Sources claim Mitsubishi Heavy attack was serious breach Attackers did after all steal plans for fighter jets and nuclear power plant safety systems during August’s hack of Japanese defence contractor Mitsubish Heavy, sources in the country have claimed.The unsourced revelation in the Japanese press adds more detail to what has always looked like a serious attack on several companies the gravity of which the authorities have always attempted to play down.Suspicions of a targeted attack sounded alarm bells when Mitsubishi admitted in September that password-stealing Trojan and other malware had been used to infect 83 PCs and servers at the company across 11 facilities in the country.After saying it believed that this incursion caused on serious data loss, unidentified sources have now told Japanese newspapers that a forensic investigation of additional PCs has revealed significant data loss. It was later reported that an intermediary for the attack apperared to be a compromised PC inside the Society of Japanese Aerospace Companies (SJAC).There was now “firm evidence” that secret data relating to a range of defence equipment including fighter jets and helicopters and nuclear power stations had been transmitted to points outside the company, a potential calamitous breach of data security. Concern will now turn to other companies in the defence sector believed to have been part of the same attack, including Kawasaki Heavy, in what is fast becoming Japan’s most serious ever high-level security breach.Suspicions will centre on China, which is also now being connected to a separate cyberattack in which the passwords for politicians in the country’s Lower House legislature were stolen.“A response to cyber-attacks is an important challenge in terms of national security and crisis management. We want to take all possible measures,” Japanese chief cabinet secretary Osamu Fujimura reportedly told local journalists in a news conference after hearing of the attack on the country’s politicians. Related content brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security news Gitlab fixes bug that exploited internal policies to trigger hostile pipelines It was possible for an attacker to run pipelines as an arbitrary user via scheduled security scan policies. By Shweta Sharma Sep 21, 2023 3 mins Vulnerabilities Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe