Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

1/21/2020
12:00 AM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

China-Based Cyber Espionage Group Reportedly Behind Breach at Mitsubishi Electric

Personal data on over 8,100 individuals and confidential business information likely exposed in June 2019 incident.

A data breach at Japan's Mitsubishi Electric that may have exposed some 200 MB of personal and confidential business data is the latest reminder of the growing threat many organizations face from sophisticated cyber espionage groups.

Mitsubishi on Monday admitted it had experienced a data breach last June after at least two Japanese newspapers reported on the incident this week. In an emailed statement to Dark Reading, the company said it detected the incident on June 28, 2019, and took immediate measures to limit damage.

"Mitsubishi Electric acknowledges the possibility of personal and confidential information leakages due to unauthorized access to the company's cyber networks," the statement said.

The company, whose customers include major government, defense, and private-sector organizations, did not offer any details on the kinds of information that might have been compromised or how extensive the damage might have been. But it said that no sensitive information belonging to critical infrastructure organizations in the defense, power, electric, and railway sectors were leaked.

The Asahi Shimbun, one of the first to report on the breach, on Tuesday said data belonging to 8,122 individuals might have been exposed since last June. The potentially leaked information included names and other personal data belonging to over 4,560 employees at the company's headquarters, as well as nearly 2,000 new graduates who joined the company between 2017 and April 2019, and several mid-career employees and retirees.

In addition, the intruders appear to have had access to data on more than 10 government customers of Mitsubishi Electric and dozens of other businesses, including those in critical infrastructure sectors, Asahi Shimbun said, citing officials it said were close to the investigation. The data that was exposed included that pertaining to business negotiations, joint development activity, product orders, and company meeting materials.

According to the newspaper, while Mitsubishi Electric informed Japan's Defense Ministry about the attack last August, many of the company's partners in the private sector, including leading electric utilities, railway operators, and financial companies, were kept in the dark until this week.

"The company appears to be contacting only business partners whose information might have been significantly compromised, but it is still not giving the entire picture of the breach," the paper said.

Earlier, Asahi Shimbun and Nikkei both cited unnamed company officials as saying scores of servers and PCs across Mitsubishi Electric's office in Japan and China had been compromised in the attack. Both newspapers identified the group behind the attack as "Tick', a China-based outfit that some security vendors also have referred to as Bronze Butler and REDBALDKNIGHT.

Hijacked Account
The attack is thought to have begun with the misuse of a single compromised user account belonging to a Mitsubishi Electric affiliate in China. The hijacked account was used to infiltrate systems at most of Mitsubishi Electric's major facilities, including its sales headquarters, its electronic systems business headquarters, and its head office, Asahi Shimbun said.

Researchers at Trend Micro and Secureworks have previously described Tick/Bronze Butler/REDBALDKNIGHT as a China-based cyber espionage group with a special focus on Japanese targets.

According to Secureworks, the group has long been focused on stealing intellectual property and other confidential business data from Japanese organizations, especially those in critical infrastructure sectors. Like many groups, Tick employs spear-phishing and strategic Web compromises to gain an initial foothold on a target network.

Trend Micro has said it discovered evidence of Tick targeting South Korean, Russian, and Singaporean organizations in addition to Japanese-based firms. The security vendor has described Tick operators as using steganography and other techniques to deploy and embed its malware on target systems.

Ben Goodman, senior vice president at ForgeRock, says attacks involving the abuse of legitimate user accounts highlight the need for a zero-trust approach to security. "A zero-trust approach means that organizations no longer treat people, devices, and services communicating on the corporate network as if they are good actors deserving of greater trust," he says.

Instead, all access requests are authenticated and authorized as if they are from an unknown user from an untrusted network. "By looking closer at what access users have and how they are using that access, we can better understand where some may have more access than they require," Goodman says.

Forcing users to authenticate and authorize to all of their applications and services also can enable a better understanding of normal user activity and detection of potentially abnormal behavior, he says.

Related Content:

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "With International Tensions Flaring, Cyber Risk is Heating Up for All Businesses."

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-8144
PUBLISHED: 2020-04-01
The UniFi Video Server v3.9.3 and prior (for Windows 7/8/10 x64) web interface Firmware Update functionality, under certain circumstances, does not validate firmware download destinations to ensure they are within the intended destination directory tree. It accepts a request with a URL to firmware u...
CVE-2020-8145
PUBLISHED: 2020-04-01
The UniFi Video Server (Windows) web interface configuration restore functionality at the “backup� and “wizard� endpoints does not implement sufficient privilege checks. Low privileged users, belonging to the PUBLIC_GROUP ...
CVE-2020-8146
PUBLISHED: 2020-04-01
In UniFi Video v3.10.1 (for Windows 7/8/10 x64) there is a Local Privileges Escalation to SYSTEM from arbitrary file deletion and DLL hijack vulnerabilities. The issue was fixed by adjusting the .tsExport folder when the controller is running on Windows and adjusting the SafeDllSearchMode in the win...
CVE-2020-6009
PUBLISHED: 2020-04-01
LearnDash Wordpress plugin version below 3.1.6 is vulnerable to Unauthenticated SQL Injection.
CVE-2020-6096
PUBLISHED: 2020-04-01
An exploitable signed comparison vulnerability exists in the ARMv7 memcpy() implementation of GNU glibc 2.30.9000. Calling memcpy() (on ARMv7 targets that utilize the GNU glibc implementation) with a negative value for the 'num' parameter results in a signed comparison vulnerability. If an attacker ...