
Advantest Hit by Ransomware; probe ongoing
Advantest Hit by Ransomware; probe ongoing
Initial discovery and action. On Feb. 15 the company identified unusual activity in its IT environment and immediately activated its incident response procedures.
Response teams moved quickly to isolate affected systems. Early technical traces suggest ransomware was introduced to segments of the network, though investigators have not yet verified whether files were stolen.
Scope and exposure. Advantest supplies automatic test tools used by major chipmakers, which makes the company a high-value target for extortion attempts aimed at disrupting production or extracting sensitive designs.
No extortion group has publicly claimed responsibility so far, and the absence of a public admission may mean the actors are preparing a ransom demand or data leak later.
Regulatory and industry context. The incident follows recent guidance in Japan aimed at securing operational technology in semiconductor plants, increasing scrutiny on how vendors protect factory-related systems.
For customers and staff, Advantest stated it will notify anyone whose personal or business information is confirmed affected and deliver advice on protective steps.
Why it matters to the supply chain. Even if direct data loss is limited, operational disruption at a test-equipment supplier can ripple across chip production lines that depend on calibrated tools and software.
Investigators continue to collect forensic evidence and trace the intrusion path; containment and recovery actions remain active as the company assesses the full impact.
- Detection date: Feb. 15, 2026 — initial response activated immediately.
- Attack vector: preliminary indicators of ransomware deployment on parts of the network.
- Claims: no known ransom group has taken credit yet; investigation ongoing.
Takeaway for peers. Vendors in semiconductor support ecosystems must reassess OT/IT segmentation and incident readiness; regulators may tighten reporting requirements if follow-on impacts appear.
Read Our Expert Analysis
Create an account or login for free to unlock our expert analysis and key takeaways for this development.
By continuing, you agree to receive marketing communications and our weekly newsletter. You can opt-out at any time.
Recommended for you
Ransomware strike at Ingram Micro exposes sensitive records of ~42,500 people
A July ransomware incident at Ingram Micro led to the theft of employment and applicant records for about 42,521 people and service outages that were largely resolved within a week. A threat actor later published roughly 3.5 TB of claimed data; the company is offering two years of identity protection while facing regulatory notification, legal exposure, and heightened supply‑chain scrutiny.
Machine identities missing from ransomware playbooks
Enterprise ransomware playbooks commonly treat credential resets as a human-only control, leaving service accounts, API keys, tokens and certificates intact — a blind spot that accelerates lateral movement and drives recovery costs. Market shifts toward targeted, disruption-focused extortion and faster weaponization via agentic AI make that omission more dangerous: defenders must pair machine-identity governance with identity-first detection and quicker containment to blunt modern ransomware economics.

Steam platform hit by suspected malware-laced titles; FBI opens probe
The FBI has opened an inquiry after multiple titles on Steam were flagged as carrying malicious code. Seven suspected games spanning about two years were named, prompting immediate platform scrutiny and calls for victim reports.

Industrial Control Systems: Rising pre‑positioning and ransomware force OT resilience shift
By 2026, adversaries will increasingly combine quiet, long‑dwell reconnaissance with financially motivated ransomware and faster weaponization to exploit ICS. Defenders must adopt CTEM, identity‑centric controls (including comprehensive machine‑identity inventories and rapid revocation), OT‑aware zero trust, SBOM-driven supply‑chain visibility, and conservative AI-based anomaly detection to preserve uptime and compress remediation windows.

U.S. Authorities Seize RAMP, a Major Ransomware Marketplace
Federal agents have taken control of RAMP’s online domains, disrupting a multilingual marketplace that facilitated ransomware and related criminal services. The move removes a central storefront but leaves tooling, relationships, and likely migration paths intact, while providing intelligence opportunities for follow-on prosecutions.
Ransomware Shift: Low Payouts Force Return to Encryption and Targeted Disruption
Mass data-theft campaigns have lost their profit edge as corporate resistance to paying ransoms grows, prompting ransomware operators to favor encryption and more disruptive tactics. High-profile law-enforcement seizures of prominent forums (e.g., RAMP) are adding friction for criminals but also driving them into more private, invitation-only channels.
Aqua Security’s Trivy Scanner Hit by Supply‑Chain Compromise
The widely used Trivy vulnerability scanner was altered via stolen credentials, injecting malicious code into CI/CD workflows and exposing pipeline secrets. Immediate secret rotation and tag validation are required; at least 75 action tags and 7 setup tags were modified.

TeamT5 ThreatSonar vulnerability exploited; CISA adds flaw to KEV list
CISA added a high-severity vulnerability in TeamT5’s ThreatSonar (CVE-2024-7694) to its Known Exploited Vulnerabilities catalogue and required federal remediation by March 10, 2026. The bug allows unsafe file uploads that can be chained with elevated privileges to achieve remote command execution; a vendor patch was issued in August 2024 but evidence of in‑the‑wild exploitation has been reported.