{"id":20524,"date":"2024-03-19T17:29:47","date_gmt":"2024-03-19T17:29:47","guid":{"rendered":"https:\/\/gridinsoft.com\/blogs\/?p=20524"},"modified":"2024-03-19T17:29:47","modified_gmt":"2024-03-19T17:29:47","slug":"fujitsu-hacked-data-leak","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/fujitsu-hacked-data-leak\/","title":{"rendered":"Fujitsu Hacked, Warns of Data Leak Possibility"},"content":{"rendered":"<p>Fujitsu, one of the world&#8217;s leading IT companies, <strong>reports uncovering the hack<\/strong> in their internal network. The company discovered malware in its IT systems, which led to a massive data breach.<\/p>\n<h2>Fujitsu Hacked, Company Publishes Report<\/h2>\n<p>The <a href=\"https:\/\/pr.fujitsu.com\/jp\/news\/2024\/03\/15-1.html\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">first to discover Fujitsu hack<\/a> was the company\u2019s IT specialists who were performing the scanning. The first signs of compromised systems <strong>were noticed earlier in March 2023<\/strong>, which immediately raised concerns among the technical team. The company&#8217;s management was immediately notified of the possible threat, leading to an extensive internal investigation.<\/p>\n<figure id=\"attachment_20526\" aria-describedby=\"caption-attachment-20526\" style=\"width: 750px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/03\/Fujitsu-report-1024x576.webp\" alt=\"Fujitsu hack\" width=\"750\" height=\"422\" class=\"size-large wp-image-20526\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/03\/Fujitsu-report-1024x576.webp 1024w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/03\/Fujitsu-report-300x169.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/03\/Fujitsu-report-768x432.webp 768w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/03\/Fujitsu-report.webp 1280w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><figcaption id=\"caption-attachment-20526\" class=\"wp-caption-text\">Fujitsu report on official web site (translated from Japanese)<\/figcaption><\/figure>\n<p><strong>The said investigation is still ongoing<\/strong>, and is now targeted at determining the amount and types of leaked data. The company says it has not received any reports <a href=\"https:\/\/gridinsoft.com\/blogs\/personal-data-sensitive-data\/\">of personal information being misused<\/a> as a result of the hack. However, the <strong>attack could have affected important databases<\/strong> containing customers&#8217; personal data, including names, addresses, contact information and details of contractual relationships.<\/p>\n<p>Initial steps taken by Fujitsu <strong>included isolating the infected systems<\/strong> to prevent the malware from spreading further. The company also engaged external cybersecurity experts to conduct a detailed analysis of the situation and determine the source of the attack.<\/p>\n<h2>Analysis of Malware<\/h2>\n<p>Preliminary analysis showed that the <strong>malware was specifically designed to steal sensitive information<\/strong>. Experts noted that it was not a \u201ccommon\u201d malware sample but a one crafted for this specific attack. The program acted selectively, <a href=\"https:\/\/gridinsoft.com\/blogs\/personal-data-sensitive-data\/\">targeting particularly sensitive data<\/a>, such as employees&#8217; personal data, financial information and details of internal company research.<\/p>\n<p>Most interestingly, <strong>the attack targeted specific systems and used sophisticated methods<\/strong> to bypass standard security measures. It is a common tactic for attackers to use custom malware builds for targeted attacks on corporate networks, but it is not usual to see them using a yet unseen sample.<\/p>\n<h2>Fujitsu Was Hacked Before<\/h2>\n<p>In June 2023, Fujitsu Cloud Technologies, a subsidiary of Fujitsu Limited, <strong>received a public reprimand from Japan&#8217;s Ministry<\/strong> of Internal Affairs and Communications. The ministry demanded that both Fujitsu Cloud Technologies and Fujitsu Limited take immediate action <strong>to implement security measures<\/strong> to safeguard communications privacy and enhance cybersecurity. Fujitsu Limited is set to merge with its subsidiary in the near future.<\/p>\n<p>In 2022, a breach affected Fujitsu Limited&#8217;s cloud-based internet service used by governments and large corporations. <strong>Attackers accessed the system and leaked sensitive information<\/strong>. Around the late 2022, the company uncovered the <a href=\"https:\/\/www.fujitsu.com\/jp\/services\/infrastructure\/network\/news\/2023\/0220.html\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">hack in one of their divisions<\/a>, FENICS Internet.<\/p>\n<p>This company was also implicated in the May 2021 supply chain attack. Its Fujitsu ProjectWEB project management suite was accessed by an unauthorized third party and the incident resulted in a data leak <strong>affecting several Japanese government agencies<\/strong>. The data was allegedly sold on the darknet. The company later discontinued the ProjectWEB portal\/tool.<\/p>\n<h2>What then?<\/h2>\n<p>Well, despite best efforts, even technologically advanced companies like Fujitsu are not immune to cyberattacks and <a href=\"https:\/\/gridinsoft.com\/data-breaches\">subsequent data breaches<\/a>.  Even with advanced defense systems, attackers are finding ways to bypass defenses, <strong>resulting in serious consequences<\/strong> for companies and their customers. Hopefully, the measures taken and lessons learned from this experience contribute to strengthening data protection.<\/p>\n<p style=\"padding-top:15px;padding-bottom:15px;\"><a href=\"\/download\/antimalware\" rel=\"nofollow\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"\/blogs\/wp-content\/uploads\/2022\/07\/env01.webp\" alt=\"Fujitsu Hacked, Warns of Data Leak Possibility\" width=\"798\" height=\"336\" class=\"aligncenter size-full\" title=\"\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Fujitsu, one of the world&#8217;s leading IT companies, reports uncovering the hack in their internal network. The company discovered malware in its IT systems, which led to a massive data breach. Fujitsu Hacked, Company Publishes Report The first to discover Fujitsu hack was the company\u2019s IT specialists who were performing the scanning. The first signs [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":20534,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[15],"tags":[60,697],"class_list":{"0":"post-20524","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security-news","8":"tag-cyberattack","9":"tag-data-breach"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/03\/GS_Blog_banner_Fujitsu-Hacked-Warns-of-Data-Leak-Possibility_1280x674.webp","author_info":{"display_name":"Stephanie Adlam","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/adlam\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/20524","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=20524"}],"version-history":[{"count":11,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/20524\/revisions"}],"predecessor-version":[{"id":20537,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/20524\/revisions\/20537"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/20534"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=20524"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=20524"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=20524"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}