Japan

February 28, 2022: Kojima Industries, a Toyota Supplier, Suffers Cyberattack

Toyota will shut down production in Japan Tuesday because one of its domestic suppliers suffered a cyberattack, company officials said Monday.
Kojima Industries is the supplier hit in the attack and it provides plastic and other parts to Toyota.
The company will suspend 28 lines at 14 plants. Toyota subsidiaries Hino Motors and Daihatsu Motor will also halt operations at some plants in Japan on Tuesday. The automakers are still determining whether they will be able to return to normal operations after Wednesday.

November 11, 2021: Panasonic Breached in Attack

Osaka, Japan-based Panasonic Corporation confirmed its network was illegally accessed by a third party on November 11 and data ended up accessed in the breach, officials said.
As soon as the electronics giant discovered the breach, it initiated an internal investigation and discovered some data on a file server had been accessed during the intrusion. Panasonic spokesperson Dannea DeLisser said the breach began on June 22 and ended on November 3 — and the unauthorized access was first detected on November 11.

June 1, 2021: Fujifilm Now Operating after Ransomware Attack

Japan’s major film provider, Fujifilm, finally restored operations this week following a ransomware attack earlier this month.
On June 4, Fujifilm said it fell victim to a ransomware attack on June 1 which forced the company to shut down its network and servers across the globe. While most regions were able to get back up and running fairly quickly, Japan suffered the biggest impact.

February 15, 2021: Turbomachinery manufacturer attacked with ransomware

On February 15, 2021, a defect was detected in internal system of the Elliott head office and confirmed an attack by ransomware on the mail system and certain servers. As the damage from the ransomware attack, some problems were confirmed in production or ordering systems at Elliott plants. Upon detection, Ebara Corporation, the Group’s Headquarters in Japan, and the Elliott Group in the United States immediately undertook a robust forensic investigation to determine the extent of the defect, its impact and potential consequences.
As of this writing, Nefilim Ransomware group has posted teaser files, one 6GB and 1 549KB in size as proof of data breach.

January 1, 2005: Errant AntiVirus Definition Brings Down Railway LANs

WIZARD SPIDER is a sophisticated eCrime group that has been operating the Ryuk ransomware since August 2018, targeting large organizations for a high-ransom return. This methodology, known as “big game hunting,” signals a shift in operations for WIZARD SPIDER. This actor is a Russia-based criminal group known for the operation of the TrickBot banking malware that had focused primarily on wire fraud in the past.

January 1, 2003: Computer Error Grounds Japanese Flights

WIZARD SPIDER is a sophisticated eCrime group that has been operating the Ryuk ransomware since August 2018, targeting large organizations for a high-ransom return. This methodology, known as “big game hunting,” signals a shift in operations for WIZARD SPIDER. This actor is a Russia-based criminal group known for the operation of the TrickBot banking malware that had focused primarily on wire fraud in the past.

January 1, 2006: Power Plant Security Information Leaked Onto Internet

WIZARD SPIDER is a sophisticated eCrime group that has been operating the Ryuk ransomware since August 2018, targeting large organizations for a high-ransom return. This methodology, known as “big game hunting,” signals a shift in operations for WIZARD SPIDER. This actor is a Russia-based criminal group known for the operation of the TrickBot banking malware that had focused primarily on wire fraud in the past.

January 1, 2005: Japanese Nuclear Company Virus Attack

WIZARD SPIDER is a sophisticated eCrime group that has been operating the Ryuk ransomware since August 2018, targeting large organizations for a high-ransom return. This methodology, known as “big game hunting,” signals a shift in operations for WIZARD SPIDER. This actor is a Russia-based criminal group known for the operation of the TrickBot banking malware that had focused primarily on wire fraud in the past.

January 1, 2008: Car Manufacturer Infected with Computer Virus

WIZARD SPIDER is a sophisticated eCrime group that has been operating the Ryuk ransomware since August 2018, targeting large organizations for a high-ransom return. This methodology, known as “big game hunting,” signals a shift in operations for WIZARD SPIDER. This actor is a Russia-based criminal group known for the operation of the TrickBot banking malware that had focused primarily on wire fraud in the past.

January 1, 2018: Winnti attack on Shin-Etsu

Consequences not disclosed. ARD, a public broadcaster reported that company had been attacked by a group associated with Chinese government with malware which allows attackers to access victims network remotely.

Pin It on Pinterest

Scroll to Top