Japanese government data stolen in Fujitsu hack

Hackers gained access to the data through Fujitsu's project management software

Hackers have gained access to Fujitsu's project management platform resulting in data leaks from various Japanese government offices, according to reports.

A spokesperson for Fujitsu confirmed to IT Pro that an unauthorised third-party gained access to its "Project WEB" platform, a collaboration and project management software used for Japanese-based projects.

"Fujitsu is currently conducting a thorough review of this incident, and we are in close consultation with the Japanese authorities," said the spokesperson. "As a precautionary measure, we have suspended use of this tool, and we have informed any potentially impacted customers."

The Ministry of Land, Infrastructure, Transport, and Tourism said a third party illegally accessed Fujitsu's software which resulted in the ministry suffering a data breach. At least 76,000 email addresses were exposed, including those belonging to individuals outside of the ministry that were registered on its mailing list. The ministry also confirmed that the ProjectWEB software has been taken down.

The stolen information is said to relate to its equipment systems, staff business email addresses, and information on its business relationships.

Related Resource

Cost of a data breach report 2020

Find out what factors help mitigate breach costs

cost of a data breach report 2020 - whitepaper from IBMDownload now

Japan's National Cyber Security Centre was also affected by the leak, which said that measures were being taken to prevent the spread of the damage. Local media has also reported that hackers accessed software at Narita Airport and stole data held by air traffic control systems, as reported by NHK.

Chief Cabinet Secretary Kato Katsunobu said on Wednesday that no damage to the Cabinet's cyber security centre's system had been confirmed.

He added that cyber security must be tightened, as hackers could target the Tokyo Olympics and Paralympics, which are scheduled to take place in two months time.

Featured Resources

Consumer choice and the payment experience

A software provider's guide to getting, growing, and keeping customers

Download now

Prevent fraud and phishing attacks with DMARC

How to use domain-based message authentication, reporting, and conformance for email security

Download now

Business in the new economy landscape

How we coped with 2020 and looking ahead to a brighter 2021

Download now

How to increase cyber resilience within your organisation

Cyber resilience for dummies

Download now

Recommended

ProtectedBy.AI’s CodeLock blocks malware at source code level
software as a service (SaaS)

ProtectedBy.AI’s CodeLock blocks malware at source code level

9 Jun 2021
Nigerian cyber criminals target Texas unemployment system
cyber security

Nigerian cyber criminals target Texas unemployment system

27 May 2021
CISOs aren’t leading by example when it comes to cyber security
cyber security

CISOs aren’t leading by example when it comes to cyber security

24 May 2021
Hackers use open source Microsoft dev platform to deliver trojans
Security

Hackers use open source Microsoft dev platform to deliver trojans

14 May 2021

Most Popular

Best paying tech jobs of 2021
Careers & training

Best paying tech jobs of 2021

7 Jun 2021
Ten-year-old iOS 4 recreated as an iPhone app
iOS

Ten-year-old iOS 4 recreated as an iPhone app

10 Jun 2021
Mythic launches power-sipping AI chip
Hardware

Mythic launches power-sipping AI chip

8 Jun 2021