Connect with us

Hi, what are you looking for?


Endpoint Security

Trend Micro OfficeScan Flaw Apparently Exploited in Mitsubishi Electric Hack

A cyberattack disclosed recently by Mitsubishi Electric, which resulted in hackers gaining access to the company’s network and stealing corporate data, likely involved exploitation of a vulnerability in Trend Micro’s OfficeScan product.

A cyberattack disclosed recently by Mitsubishi Electric, which resulted in hackers gaining access to the company’s network and stealing corporate data, likely involved exploitation of a vulnerability in Trend Micro’s OfficeScan product.

Discovered in June 2019 but disclosed only last week, the data breach impacted both employee and corporate data at the Japanese company, affecting over 8,000 people. Technical materials, sales materials, and other trade secrets were also stolen.

Mitsubishi Electric is a top contractor for Japan’s military and infrastructure, but the company said in its data breach notice that no infrastructure-related information was impacted in the hack.

At the time, the company also revealed that the hackers were able to compromise its systems through an unpatched vulnerability in an anti-virus program, but refrained from providing specific information about the affected product.

Recent reports from Japanese media, however, suggest that Trend Micro’s OfficeScan endpoint protection product might have been the culprit.

Moreover, they suggest that the hackers targeted CVE-2019-18187, an arbitrary file upload with directory traversal flaw in OfficeScan 11.0 SP1 and XG, which could be abused to achieve remote code execution (RCE).

“The remote process execution is bound to a web service account, which depending on the web platform used may have restricted permissions. An attempted attack requires user authentication,” Trend Micro explained in an advisory last year.

Advertisement. Scroll to continue reading.

At the time, the security company also revealed that the vulnerability was being actively targeted in the wild, but noted that an attack would require several specific conditions to be met.

“Exploiting these type of vulnerabilities generally require that an attacker has access (physical or remote) to a vulnerable machine,” Trend Micro said in October last year.

The security firm did not publish details on the attacks exploiting the vulnerability or on the companies that might have been affected.

SecurityWeek has reached out to Trend Micro via email to inquire about the Mitsubishi Electric incident. The security company declined to comment.

China-linked hacking group Tick is said to have been the threat actor behind this attack. The adversary has been observed targeting numerous organizations in Japan and South Korea over the past few years.

*updated with “no comment” from Trend Micro

Related: Hackers Steal Employee and Corporate Information From Mitsubishi Electric

Related: Don’t Fall Victim to IP Theft and Corporate Espionage

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content


Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...


The latest Chrome update brings patches for eight vulnerabilities, including seven reported by external researchers.


Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.


Apple has released updates for macOS, iOS and Safari and they all include a WebKit patch for a zero-day vulnerability tracked as CVE-2023-23529.