Security News

Toyota says filled disk storage halted Japan-based factories
2023-09-06 13:47

Toyota says a recent disruption of operations in Japan-based production plants was caused by its database servers running out of storage space. On August 29th, it was reported that Toyota had to halt operations on 12 of its 14 Japan-based car assembly plants due to an undefined system malfunction.

Toyota Japan back on the road after probably-not-cyber attack halted production
2023-08-30 03:58

Malfunction took 14 plants offline for 36 hours. Oh, what a … nah, too obvious Toyota Japan has recovered from what it's described as a "malfunction in the production order system" that halted...

Japan's digital minister surrenders salary to say sorry for data leaks
2023-08-17 04:58

Japan's digital minister has doubled down on a June promise to penalize himself for the poor rollout of the country's digital ID, My Number Card, by offering up three months salary on Tuesday. The interim report reportedly revealed a lack of knowledge among the public on how to link their My Number Card to disability records, cases of health insurance being connected to the wrong card, and errors in pension records of public servants.

China Hacked Japan’s Military Networks
2023-08-14 11:02

The NSA discovered the intrusion in 2020-we don't know how-and alerted the Japanese. The hackers had deep, persistent access and appeared to be after anything they could get their hands on-plans, capabilities, assessments of military shortcomings, according to three former senior U.S. officials, who were among a dozen current and former U.S. and Japanese officials interviewed, who spoke on the condition of anonymity because of the matter's sensitivity.

LockBit louts unload ransomware at Japan’s most prolific cargo port
2023-07-06 03:13

The port of Nagoya - which shifted 2.68 million shipping containers and 164 million tons of cargo in 2022 - has moved precious few in the last 24 hours after finding itself the latest victim of Russia's notorious LockBit ransomware gang. Japanese media have reported substantial disruptions at the port and named LockBit as the culprit.

Japan’s largest port stops operations after ransomware attack
2023-07-05 10:00

The Port of Nagoya, the largest and busiest port in Japan, has been targeted in a ransomware attack that currently impacts the operation of container terminals.Today, the administrative authority of the Port of Nagoya has issued a notice about a malfunction in the "Nagoya Port Unified Terminal System" - the central system controlling all container terminals in the port.

Japan rebukes Fujitsu for cloud security fails
2023-07-03 01:35

Asia In Brief Japan's government last Friday rebuked Fujitsu for shabby cloud security. Fujitsu operates a cloud called "FENICS" and in February 2023 admitted that in December 2022 it had detected network misconfigurations that allowed unauthorized remote access to the service.

Fujitsu admits it fluffed the fix for Japan’s flaky ID card scheme
2023-06-30 01:47

Fujitsu Japan is in the spotlight again for all the wrong reasons, after fumbling its attempt to fix the nation's troubled ID card scheme. One use of the cards is to arrange for administrative documents to be printed at convenience stores or government offices.

Japan's digital ID card gets emergency review amid data leaks
2023-06-22 04:45

Japanese prime minister Fumio Kishida has ordered an emergency review of the nation's ID Cards, amid revelations of glitches and data leaks that threaten the government's digital services push. Japanese media reports that people with similar names are receiving cards intended for other people, while some recipients found the card links to records describing someone else.

New GobRAT Remote Access Trojan Targeting Linux Routers in Japan
2023-05-29 09:50

Linux routers in Japan are the target of a new Golang remote access trojan called GobRAT. "Initially, the attacker targets a router whose WEBUI is open to the public, executes scripts possibly by using vulnerabilities, and finally infects the GobRAT," the JPCERT Coordination Center said in a report published today. The compromise of an internet-exposed router is followed by the deployment of a loader script that acts as a conduit for delivering GobRAT, which, when launched, masquerades as the Apache daemon process to evade detection.