Menu

Toshiba’s European Operations Hit by Hacker Group DarkSide Cyberattack

The News: A subsidiary of Toshiba’s European operations were the victim of a DarkSide cyberattack on May 4th, and reported publicly on May 14th. The company reported that as a result of the attack, the company shut down network connections between Europe and Japan to mitigate potential risk as the hack is being investigated. More at Cyberscoop.

Toshiba’s European Operations Hit by Hacker Group DarkSide Cyberattack

Analyst Take: The DarkSide cyberattack on Toshiba’s European operations appears thus far to be limited to the company’s European operations and focused on Toshiba Tec, which sells POS systems for retailers. There’s not yet been confirmation by the Toshiba subsidiary of the scope of the leaked information, and an investigation is still underway.

This is the second cyberattack in recent times aimed at Toshiba, following an earlier attack that happened in France. Early on Friday May 12th, DarkSide took responsibility for that attack and claimed to have accessed over 700 GB of data. The data compromised in the France attack included data around projects, human resources, passports and personal information of employees (including executive management), sales, and new business and trade information.

Why Japanese Companies are Attractive Targets for Threat Actors

Takashi Yoshikawa, a cybersecurity expert with Mitsui Bussan Secure Directions was interviewed about these recent attacks on Toshiba and noted that attacks on Japanese companies are at their highest ever. He also stated something that we’ve discussed at length here: the fact that with so many employees working from home and remotely accessing company systems, organizations are more vulnerable to cyberattacks.

Yoshikawa indicated that he believes Japanese companies are attractive targets for threat actors as a whole, because they don’t properly estimate the time and resources needed to put the right security protections and protocols in place, and when they are advised about that, they don’t tend to take the advice. Perhaps soon they will learn and adjust that mentality.

My colleague and fellow analyst here at Futurum Research and I covered the Toshiba DarkSide attack in the most recent episode of the Futurum Tech Webcast, as part of our Cybersecurity Shorts series. You can find the brief conversation here:

Or access the entire episode, which includes a number of timely insights on cybersecurity-related topics, here:

Disclaimer: The Futurum Tech Webcast is for information and entertainment purposes only. Over the course of this podcast, we may talk about companies that are publicly traded and we may even reference that fact and their equity share price, but please do not take anything that we say as a recommendation about what you should do with your investment dollars. We are not investment advisors and we do not ask that you treat us as such.

More Insights from Futurum Research:

Vodafone And Qualcomm Embark On Vision Quest For Open RAN Vendor Diversification And Swifter 5G Innovation

Plus Announces SPAC Deal To Take Self-Driving Truck Startup Public

Automation Anywhere Announces Early Access To Google Cloud-Powered Automation 360

Transcript:

Shelly Kramer: Speaking of governments, I wanted to wrap up the show with just a couple of quick highlights, and a nod to the fact that it’s not just the US Government that has issues with cybersecurity.

I saw earlier today that a subsidiary of Toshiba’s European operations were the victim of a cyber attack, perpetuated by DarkSide, our friends DarkSide, on May 4th. And, the attack appears to be limited to Toshiba’s European operations, and focused on part of the company called Toshiba Tec, which sells point-of-sale systems for retailers. Think lots of personally customer identification that goes through point-of-sale systems. There hasn’t been a confirmation yet of the scope of the leaked information, an investigation is still underway. This is the second attack in recent times aimed at Toshiba, an earlier one happened in France. DarkSide took responsibility for the France attack, and claimed to have accessed over 700 gigs of data, including data around projects, human resources, senior executives, passports, and personal information of employees, sales, new business and trade information. So, when you think about, this is an example of what we’re talking about when we say Government goes in to protect all of this data, because there’s so much data involved.

The thing that I thought was really interesting, coming out of the Toshiba attack, was that a cybersecurity expert that was interviewed about this said that, “Attacks on Japanese companies are at their highest ever. And, the Japanese are very attractive targets for threat actors as a whole because they don’t properly estimate that time and resources needed to put the right security protections and protocols in place.” I don’t think the Japanese are alone here, by the way.

Fred McClimans: No, I don’t.

Shelly Kramer: “And, when they are advised, what they need to do, they don’t tend to take the advice.” So, I thought that was really interesting on a number of fronts related to these conversations.

Author Information

Shelly Kramer is a serial entrepreneur with a technology-centric focus. She has worked alongside some of the world’s largest brands to embrace disruption and spur innovation, understand and address the realities of the connected customer, and help navigate the process of digital transformation.

Related Insights
AWS re:Invent 2025: Wrestling Back AI Leadership
December 5, 2025

AWS re:Invent 2025: Wrestling Back AI Leadership

Futurum analysts share their insights on how AWS re:Invent 2025 redefines the cloud giant as an AI manufacturer. We analyze Nova models, Trainium silicon, and AI Factories as AWS moves...
Pure Storage Q3 FY 2026 Results Revenue Up 16% YoY, Guidance Raised
December 4, 2025

Pure Storage Q3 FY 2026 Results: Revenue Up 16% YoY, Guidance Raised

Futurum Research analyzes Pure Storage’s Q3 FY 2026 results, highlighting enterprise platform adoption, hyperscaler momentum, and Portworx-led modernization....
NetApp Q2 FY 2026 Earnings Mix Shift Lifts Margins, AI Momentum Builds
November 26, 2025

NetApp Q2 FY 2026 Earnings: Mix Shift Lifts Margins, AI Momentum Builds

Futurum Research analyzes NetApp’s Q2 FY 2026 results, highlighting AI data platform traction, first-party cloud storage growth, and all-flash mix that lifted margins, alongside raised FY EPS and margin guidance....
Commvault’s Strategic Shift Redefining Resilience as a Strategic Imperative
November 25, 2025

Commvault’s Strategic Shift: Redefining Resilience as a Strategic Imperative

Fernando Montenegro, VP and Practice Lead at Futurum, shares insights on Commvault Shift 2025, highlighting the new Cloud Unity platform and the strategic shift to ResOps to unify IT, security,...
Microsoft Ignite 2025 AI, Agent 365, Anthropic on Azure & Security Advances
November 21, 2025

Microsoft Ignite 2025: AI, Agent 365, Anthropic on Azure & Security Advances

Analysts Nick Patience, Mitch Ashley, Fernando Montenegro, and Keith Kirkpatrick share insights on Microsoft's shift to agent-centric architecture, cementing the role of Agent 365 as the operational control plane and...
Cisco Q1 FY 2026 AI Demand Lifts Outlook and Orders
November 14, 2025

Cisco Q1 FY 2026: AI Demand Lifts Outlook and Orders

Futurum Research analyzes Cisco’s Q1 FY 2026 results, highlighting AI infrastructure demand, campus refresh momentum, and a cloud-first security transition that lifts recurring revenue visibility into the second half of...

Book a Demo

Newsletter Sign-up Form

Get important insights straight to your inbox, receive first looks at eBooks, exclusive event invitations, custom content, and more. We promise not to spam you or sell your name to anyone. You can always unsubscribe at any time.

All fields are required






Thank you, we received your request, a member of our team will be in contact with you.