Experts Reaction On Japan Investigates Potential Leak of Prototype Missile Data in Mitsubishi Hack

By   muhammad malik
Chief Editor , Information Security Buzz | May 22, 2020 12:12 am PST

Japan has launched an investigation into the potential exposure of confidential missile data in the wake of a cyberattack on Mitsubishi Electric Corp. According to the Associated Press, the leak of information relating to a prototype, “cutting-edge” missile is suspected. The missile, a speed glider known as HGV, was documented in files Mitsubishi and other manufacturers held as part of a bidding process. It has been reported by local news outlets that Mitsubishi did not win the bid.

Notify of
2 Expert Comments
Oldest Most Voted
Inline Feedbacks
View all comments
Chris Hauk
Chris Hauk , Consumer Privacy Champion
May 22, 2020 8:16 am

Zero-day vulnerability attacks like this one continue to be a popular attack vector for hackers. This underscores the need for users to keep all of their security-related software updated to prevent such attacks. It also highlights the rise in attacks like this by bad actors working for foreign governments, requiring increased vigilance by government contractors and companies in other sensitive industries.

Last edited 3 years ago by Chris Hauk
James McQuiggan
James McQuiggan , Security Awareness Advocate
May 22, 2020 8:14 am

The last thing an organisation wants to do is admit they were the subject of a data breach where intellectual property is exfiltrated from the network. In this case, the criminal attackers used a zero-day exploit to gain access to the systems and infrastructure.

With this type of attack, it\’s apparent that the criminals were looking for data and wanted to be quiet about it. Whether it\’s a coincidence that they did not win the bid is interesting, as the data theft could have been an espionage attack from a competitor or nation-state looking to gain an advantage.

Nevertheless, even with a large organisation with a robust cybersecurity program, there needs to be constant monitoring of endpoints, servers, and networks to analyse for attacks.

Last edited 3 years ago by James McQuiggan

Recent Posts

Would love your thoughts, please comment.x