A major Japanese Internet service provider says 4 million sets of members’ IDs and passwords have been stolen.
NTT Communications, the operator of provider service OCN, said on Wednesday that it found OCN’s servers were illegally accessed on Tuesday and malware was inserted to take IDs and passwords.
Its engineers deactivated the malicious program, but it suspects the IDs and passwords were already hacked.
NTT Communications officials say there is no immediate threat of using the IDs as the passwords are encrypted. But they are urging users to change their passwords.
On Thursday of last week a website in Japan, which offers various information on the Internet, was hacked. The owner of the site said more than 1.6 million member IDs could have been compromised.
Read the rest of the story: 4 mil. IDs stolen from major provider in Japan.
Japan this weekend hosted its first-ever, government-sanctioned hacking contest, inviting tech-savvy residents to help the country ward off future cyber attacks.
Until now, Japan has discouraged hacking competitions over concerns that such events would actually encourage cyber crime, Japan’s national broadcast station NHK reported today. But in recent months, Japan has faced a number of cyber attacks, including a January attack on the Japanese Ministry that resulted in the theft of 3,000 classified documents.
The hacks came after Japan purchased the Senkaku/Diaoyu islands, which China also claims to own, so the cyber attacks are believed to have originated in China, according to Voice of America. As a result, Japan is looking for some tech-savvy individuals to help it fight off the growing cyber threat.
Read the rest of the story: Amidst Cyber Attacks, Japan Hosts First Hackathon.
Japan’s Finance Ministry has uncovered evidence of a major Trojan cyber-attack on its computer systems that lay undetected for almost two years, according to local sources.
Ministry officials have admitted that the unspecified Trojan, which was not detected by the organisation’s security systems, was probably free to steal confidential data from January 2010 to November 2011, after which the attack suddenly stopped.
A total of 123 computers inside the Ministry were infected out of around 2,000 so far checked, sources stated, which prompted the organisation to change hard disks on the affected machines.
Read the rest of the story: Japan’s Finance Ministry uncovers major Trojan attack/a>.
Japan’s parliament has come under cyber attack again, apparently from the same emails linked to a China-based server that have already hit several lawmakers’ computers, an official said Wednesday.
Malicious emails were found on computers used in the upper chamber of the Japanese parliament, a government spokesman said.
"The upper house office has confirmed that seven suspicious emails, the same ones that were sent to the lower house, were found" in computers in the upper house, Deputy Chief Cabinet Secretary Isao Saito said.
Read the rest of the story: New cyber attack on Japan parliament.
Computers in Japan’s Parliament have been found to be infected with a virus, officials said on Tuesday, the latest in a series of mysterious cyberattacks that have raised concerns about the leakage of sensitive information.
Personal computers used by three members of the lower house, as well as possibly a computer server, were infected by the virus, the top government spokesman, Chief Cabinet Secretary Osamu Fujimura, told reporters. He did not give details, but local media reports said the virus apparently had been used to hack into computers sometime in the past three months. The reports said log-in information and e-mails may have been stolen.
Media reports said one of the three lawmakers opened an e-mail attachment that released the virus.
Read the rest of the story: Virus Infects Computers in Japan’s Parliament.
Japan’s defense chief said Tuesday that the country’s largest arms contractor has suffered a cyberattack, but that no sensitive information is known to have been lost.
Defense Minister Yasuo Ichikawa urged Mitsubishi Heavy Industry Ltd. to strengthen its data security systems.
"We are not aware of any important data having leaked to the outside," Ichikawa said.
The company makes ships, submarines, missile parts and other weapons for Japan’s military.
Read the rest of the story: Japan says no loss of key data in cyberattack.
Japans biggest defense contractor, Mitsubishi Heavy Industries Ltd, said on Monday hackers had gained access to its computers, with one newspaper saying its submarine, missile and nuclear power plant component factories had been the target.
The company said in a statement that some information could have been stolen in the first known cyber attack on Japans defense industry.
"Weve found out that some system information such as IP addresses have been leaked and thats creepy enough," said a Mitsubishi Heavy spokesman.
Read the rest of the story: Japans Defense Industry Hit By First Cyberattack.
The National Police Agency said today that more than 90 per cent of cyberattacks on its website carried out overnight on July 10 originated from Internet Protocol addresses in China. The findings came after the NPA determined that similar attacks on its website last September were mostly attributable to Chinese IP addresses. Access to the NPA website was temporarily interrupted on the night of July 10 through the early hours of the following day as the apparent number of users accessing the website surged to about 20 times the normal level, the NPA said, adding that no data was breached.
Read the rest of the story: Cyberattacks on Japan police originated in China.
China broadcasts footage of cyber attack on state television
The National Police Agency said Thursday it suspects eight computer servers in Japan were involved in a wave of attacks in July on government and commercial Web sites in South Korea and the U.S. and a North Korean connection is suspected.
Police found a program on the servers for issuing instructions to terminals outside of Japan to send large amounts of data.
The denial-of-service attack in July overloaded the Web servers of 35 government and private organizations in the two countries, including the South Korean presidential office.
However, it is not clear whether the Japanese servers originated the instructions to the terminals that sent the large amounts of data, the NPA said.
Tokyo and Seoul are trying to identify the servers.
Source: Kyodo News
Photo by midom