- Hitachi Vantara, a subsidiary of Hitachi, confirmed to suffer a ransomware -attack
- Working to restore its services, it had to close parts of its infrastructure and influence many clients and services
- The media says this is the work of Akira Ransomware
Hitachi Vantara was forced to draw parts of her IT infrastructure offline to counter a ransomware infection. The company confirmed the news in a written statement that was shared with the media.
Hitachi Vantara is a data infrastructure and analytical company. It is a subsidiary of the Japanese giant Hitachi and provides storage systems, cloud solutions and data management software.
Many of its customers are large companies from various industries, including financial, healthcare, manufacturing and government sectors. Lufthansa, Disney, national banks and government organizations use all Hitachi Vantara’s services.
Akira Ransomware
In a written statement shared with bleeping computer, the company said it was suffering a ransomware -attack that disturbed its network:
“On April 26, 2025, Hitachi Vantara experienced a ransomware event that has resulted in a disturbance of some of our systems,” Hitachi Vantara told the publication, emphasizing that it took down servers to contain the incident, brought third-party experts to help, and that it works “as soon as possible” to go.
While it didn’t say who the threat actors were, Bleeping computer Claims that this is the work of Akira Ransomware operation that cites a source familiar with the case. The same source also claims that the group stole sensitive files from Hitachi Vantara’s network and requests a ransom payment.
Hitachi Vantara’s cloud services have avoided a bullet, the publication also said, but added that in order to contain the incident, the company had to interfere with both Hitachi Vantara Systems and Hitachi Vantara Manufacturing. On Flipside, customers with self -hosted environments can still access their data.
Akira first appeared in 2023 and targeted companies in different industries with the usual double development tactics. It focuses on medium and large organizations in manufacturing, education, finance and healthcare and breaks in through VPN vulnerability and stolen credentials. Some of its more notable victims include Nissan Oceania, Stanley Steemer and Bluefield University.
Via Bleeping computer