• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Industry News   »   Current News   »   Japanese defense contractors reveals breach likely compromised nuclear data

Japanese defense contractors reveals breach likely compromised nuclear data

  • Posted on:November 17, 2011
  • Posted in:Current News, Privacy & Policy
  • Posted by:
    Trend Micro
0

Late last month, Japanese defense contractor Mitsubishi Heavy Industries revealed that it had fallen victim to a cyberattack. As details continue to emerge, it appears as though data related to military jets and nuclear power plants may have been leaked.

According to the Daily Yomiuri, approximately 80 MHI servers and computers may have been affected in last month’s data security breach. Among the compromised infrastructure were several machines involved in the development of submarines, missiles and nuclear power plants.

Company officials told the Yomiuri that the incident occurred as a result of a targeted, Trojan horse attack as opposed to internal improprieties. At the time, MHI also suggested that some data files may have been stolen in the attack, although investigators were not yet certain.

Speculation has now been confirmed.

According to InformationWeek, sources close to the Japanese defense ministry are suggesting that although data relating to confidential national security matters had not been breached, some private information was stolen in the cyberattack. As more information comes to light, many are beginning to think something quite sinister is in the works.

Earlier in the month, the email addresses for executives at MHI and Kawasaki Heavy Industries were acquired by hackers. According to InformationWeek, the information was likely gathered as a result of a cyberattack directed at the Society of Japanese Aerospace Companies earlier in the year.

Additionally, MHI was compelled to file a report with Tokyo police even before the revelation of its noteworthy data breach. According to InformationWeek, the company was persistently targeted by hackers throughout the summer, reporting data security issues at nearly a dozen separate facilities.

Rumors that the attack came from a Chinese IP address flared political tensions, and new reports of a separate cyberattack on the Japanese public sector are giving credence to that line of reasoning.

According to the New York Times, several computer systems within Japanese Parliament have become infected with viruses. Details remain scarce, but the personal computers of three legislators and possibly a server were targeted, potentially compromising log-in information and emails. And although Chinese officials continued to deny any involvement, media outlets have suggested that simplified Chinese characters were identified in the shorthand coding responsible for earlier attacks.

As cybercriminals become more brazen in their methods and motivations, cybersecurity administrators across all sectors may be wise to seek out the insight and best practices adopted by their colleagues.

Data Security News from SimplySecurity.com by Trend Micro

Related posts:

  1. Internet security not lost on defense contractors
  2. Best Buy suffers second data breach in a month
  3. Researcher uncovers IEEE data breach, reveals poor security practices
  4. Citi reveals more accounts affected in breach

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Cloud-based Email Threats Capitalized on Chaos of COVID-19
  • Detected Cyber Threats Rose 20% to Exceed 62.6 Billion in 2020
  • Trend Micro Recognized on CRN Security 100 List
  • Trend Micro Reports Solid Results for Q4 and Fiscal Year 2020
  • Connected Cars Technology Vulnerable to Cyber Attacks
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.