Advantest Semiconductor Giant Reports Ransomware Attack on Corporate Network


Advantest Corporation confirmed a ransomware attack hit its corporate network on February 15, 2026. The Tokyo-based semiconductor testing leader detected unusual IT activity and isolated affected systems immediately. Third-party cybersecurity experts now investigate potential data exposure for customers and employees.​

Advantest employs 7,600 workers globally and generates over $5 billion in annual revenue. The firm holds $120 billion market capitalization as a critical supplier to chip manufacturers worldwide. Preliminary findings confirm unauthorized access and ransomware deployment in network segments. No data theft confirmed yet.

Company operations continue with isolated systems offline. Advantest committed direct notifications if customer or employee data proves compromised. Investigation scope expands daily with external specialist support. Regular updates promised through corporate channels.

Company Profile Table

MetricDetails
Employees7,600 worldwide
Annual Revenue$5+ billion
Market Cap$120 billion
Core BusinessSemiconductor test equipment
Key MarketsChip manufacturing, 5G, AI

Critical infrastructure supplier impacted.

Incident Timeline

Attack unfolded rapidly:

  • Feb 15: Unusual IT activity detected.
  • Immediate: Systems isolated per protocols.
  • Feb 19: Ransomware deployment confirmed.
  • Ongoing: Third-party investigation active.

Swift containment limited spread.

Response Measures

Advantest activated comprehensive protocols:

  • Affected network segments isolated.
  • External cybersecurity firms engaged.
  • Data exposure assessment underway.
  • Customer/employee notification prepared.
  • Defenses reinforced during investigation.

Business continuity prioritized.

Potential Data Impact

Current assessment status:

  • No confirmed data exfiltration.
  • Customer records under review.
  • Employee information examined.
  • Notification protocols ready.

Scope determination continues.

Japanese Cyberattack Context

Advantest joins recent targets:

  • Washington Hotel: Ransomware infection.
  • Nissan: Red Hat supply chain breach.
  • Muji: Supplier ransomware disruption.
  • Asahi: Qilin ransomware data leak.
  • NTT: 18,000 companies exposed.

Semiconductor sector increasingly targeted.

Industry Significance

Advantest supplies critical equipment:

  • Semiconductor test systems.
  • 5G wireless measurement tools.
  • AI chip validation platforms.
  • Mechatronics instruments.

Supply chain disruptions possible.

Investigation Partners

External experts assist:

  • Ransomware deployment analysis.
  • Network access reconstruction.
  • Data integrity verification.
  • Attacker TTP identification.

Leading cybersecurity firms engaged.

Next Steps Expected

Advantest committed transparency:

  • Regular investigation updates.
  • Direct notifications if required.
  • Protective guidance for affected parties.
  • Financial impact assessment.

Stakeholders monitoring closely.

FAQ

When did Advantest detect ransomware?

February 15, 2026, via unusual IT activity.

Has Advantest confirmed data theft?

No confirmed exfiltration as of February 22.

What does Advantest manufacture?

Semiconductor test equipment, 5G tools, AI validation.

Will customers receive notifications?

Yes, if data proves compromised.

Which agencies investigate Advantest attack?

Third-party cybersecurity specialists.

How many employees work at Advantest?

7,600 globally.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages