goo blog サービス終了のお知らせ 

文明のターンテーブルThe Turntable of Civilization

日本の時間、世界の時間。
The time of Japan, the time of the world

The company believes it may have been involved in a Chinese-based cyber-attack group called Tick

2020年01月20日 12時29分43秒 | 全般

The following is today's article found on the net (Yahoo News).
Mitsubishi Electric, a major general electronics maker, has been hit by a large-scale cyberattack, and it has been found that information about public and private business partners such as highly confidential defense-related and crucial social infrastructure such as electric power and a railroad may leak out.
An internal investigation found that computers and servers at headquarters and significant sites were subject to numerous unauthorized accesses.
The company believes it may have been involved in a Chinese-based cyber-attack group called Tick, which mainly targets defense-related confidential information because of unauthorized access.
According to multiple stakeholders and in-house investigations, there were signs that at least more than 120 PCs and more than 40 servers in Japan and overseas were illegally invaded. The consequences of unauthorized access are company-wide.
In addition to its own information, at least dozens of companies including the Ministry of Defense, the Ministry of the Environment, the Cabinet Office, the Nuclear Regulatory Commission, the Agency for Natural Resources and Energy, and more than ten public and government agencies, electric power, telecommunications, JR / private railways, and automobiles. Various information on domestic and foreign private companies has been compromised.
Some of them may have leaked out.
Includes information on joint development and business negotiations with business partners, product orders, meeting materials in which company executives participate, and information shared within the research institute. Information on the performance of defense technology and critical social infrastructure may have been leaked.
In June of last year, a suspicious file was found on a server at a domestic research institute. When this was used as a basis for an in-house investigation, Unauthorized access was confirmed in most of the 14 business units and business units, including the Sales and Electronic Systems Business Units, and some of the administrative departments at the head office.
Unauthorized access began with affiliates in China and spread to bases in Japan.
The hijacked account was used to gain infiltration into the company's internal network and continued to gain unauthorized access to computers in the middle management, who had a wide range of access to sensitive information. The information is collected at the transmitting terminal and is considered to have been transmitted several times, and it is highly likely that the information has leaked outside.


最新の画像もっと見る