
The Washington Resort model in Japan has introduced that that its servers had been compromised in a ransomware assault, exposing varied enterprise knowledge.
The hospitality group has established an inner job drive and engaged exterior cybersecurity specialists to evaluate the impression of the intrusion, decide whether or not buyer knowledge was compromised, and coordinate restoration efforts.
Washington Resort, a model working beneath Fujita Kanko Inc. (WHG Motels), is a business-focused hospitality chain with 30 places throughout Japan. WHG has 11,000 rooms over its properties and has practically 5 million company yearly.
In accordance with the firm’s disclosure, hackers breached its community on Friday, February 13, 2026, at 22:00 (native time). The IT employees instantly disconnected servers from the web to forestall the assault from spreading on the community.
The group states that it began consulting with the police and exterior cybersecurity specialists.
Though an investigation is ongoing, Washington Resort can verify that the attacker gained entry to varied enterprise knowledge saved on the affected servers.
Buyer knowledge is unlikely to be uncovered as a result of the corporate shops this info on servers managed by a separate firm, for which no unauthorized entry has been confirmed.
The incident is impacting operations at some Washington Resort model properties, together with the momentary unavailability of bank card terminals. In addition to that, the agency says it recorded no vital operational disruption.
The monetary impression of the incident is at present beneath evaluation. Washington Resort promised to supply updates if any further related particulars emerge.
As of writing, no ransomware teams have claimed the Washington Resort on identified dark-web-based extortion portals that BleepingComputer displays.
A number of corporations in Japan have been focused by hackers currently. Among the current incidents embrace international automaker Nissan, retail big Muji, the biggest brewer within the nation, Asahi, and telecom big NTT.
Though not essentially associated to the breach at Washington Resort, JPCERT/CC disclosed late final week that hackers had been exploiting an arbitrary command injection flaw in Soliton Programs’ FileZen merchandise, tracked beneath CVE-2026-25108.
The file-sharing equipment is broadly utilized by Japanese corporations and was additionally focused in 2021.
Trendy IT infrastructure strikes quicker than handbook workflows can deal with.
On this new Tines information, find out how your workforce can scale back hidden handbook delays, enhance reliability via automated response, and construct and scale clever workflows on high of instruments you already use.


