Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Endpoint Security

Trend Micro OfficeScan Flaw Apparently Exploited in Mitsubishi Electric Hack

A cyberattack disclosed recently by Mitsubishi Electric, which resulted in hackers gaining access to the company’s network and stealing corporate data, likely involved exploitation of a vulnerability in Trend Micro’s OfficeScan product.

A cyberattack disclosed recently by Mitsubishi Electric, which resulted in hackers gaining access to the company’s network and stealing corporate data, likely involved exploitation of a vulnerability in Trend Micro’s OfficeScan product.

Discovered in June 2019 but disclosed only last week, the data breach impacted both employee and corporate data at the Japanese company, affecting over 8,000 people. Technical materials, sales materials, and other trade secrets were also stolen.

Mitsubishi Electric is a top contractor for Japan’s military and infrastructure, but the company said in its data breach notice that no infrastructure-related information was impacted in the hack.

At the time, the company also revealed that the hackers were able to compromise its systems through an unpatched vulnerability in an anti-virus program, but refrained from providing specific information about the affected product.

Recent reports from Japanese media, however, suggest that Trend Micro’s OfficeScan endpoint protection product might have been the culprit.

Moreover, they suggest that the hackers targeted CVE-2019-18187, an arbitrary file upload with directory traversal flaw in OfficeScan 11.0 SP1 and XG, which could be abused to achieve remote code execution (RCE).

Advertisement. Scroll to continue reading.

“The remote process execution is bound to a web service account, which depending on the web platform used may have restricted permissions. An attempted attack requires user authentication,” Trend Micro explained in an advisory last year.

At the time, the security company also revealed that the vulnerability was being actively targeted in the wild, but noted that an attack would require several specific conditions to be met.

“Exploiting these type of vulnerabilities generally require that an attacker has access (physical or remote) to a vulnerable machine,” Trend Micro said in October last year.

The security firm did not publish details on the attacks exploiting the vulnerability or on the companies that might have been affected.

SecurityWeek has reached out to Trend Micro via email to inquire about the Mitsubishi Electric incident. The security company declined to comment.

China-linked hacking group Tick is said to have been the threat actor behind this attack. The adversary has been observed targeting numerous organizations in Japan and South Korea over the past few years.

*updated with “no comment” from Trend Micro

Related: Hackers Steal Employee and Corporate Information From Mitsubishi Electric

Related: Don’t Fall Victim to IP Theft and Corporate Espionage

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Organizations are investing heavily in third-party risk management, but breaches, delays, and blind spots continue to persist. Join this live webinar as we examine the gap between how organizations think their third-party risk programs are performing and what’s actually happening in practice.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Tim Byrd has been appointed Chief Information Security Officer at First Citizens Bank.

IRONSCALES has named Steve McKenzie as Chief Operating Officer.

Silvio Pappalardo has joined AuthMind as Chief Revenue Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.