{"id":43872,"date":"2026-02-24T01:20:57","date_gmt":"2026-02-23T17:20:57","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/24\/leading-semiconductor-supplier-advantest-hit-by-ransomware-attack-infosecurity-magazine\/"},"modified":"2026-02-24T01:20:57","modified_gmt":"2026-02-23T17:20:57","slug":"leading-semiconductor-supplier-advantest-hit-by-ransomware-attack-infosecurity-magazine","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/24\/leading-semiconductor-supplier-advantest-hit-by-ransomware-attack-infosecurity-magazine\/","title":{"rendered":"Leading Semiconductor Supplier Advantest Hit by Ransomware Attack &#8211; Infosecurity Magazine"},"content":{"rendered":"<p>Advantest Corporation, the Japanese technology company and prominent manufacturer of testing equipment for the semiconductor industry, has been hit by a ransomware attack.<\/p>\n<p>In a statement <a href=\"https:\/\/www.advantest.com\/en\/news\/2026\/20260219.html\">released on February 19<\/a>, &nbsp;the company, which is a supplier to major chip producers including Samsung, said it was &ldquo;responding to a cybersecurity incident involving <a href=\"https:\/\/www.infosecurityeurope.com\/en-gb\/blog\/threat-vectors\/ransomware-trends-multi-extortion-tactics.html\">ransomware<\/a> that may have impacted certain systems within its network.&rdquo;<\/p>\n<p>Headquartered in Tokyo, Advantest employees over 7500 people and has offices in locations around the world, including Munich, Germany and San Jose, California.<\/p>\n<p>The company describes itself as &ldquo;a global leader in semiconductor test solutions&rdquo; and it tests chips used to power services including 5G communications, <a href=\"https:\/\/www.infosecurityeurope.com\/en-gb\/blog\/threat-vectors\/iot-device-security.html\">Internet of Things (IoT) devices<\/a>, autonomous vehicles and high-performance computing, including AI and machine learning systems.<\/p>\n<p>Advantest said that it detected &ldquo;unusual activity&rdquo; within its IT environment on February 15 which resulted in the immediate deployment of its &ldquo;incident response protocols&rdquo;.<\/p>\n<p>This included isolation of the affected systems and &ldquo;leading third-party cybersecurity experts&rdquo; being brought in to aid with investigation and containment of the incident.<\/p>\n<p>&ldquo;Preliminary findings appear to indicate that an unauthorized third party may have gained access to portions of the company&rsquo;s network and deployed ransomware,&rdquo; the company said.<\/p>\n<p>As of February 23, a data breach has not been confirmed, but Advantest said it is &ldquo;dedicated to transparency&rdquo; and would provide regular updates about the ongoing investigation.<\/p>\n<p>&ldquo;If our investigation determines that customer or employee data was affected, we will notify impacted persons directly and provide guidance on protective measures,&rdquo; the statement added.<\/p>\n<p>Advantest has not confirmed which IT services have been compromised with ransomware or how the incident could impact the semiconductor tester&rsquo;s services or its customers.<\/p>\n<p><em>Infosecurity <\/em>contacted Advantest for comment but had not received a response at the time of publication.<\/p>\n<p>Ransomware remains <a href=\"https:\/\/www.infosecurity-magazine.com\/news-features\/why-ransomware-remains\/\">one of the most significant and most disruptive cybersecurity threats<\/a> facing companies around the globe today. Japan was also the target of one of the most significant <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/top-ransomware-trends-of-2025\/\">ransomware attacks<\/a> of 2025, <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/asahi-launch-cybersecurity\/\">which saw Japanese brewer Asahi halt production of beer<\/a> to the extent that retailers faced shortages.<\/p>\n<p>The Asahi ransomware attack was work of <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/qilin-ransomware-asahi-cyber-attack\/\">the Qilin ransomware group<\/a>. At the time of publication, so cyber criminal operation has claimed responsibility for the Advantest ransomware attack.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Advantest Corporation, the Japanese technology company  [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-43872","post","type-post","status-publish","format-standard","hentry","category--infosecurity-magazine"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43872","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=43872"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43872\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=43872"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=43872"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=43872"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}