Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Security Infrastructure

Japan’s Largest Defense Contractor Hit by Cyber Attack

Mitsubishi Heavy Industries Ltd, Japan’s largest defense contractor, has been a victim of a cyber attack, according to a report from the company. The company said attackers had gained access to company computer systems, with some reports saying the attacks targeted its submarine, missile and nuclear power plant component businesses.

Mitsubishi Heavy Industries Hacked

Mitsubishi Heavy Industries Ltd, Japan’s largest defense contractor, has been a victim of a cyber attack, according to a report from the company. The company said attackers had gained access to company computer systems, with some reports saying the attacks targeted its submarine, missile and nuclear power plant component businesses.

Mitsubishi Heavy Industries Hacked

“We can’t rule out small possibilities of further information leakage but so far crucial data about our products or technologies have been kept safe,” a Mitsubishi Heavy spokesman told Reuters. “We’ve found out that some system information such as IP addresses have been leaked and that’s creepy enough,” the spokesman added.

According to The Yomiuri newspaper, approximately 80 systems had been infected with malware at the company’s headquarters in Tokyo, as well as manufacturing and research and development sites, including Kobe Shipyard & Machinery Works, Nagasaki Shipyard & Machinery Works and Nagoya Guidance & Propulsion System Works. A company spokesperson told SecurityWeek that 45 servers and 38 PCs in MHI’s production plants and offices (more than 10) were infected.

The company reportedly first noticed the cyber attack on August 11th.

“It’s probably just the first that hacking attacks in Japan have been detected. It’s consistent with what we’ve seen already with big American defense companies,” Andrew Davies, a cyber-warfare analyst with the government backed defense think-tank, the Australian Strategic Policy Institute, told Reuters.

The company manufactures many weapons systems and aircraft including Patriot missiles, under license from Raytheon, F-15J Fighter Jets, under license from Boeing, and several other guided weapons systems.

While some have speculated that China may behind the attacks, the company told SecurityWeek that, at present, they have no clues as to who was behind the attacks. The company is expected to release additional information and an updated statement following further investigation.

Related Reading:

Lockheed Martin Acknowledges “Tenacious” Cyber Attack

Three Lessons from the RSA Hack, from a Customer’s Perspective

Foreign Cyber Attack Hits Canadian Government

Guerilla Cyber Warfare: Are We Thinking Defensively?

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.

Register

Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.

Register

Expert Insights

Related Content

Security Infrastructure

Comcast jumps into the enterprise cybersecurity business, betting that its internal security tools and inventions can find traction in an expanding marketplace.

Funding/M&A

Identity and access governance vendor Saviynt has closed a $205 million financing round.

Security Infrastructure

XDR's fully loaded value to threat detection, investigation and response will only be realized when it is viewed as an architecture

ICS/OT

Security orchestration, automation and response (SOAR) provider Swimlane on Monday announced the launch of a security automation solution ecosystem for operational technology (OT) environments.

Incident Response

Created and maintained by MITRE, MITRE D3FEND is a framework that provides a library of defensive cybersecurity countermeasures and technical components to help organizations...

Cloud Security

The term ‘zero trust’ is now used so much and so widely that it has almost lost its meaning.