Menu

Toshiba’s European Operations Hit by Hacker Group DarkSide Cyberattack

The News: A subsidiary of Toshiba’s European operations were the victim of a DarkSide cyberattack on May 4th, and reported publicly on May 14th. The company reported that as a result of the attack, the company shut down network connections between Europe and Japan to mitigate potential risk as the hack is being investigated. More at Cyberscoop.

Toshiba’s European Operations Hit by Hacker Group DarkSide Cyberattack

Analyst Take: The DarkSide cyberattack on Toshiba’s European operations appears thus far to be limited to the company’s European operations and focused on Toshiba Tec, which sells POS systems for retailers. There’s not yet been confirmation by the Toshiba subsidiary of the scope of the leaked information, and an investigation is still underway.

This is the second cyberattack in recent times aimed at Toshiba, following an earlier attack that happened in France. Early on Friday May 12th, DarkSide took responsibility for that attack and claimed to have accessed over 700 GB of data. The data compromised in the France attack included data around projects, human resources, passports and personal information of employees (including executive management), sales, and new business and trade information.

Why Japanese Companies are Attractive Targets for Threat Actors

Takashi Yoshikawa, a cybersecurity expert with Mitsui Bussan Secure Directions was interviewed about these recent attacks on Toshiba and noted that attacks on Japanese companies are at their highest ever. He also stated something that we’ve discussed at length here: the fact that with so many employees working from home and remotely accessing company systems, organizations are more vulnerable to cyberattacks.

Yoshikawa indicated that he believes Japanese companies are attractive targets for threat actors as a whole, because they don’t properly estimate the time and resources needed to put the right security protections and protocols in place, and when they are advised about that, they don’t tend to take the advice. Perhaps soon they will learn and adjust that mentality.

My colleague and fellow analyst here at Futurum Research and I covered the Toshiba DarkSide attack in the most recent episode of the Futurum Tech Webcast, as part of our Cybersecurity Shorts series. You can find the brief conversation here:

Or access the entire episode, which includes a number of timely insights on cybersecurity-related topics, here:

Disclaimer: The Futurum Tech Webcast is for information and entertainment purposes only. Over the course of this podcast, we may talk about companies that are publicly traded and we may even reference that fact and their equity share price, but please do not take anything that we say as a recommendation about what you should do with your investment dollars. We are not investment advisors and we do not ask that you treat us as such.

More Insights from Futurum Research:

Vodafone And Qualcomm Embark On Vision Quest For Open RAN Vendor Diversification And Swifter 5G Innovation

Plus Announces SPAC Deal To Take Self-Driving Truck Startup Public

Automation Anywhere Announces Early Access To Google Cloud-Powered Automation 360

Transcript:

Shelly Kramer: Speaking of governments, I wanted to wrap up the show with just a couple of quick highlights, and a nod to the fact that it’s not just the US Government that has issues with cybersecurity.

I saw earlier today that a subsidiary of Toshiba’s European operations were the victim of a cyber attack, perpetuated by DarkSide, our friends DarkSide, on May 4th. And, the attack appears to be limited to Toshiba’s European operations, and focused on part of the company called Toshiba Tec, which sells point-of-sale systems for retailers. Think lots of personally customer identification that goes through point-of-sale systems. There hasn’t been a confirmation yet of the scope of the leaked information, an investigation is still underway. This is the second attack in recent times aimed at Toshiba, an earlier one happened in France. DarkSide took responsibility for the France attack, and claimed to have accessed over 700 gigs of data, including data around projects, human resources, senior executives, passports, and personal information of employees, sales, new business and trade information. So, when you think about, this is an example of what we’re talking about when we say Government goes in to protect all of this data, because there’s so much data involved.

The thing that I thought was really interesting, coming out of the Toshiba attack, was that a cybersecurity expert that was interviewed about this said that, “Attacks on Japanese companies are at their highest ever. And, the Japanese are very attractive targets for threat actors as a whole because they don’t properly estimate that time and resources needed to put the right security protections and protocols in place.” I don’t think the Japanese are alone here, by the way.

Fred McClimans: No, I don’t.

Shelly Kramer: “And, when they are advised, what they need to do, they don’t tend to take the advice.” So, I thought that was really interesting on a number of fronts related to these conversations.

Author Information

Shelly Kramer is a serial entrepreneur with a technology-centric focus. She has worked alongside some of the world’s largest brands to embrace disruption and spur innovation, understand and address the realities of the connected customer, and help navigate the process of digital transformation.

Related Insights
OpenAI Frontier Close the Enterprise AI Opportunity Gap—or Widen It
February 9, 2026

OpenAI Frontier: Close the Enterprise AI Opportunity Gap—or Widen It?

Futurum Research Analysts Mitch Ashley, Keith Kirkpatrick, Fernando Montenegro, Nick Patience, and Brad Shimmin examine OpenAI Frontier and whether enterprise AI agents can finally move from pilots to production. The...
Commvault Introduces Geo Shield. Can One Platform Meet Sovereign Needs?
February 9, 2026

Commvault Introduces Geo Shield. Can One Platform Meet Sovereign Needs?

Fernando Montenegro, VP & Practice Lead for Cybersecurity & Resilience at Futurum, examines Commvault Geo Shield and its focus on sovereign deployment models that retain control over data location, operations,...
Is 2026 the Turning Point for Industrial-Scale Agentic AI?
February 5, 2026

Is 2026 the Turning Point for Industrial-Scale Agentic AI?

VP and Practice Lead Fernando Montenegro shares insights from the Cisco AI Summit 2026, where leaders from the major AI ecosystem providers gathered to discuss bridging the AI ROI gap...
Cisco’s "End of Gold": A High-Stakes Pivot to Skills-First Architecture
February 3, 2026

Cisco’s “End of Gold”: A High-Stakes Pivot to Skills-First Architecture

Tiffani Bova, Chief Strategy and Research Officer at The Futurum Group, examines Cisco’s 360 Partner Program and how its redesigned incentives, designations, and tools aim to align partner profitability with...
ServiceNow Q4 FY 2025 Earnings Highlight AI Platform Momentum
January 30, 2026

ServiceNow Q4 FY 2025 Earnings Highlight AI Platform Momentum

Futurum Research analyzes ServiceNow’s Q4 FY 2025 results, highlighting AI agent monetization, platform consolidation in CRM/CPQ, and a security stack aimed at scaling agentic AI across governed workflows heading into...
Microsoft Q2 FY 2026 Cloud Surpasses $50B; Azure Up 38% CC
January 30, 2026

Microsoft Q2 FY 2026: Cloud Surpasses $50B; Azure Up 38% CC

Futurum Research analyzes Microsoft’s Q2 FY 2026 earnings, highlighting AI-led cloud demand, agent platform traction, and Copilot adoption amid record capex and a substantially expanded commercial backlog....

Book a Demo

Newsletter Sign-up Form

Get important insights straight to your inbox, receive first looks at eBooks, exclusive event invitations, custom content, and more. We promise not to spam you or sell your name to anyone. You can always unsubscribe at any time.

All fields are required






Thank you, we received your request, a member of our team will be in contact with you.