Japanese Firm NEC Electronics Confirm Security Breach

Lately, we heard of the Mitsubishi data breach. Now, here is another Japanese firm making it to the news for a similar reason. As revealed, the electronics giant NEC, closely collaborating with Japanese Defense, has suffered a security breach.

NEC Suffered Security Breach

Reportedly, the Japanese electronics giant that also closely works with Japan Defense has suffered a security breach. The incident happened some time ago when some unauthorized entities accessed their network. However, the attack went unnoticed for a while.

Disclosing the breach in a security notice, NEC disclosed that the firm’s defense business units faced some unauthorized intrusion.

NEC has confirmed that some of the internal servers used by the Company’s defense business unit have been subject to unauthorized access by third parties.

Elaborating on the details, the notice reveals that the attack initially happened in December 2016. However, it went unnoticed and the team could only detect the intrusion in July 2017.

In June 2017, as a result of checking for the occurrence of communication patterns described in the security company’s threat report, it was confirmed that unauthorized communication was being performed from internal PCs.

According to NEC, the attackers may have accessed around 28,000 (precisely, 27,445) files during this incident.

No Sensitive Information Breached

Despite gaining access to thousands of stored files, NEC assures that the incident did not leak any confidential or personal information. This disclosure holds significance owing to the NEC’s active contribution to the Japanese defense industry.

In addition, the Japan Ministry of Defense has also confirmed the safety of defense-related information, according to Nikkei.

information on contracts with NEC, not defense secrets, and there is no impact on Japan’s defense system.

NEC have also pledged to jazz-up their security to fend-off any cyber attacks in the future.

we will strengthen further countermeasures such as attack response systems, management of important information, and strengthen early detection and response, and respond to more advanced attacks. By doing so, we will work to prevent a recurrence.

Let us know your thoughts in the comments.

Reference: Source link

Sr. SDET M Mehedi Zaman

Currently working as Sr. SDET at Robi Axiata Limited, a subsidiary of Axiata Group. As a Senior SDET: - Played a key role in introducing Agile Scrum methodology and implementing CI/CD pipeline to ensure quality & timely delivery. - Trained colleagues on emerging technologies, e.g. Apache Spark, Big Data, Hadoop, Internet of Things, Cloud Computing, AR, Video Streaming Services Technology, Blockchain, Data Science- Developed a test automation framework for Android and iOS apps - Developed an e2e web automation framework with Pytest - Performed penetration testing of enterprise solutions to ensure security and high availability using Kali, Burp Suite etc. - Learned Gauntlet security testing automation framework and shared the lesson learned in a knowledge sharing session

Leave a Reply

Your email address will not be published. Required fields are marked *