Mitsubishi breached by suspected Chinese hackers

The electronics giant is one of Japan’s key defence and infrastructure contractors

Japanese electronics and manufacturing titan Mitsubishi announced it has detected evidence of a cyber attack in which attackers allegedly stole around 200MB of internal business documents from a number of PCs and servers.

The attack took place more than six months ago on 28 June last year, according to a short statement posted to the company’s website, and involved the theft of personal information and confidential corporate data.

Concerns have been raised as to the consequences of the attack, due to Mitsubishi’s close ties to the Japanese government. The company holds a number of key contracts within Japan’s national infrastructure and defence sectors, but Mitsubishi has denied that any sensitive information relating to these areas was leaked.

According to Japan’s Nikkei newspaper, sources involved in the investigation into the breach suggest that ‘Tick’ - a hacking group with suspected links to China that has attacked a series of Japanese defence, satellite and aerospace companies - may be behind the attack. 

Related Resource

How targeted simulations differ from penetration tests and vulnerability scanning

Stay one step ahead of cyber attackers

Download now

The attack on Mitsubishi’s network has been traced back to a single compromised account belonging to an employee of one of the company’s China-based affiliates, according to Japan’s Asahi Shimbun newspaper, which was then used to infiltrate the internal networks and compromise machines belonging to a number of middle managers throughout various divisions.

Along with the data stolen as part of the initial breach, the attack could be used to launch supply-chain attacks against Mitsubishi’s corporate customers and partners; a tactic that has become increasingly popular in recent years.

Mitsubishi has apologised for the inconvenience caused to anyone affected by the incident.

Featured Resources

Digital document processes in 2020: A spotlight on Western Europe

The shift from best practice to business necessity

Download now

Four security considerations for cloud migration

The good, the bad, and the ugly of cloud computing

Download now

VR leads the way in manufacturing

How VR is digitally transforming our world

Download now

Deeper than digital

Top-performing modern enterprises show why more perfect software is fundamental to success

Download now

Recommended

What is hacktivism?
hacking

What is hacktivism?

13 Oct 2020
Microsoft: Iranian hackers are exploiting ZeroLogon flaw
Security

Microsoft: Iranian hackers are exploiting ZeroLogon flaw

6 Oct 2020
The Ritz suffers data breach after hackers pose as staff
data breaches

The Ritz suffers data breach after hackers pose as staff

17 Aug 2020
Russia hacked Liam Fox's personal email to steal trade documents
phishing

Russia hacked Liam Fox's personal email to steal trade documents

4 Aug 2020

Most Popular

The top 12 password-cracking techniques used by hackers
Security

The top 12 password-cracking techniques used by hackers

5 Oct 2020
The enemy of security is complexity
Sponsored

The enemy of security is complexity

9 Oct 2020
What is a 502 bad gateway and how do you fix it?
web hosting

What is a 502 bad gateway and how do you fix it?

5 Oct 2020