Yakult, World’s Leading Probiotic Drink Producer, Suffers Large-Scale Data Breach

Yakult, the world’s largest producer of probiotic drinks, has fallen victim to a significant cyberattack that has exposed private data and confidential corporate records on the dark web. This breach raises concerns about data security and the potential impact on Yakult’s reputation and future actions.

The Threat Actor and Data Breach

DragonForce, a notorious threat actor, has claimed responsibility for the breach. This cybercriminal group has reportedly gained unauthorized access to over 95GB of Yakult’s sensitive data. Despite the severity of the attack, Yakult remains tight-lipped, refusing to divulge further details regarding the breach.

Confirmation of Ransomware Attack

Sources have confirmed that Yakult, a Melbourne-based company located in Dandenong, has indeed suffered a ransomware attack. ABC Investigations has independently verified the incident, highlighting the credibility of the breach.

DragonForce’s Targets and Responsibilities

DragonForce has been actively targeting organizations since the beginning of December, singling out companies that have declined to cooperate. Yakult is just the latest victim under this threat actor’s radar. With their audacious claim of responsibility, DragonForce flaunts their ability to infiltrate even well-established and reputable companies.

Analysis of Leaked Files

An analysis conducted by ABC reveals that the leaked files contain Yakult’s confidential information dating back to 2001. This includes a trove of data pertaining to Yakult’s operations, employee records, and customer details. Shockingly, the exposed information includes scans of passports, pre-employment medical assessments and certificates, salaries, and performance reviews. Furthermore, another database containing the names and addresses of nearly 9,000 individuals has been discovered.

Yakult’s Response

On December 15, Yakult Australia became aware of the cyberattack. In response, the company promptly issued a statement on its website, acknowledging the incident and vowing to collaborate with cyber incident experts to investigate the extent of the breach. Despite the breach, Yakult assures the public that all its offices in Australia and New Zealand remain open and operational.

Implications and Impact

This data breach poses significant risks to Yakult’s reputation, customer trust, and overall business operations. The leak of sensitive employee information, along with customer data, has serious privacy and security implications. Yakult will need to act swiftly to regain customer confidence and ensure that adequate cybersecurity measures are in place to prevent future breaches.

The breach targeting Yakult, the leading producer of probiotic drinks worldwide, has exposed the company’s private data and corporate records on the dark web. The responsibility lies with the threat actor group DragonForce, which has been on a spree targeting organizations that refuse to cooperate. The leaked files, containing sensitive information dating back to 2001, including employee records and customer details, pose a severe threat to Yakult’s reputation and customer trust. In a time where cyber threats are evolving, this incident serves as a critical reminder for organizations to reinforce their cybersecurity measures and protect sensitive data from malicious actors. Yakult must take immediate action to rectify the breach, regain the trust of its customers, and prevent future cyber threats.

Explore more

Why Is This $20 Windows 11 Pro and Training Bundle a Steal?

Navigating the complexities of modern computing requires more than just high-end hardware; it demands an operating system that integrates seamlessly with artificial intelligence while providing robust security for sensitive personal and professional data. As of 2026, many users still find themselves tethered to aging software environments that struggle to keep pace with the rapid advancements in cloud computing and data

Can Human Creativity Fix the B2B Marketing Crisis?

The traditional machinery of business-to-business lead generation is currently facing a systemic collapse that no amount of software optimization or budget increases can seemingly rectify. As digital ecosystems become saturated with automated outreach and AI-generated content, the efficacy of the standard Marketing Qualified Lead model has plummeted to historic lows. Organizations that once relied on high-volume form fills and gated

CISA Adds Critical Cisco SD-WAN Flaw to Known Exploited List

The rapid evolution of software-defined networking has inadvertently expanded the attack surface for global enterprise environments, leaving critical management interfaces exposed to highly sophisticated digital adversaries. The Cybersecurity and Infrastructure Security Agency has officially added CVE-2026-20182 to its Known Exploited Vulnerabilities catalog, signaling an immediate and critical threat to core network infrastructure. This specific vulnerability impacts the Cisco Catalyst SD-WAN

Sydney Police Bust $600,000 BEC Scam and Seize Gold Bullion

The digital landscape of financial fraud has shifted dramatically in recent years, as sophisticated criminal syndicates increasingly utilize business email compromise techniques to divert substantial sums of money from unsuspecting corporate entities into private accounts. This specific methodology involves the illicit infiltration of communication channels to intercept invoices or payment requests, which are then subtly altered to redirect funds toward

OpenAI Secures Systems After Massive Supply Chain Attack

The rapid expansion of artificial intelligence infrastructure has created a massive surface area for sophisticated threat actors who are increasingly moving away from traditional perimeter attacks toward more insidious methods. Recent revelations regarding a security compromise at OpenAI have underscored this shift, demonstrating how even the most prominent players in the AI industry can be targeted through the very tools