Ransomware Victim

Sponsored by Hudson RockUse Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are impacting your business



Ransomware.livedoes not exfiltrate, download, host, repost, or disclose any stolen data. Any legal concerns regarding the content should be directed at the attackers, notRansomware.live. This platform is dedicated to cybersecurity awareness, reporting on ransomware incidents to inform the public.Ransomware.liveoperates independently, with no affiliation or alignment with any ransomware groups, and does not host or distribute infringing content. All information is automatically gathered and redacted from publicly accessible sources, including ransomware leak sites on the dark web.


JP flag

KADOKAWA Corporation 

Company logo
Ransomware Group:

Discovery Date: 2024-06-27 12:22

Sector: Not Found
Our team gained access to the Kadokawa network almost a month ago. It took some time, because of the language, to figure out that Kadokawa subsidiaries' networks were connected to each other and to get through all the mess Kadokawa's IT department made there. We have discovered that Kadokawa networks architecture was not organised properly. It was different networks connected to the one big Kadokawas infrastructure being controlled through global control points, such as eSXI and V-sphere. Once we have gained access to the control center we have encrypted the whole network (Dwango, NicoNico, Kadokawa, other subsidiaries).

Victim:   |  Group: