Mitsubishi breached by suspected Chinese hackers

The electronics giant is one of Japan’s key defence and infrastructure contractors

Japanese electronics and manufacturing titan Mitsubishi announced it has detected evidence of a cyber attack in which attackers allegedly stole around 200MB of internal business documents from a number of PCs and servers.

The attack took place more than six months ago on 28 June last year, according to a short statement posted to the company’s website, and involved the theft of personal information and confidential corporate data.

Concerns have been raised as to the consequences of the attack, due to Mitsubishi’s close ties to the Japanese government. The company holds a number of key contracts within Japan’s national infrastructure and defence sectors, but Mitsubishi has denied that any sensitive information relating to these areas was leaked.

According to Japan’s Nikkei newspaper, sources involved in the investigation into the breach suggest that ‘Tick’ - a hacking group with suspected links to China that has attacked a series of Japanese defence, satellite and aerospace companies - may be behind the attack. 

Related Resource

How targeted simulations differ from penetration tests and vulnerability scanning

Stay one step ahead of cyber attackers

Download now

The attack on Mitsubishi’s network has been traced back to a single compromised account belonging to an employee of one of the company’s China-based affiliates, according to Japan’s Asahi Shimbun newspaper, which was then used to infiltrate the internal networks and compromise machines belonging to a number of middle managers throughout various divisions.

Along with the data stolen as part of the initial breach, the attack could be used to launch supply-chain attacks against Mitsubishi’s corporate customers and partners; a tactic that has become increasingly popular in recent years.

Mitsubishi has apologised for the inconvenience caused to anyone affected by the incident.

Featured Resources

BCDR buyer's guide for MSPs

How to choose a business continuity and disaster recovery solution

Download now

The definitive guide to IT security

Protecting your MSP and your customers

Download now

Cost of a data breach report 2020

Find out what factors help mitigate breach costs

Download now

The complete guide to changing your phone system provider

Optimise your phone system for better business results

Download now

Recommended

Security researchers take control of a Tesla via drone
ethical hacking

Security researchers take control of a Tesla via drone

5 May 2021
New report highlights the need for diversity in cyber security recruitment
cyber security

New report highlights the need for diversity in cyber security recruitment

28 Apr 2021
Hackers could abuse legitimate Windows AD FS to steal data
Microsoft Windows

Hackers could abuse legitimate Windows AD FS to steal data

28 Apr 2021
Average ransomware costs have more than doubled in 2021
ransomware

Average ransomware costs have more than doubled in 2021

28 Apr 2021

Most Popular

KPMG offers staff 'four-day fortnight' in hybrid work plans
flexible working

KPMG offers staff 'four-day fortnight' in hybrid work plans

6 May 2021
Dell patches vulnerability affecting hundreds of computer models worldwide
cyber security

Dell patches vulnerability affecting hundreds of computer models worldwide

5 May 2021
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

29 Apr 2021