Japanese government data stolen in Fujitsu hack
Hackers gained access to the data through Fujitsu's project management software


Hackers have gained access to Fujitsu's project management platform resulting in data leaks from various Japanese government offices, according to reports.
A spokesperson for Fujitsu confirmed to IT Pro that an unauthorised third-party gained access to its "Project WEB" platform, a collaboration and project management software used for Japanese-based projects.
"Fujitsu is currently conducting a thorough review of this incident, and we are in close consultation with the Japanese authorities," said the spokesperson. "As a precautionary measure, we have suspended use of this tool, and we have informed any potentially impacted customers."
The Ministry of Land, Infrastructure, Transport, and Tourism said a third party illegally accessed Fujitsu's software which resulted in the ministry suffering a data breach. At least 76,000 email addresses were exposed, including those belonging to individuals outside of the ministry that were registered on its mailing list. The ministry also confirmed that the ProjectWEB software has been taken down.
The stolen information is said to relate to its equipment systems, staff business email addresses, and information on its business relationships.
Japan's National Cyber Security Centre was also affected by the leak, which said that measures were being taken to prevent the spread of the damage. Local media has also reported that hackers accessed software at Narita Airport and stole data held by air traffic control systems, as reported by NHK.
Chief Cabinet Secretary Kato Katsunobu said on Wednesday that no damage to the Cabinet's cyber security centre's system had been confirmed.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
He added that cyber security must be tightened, as hackers could target the Tokyo Olympics and Paralympics, which are scheduled to take place in two months time.
Zach Marzouk is a former ITPro, CloudPro, and ChannelPro staff writer, covering topics like security, privacy, worker rights, and startups, primarily in the Asia Pacific and the US regions. Zach joined ITPro in 2017 where he was introduced to the world of B2B technology as a junior staff writer, before he returned to Argentina in 2018, working in communications and as a copywriter. In 2021, he made his way back to ITPro as a staff writer during the pandemic, before joining the world of freelance in 2022.
-
Why are many men in tech blind to the gender divide?
In-depth From bias to better recognition, male allies in tech must challenge the status quo to advance gender equality
By Keri Allan
-
BenQ PD3226G monitor review
Reviews This 32-inch monitor aims to provide the best of all possible worlds – 4K resolution, 144Hz refresh rate and pro-class color accuracy – and it mostly succeeds
By Sasha Muller
-
A strategic approach to security: Intelligent, collaborative, and efficient
whitepaper How your security fabric can address the challenges of new tech investment
By ITPro
-
Anticipate, prevent, and minimize the impact of business disruptions
Whitepaper Nine best practices for building operational resilience
By ITPro
-
Thwart cyberthreats fast with security operations + AI Ops
Whitepaper How automated collaboration saves the day
By ITPro
-
Three steps to transforming security operations
Whitepaper How to be more agile, effective, collaborative, and scalable
By ITPro
-
Top ten ways to anticipate, eliminate, and defeat cyber threats like a boss
Whitepaper Improve your cyber resilience and vulnerability management while speeding up response times
By ITPro
-
Automation antidotes for the top poisons in cyber security management
Whitepaper How orchestration and collaboration tools can provide a healthy defense against the most serious threats
By ITPro
-
A prudent approach to major security incidents
Whitepaper Establish an effective strategy across four phases
By ITPro
-
Cybercriminals are resilient. How about you?
Whitepaper Stay ahead of those agile bad actors
By ITPro