• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
fujitsu saas hack sends govt. of japan scrambling

Fujitsu SaaS Hack Sends Govt. of Japan Scrambling

You are here: Home / Cloud Security News / Fujitsu SaaS Hack Sends Govt. of Japan Scrambling
May 27, 2021

Tech large disables ProjectWEB cloud-dependent collaboration system after risk actors acquired access and nabbed information belonging to several state entities.

Menace actors have stolen information from various formal federal government businesses of Japan by hacking into Fujitsu’s software program-as-a-company (SaaS) system and gaining accessibility to its techniques.

The Japan-dependent tech big temporarily disabled ProjectWEB business after finding out of the attack, which is known to have influenced the Ministry of Land, Infrastructure, Transport, and Tourism the Cupboard Secretariat and the Narita Airport so significantly but could have experienced other victims, in accordance to a write-up on analyst firm Recorded Future’s The Record.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


ProjectWEB is a a cloud-based business collaboration and file-sharing system that Fujitsu has operated since the mid-2000s, and which a selection of agencies inside of the Japan govt now use.

Fujitsu’s Cabinet Cyber Security Middle (NISC), which is investigating the incident, reported the breach was found on Monday and issued a release the next day with advice to all federal government companies to choose countermeasures to see if they are utilizing ProjectWEB.

If so, NISC advised companies to look into to see if they also had been breached, in accordance to a assertion posted on the web Tuesday (PDF), and to report unauthorized accessibility or facts leaks.

System Disabled

Fujitsu made a decision to suspend the procedure of ProjectWEB on Tuesday following tension from NISC, apologizing “for the good issue and inconvenience” the breach induced its buyers.

“We will keep on to get the job done on investigating and analyzing the scope of effects and the triggers of all tasks that use [ProjectWEB] with the cooperation of our consumers,” in accordance to the statement (translated from Japanese). “We take this circumstance quite critically and will go on to consult with the appropriate authorities and make every effort and hard work to support the victims. that is all Inquiries about this issue.”

However Fujitsu did not disclose details about nor the scope of what was stolen, a report in the Japanese press claimed that attackers pilfered paperwork that contained much more than 76,000 email addresses for staff and contractors for the Ministry of Land, Infrastructure, Transport, and Tourism.

Details on air traffic control also was nabbed from the Narita Airport, which serves Tokyo, according to a independent report by Japanese public broadcaster NHK. Authorities also have not disclosed any know-how of who was at the rear of the attacks nor what their motives might have been.

Federal government Targets

The attack is the second cyber incident the government of Japan has experienced in a thirty day period. In late April, threat actors leveraged two vulnerabilities in a well-liked file-sharing server from Japan-dependent Solito to breach company and federal government devices and steal delicate facts as aspect of a world wide hacking campaign that influenced the Japan Prime Minister’s Cabinet Office. The incident was identical to the series of Accellion attacks that happened previously this 12 months.

Certainly, government agencies and their affiliate marketers all-around the planet have endured a rash of cyber attacks not too long ago that brought about varying degrees of disruption.

Effects of the ransomware attack previously this month on Colonial Pipeline, a significant U.S. oil provider, are however being felt. About a week later on, Ireland’s office of wellbeing was hit with two ransomware attacks—one thriving, one particular failed—which interfered with health and fitness expert services and appointments and made tens of hundreds of thousands of bucks in problems.

The ProjectWEB incident also is not the very first time Fujitsu experienced to disrupt a solution due to a security incident. In 2019, the enterprise halted gross sales of its well-liked Fujitsu Wi-fi Keyboard Set LX901 right after a researcher found out that it was vulnerable to keystroke injection attacks that could let an adversary to just take regulate of a victim’s system.

Join Threatpost for “A Wander On The Dark Aspect: A Pipeline Cyber Crisis Simulation”– a Dwell interactive demo on Wed, June 9 at 2:00 PM EDT. Sponsored by Immersive Labs, obtain out irrespective of whether you have the equipment and abilities to avert a Colonial Pipeline-design attack on your firm. Queries and Are living audience participation encouraged. Sign up for the discussion and Register HERE for free.

Hack of Fujitsu SaaS Platform Sends Japanese Government Scrambling

Some pieces of this report are sourced from:
threatpost.com

Previous Post: «biden’s cybersecurity executive order puts emphasis on the wrong issues Biden’s Cybersecurity Executive Order Puts Emphasis on the Wrong Issues
Next Post: Malvertising Campaign On Google Distributed Trojanized AnyDesk Installer malvertising campaign on google distributed trojanized anydesk installer»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections

Copyright © TheCyberSecurity.News, All Rights Reserved.