In 2011 Japan was targeted by several cyber attacks. Japan's biggest defense contractor Mitsubishi network was comprised, after that hackers stolen user-names & passwords from Japan Parliament & many more. Then earlier in 2012 Japanese technology firm named Fujitsu developed a virus named ‘seek and destroy’ virus for the Japanese government and hopes that it will identify and prevent and combat cyber attacks. But now it seems that heavy weight ‘seek and destroy’ does not able to stop cyber criminals.
Japanese space engineers have discovered a Trojan on an employee's computer and confirmed that hackers may have smuggled out login information to gain access to a cargo shuttle that carries food and equipment to the International Space Station (ISS). The compromised information may have included up to 1,000 email addresses, login details for the Japanese space agency's intranet, and NASA documents covering operation of the ISS and so on. The Japan Aerospace Exploration Agency (JAXA) has confirmed that sensitive data has been stolen from a staff computer. The agency said that a virus infection was detected on an employee's terminal on 6th January. The employee is involved with the H-II transfer vehicle that carries cargo to the International Space Station. The agency added that, apart from the email addresses stored on the computer, data related to the transfer vehicle and its schedule, as well as system login data, is potentially at risk because of the intrusion.
JAXA Press Release:-
On January 6, 2012, the Japan Aerospace Exploration Agency (JAXA) found that a computer terminal used by one of our employees was infected with a computer virus, and information stored in the computer as well as system information that is accessible by the employee have been leaking outside.
We are now confirming the leaked information and investigating the cause.
1. Possible leaked information
As the computer was used by an employee who is involved in the H-II Transfer Vehicle (HTV, a cargo transporter to the International Space Station,) the following information was potentially compromised.
We are now confirming the leaked information and investigating the cause.
1. Possible leaked information
As the computer was used by an employee who is involved in the H-II Transfer Vehicle (HTV, a cargo transporter to the International Space Station,) the following information was potentially compromised.
- Stored mail addresses
- Specification and operation information of the HTV
- System log-in information accessed from the computer
2. Currently confirmed background
On August 11, 2011, some anomaly was detected in the said computer, thus it was detached from the network for checking. As a result, on August 17, we found that the computer was infected with a virus. The virus was removed, but the computer has continuously been monitored and investigated since then because it was still unstable and displayed abnormalities. On January 6, 2012, we found a trace that a different virus had gathered information from the computer. In addition, it was also discovered that the computer sent out some information sometime between July 6 and August 11.
With the above backdrop, passwords for all accessible systems from the computer have been immediately changed in order to prevent any abuse of possibly leaked information, and we are currently investigating the scale of damage and the impact. Also, all other computer terminals are being checked for virus infections.
3. Further steps to take
We sincerely apologize over such trouble, and we will promptly address the following measures while strengthening our information security in order to prevent any recurrence, as we gravely regret this incident.
- Specify leaked information and investigate the cause.
- Take measures to prevent a recurrence according to the investigation.
- Call attention and caution the person if his or her personal information is found to have been leaked.
LINK TO OUR HOME PAGE :
Voice Of GREYHAT is a non-profit Organization propagating news specifically related with Cyber security threats, Hacking threads and issues from all over the spectrum. The news provided by us on this site is gathered from various Re-Sources. if any person have some FAQ's in their mind they can Contact Us. Also you can read our Privacy Policy for more info.
Thank You !
-Team VOGH
If you enjoyed VOGH News, Articles Then Do Make sure you to Subscribe Our RSS feed. Stay Tuned with VOGH and get Updated about Cyber Security News, Hacking Threads and Lots More. All our Articles and Updates will directly be sent to Your Inbox. Thank You!
-Team VOGH
Categories:
cyber-crime
,
ROT
,
security-news