https://x.com/FalconFeedsio/status/1806234545655804035 

Our team gained access to the Kadokawa network almost a month ago. It took some time, because of the language, to figure out that Kadokawa subsidiaries' networks were connected to each other and to get through all the mess Kadokawa's IT department made there. We have discovered that Kadokawa networks architecture was not organised properly. It was different networks connected to the one big Kadokawas infrastructure being controlled through global control points, such as eSXI and V-sphere. Once we have gained access to the control center we have encrypted the whole network (Dwango, NicoNico, Kadokawa, other subsidiaries).

The second part of our Team downloaded about TB1,5 [1.5 TB] of data from the networks.

Link to the full ransom note 

(thank you throwmeaway1784)

This attack started earlier this month: https://www.japantimes.co.jp/news/2024/06/09/japan/video-sharing-site-niconico-cyberattack/

UPDATE: KADOKAWA has provided an updated report on the situation: https://tp.kadokawa.co.jp/.assets/240627_release_en_wD9vY5XU.pdf

Several segments of the business are impacted, they are unsure what information was stolen but it didn't include credit card information. They are currently investigating what information was stolen, results of this investigation are expected in July.