz",
				"Munchkin",
				"Noberus",
				"PsExec",
				"Remcom",
				"RemoteCommandExecution",
				"WebBrowserPassView"
			],
			"source_id": "ETDA",
			"reports": null
		}
	],
	"ts_created_at": 1775434739,
	"ts_updated_at": 1775826716,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/709785bd47268e1c63c794e8f6fc8b00105ec37d.pdf",
		"text": "https://archive.orkl.eu/709785bd47268e1c63c794e8f6fc8b00105ec37d.txt",
		"img": "https://archive.orkl.eu/709785bd47268e1c63c794e8f6fc8b00105ec37d.jpg"
	}
}