A long-term breach of Japan's national cyber security agency may be the work of state-backed Chinese hackers. The security breach occurred in October 2022 and was disclosed in August of this year.
Official sources say that Chinese hackers combed Japan's military networks over an extended period between 2020 and 2021 in search of military plans, documentation of capabilities, and assessments of vulnerabilities.
A third-party data breach involving a U.S. contractor exposed the personal information of over 2 million Aflac cancer and Zurich automobile insurance policyholders in Japan.
Russian hackers affiliated with the Killnet group executed a DDoS cyber attack that rendered 20 Japanese government websites inaccessible, including a tax and an e-Government portal.
Pandora cybercrime gang took responsibility for the ransomware attack on automotive supplier Denso and threatened to leak 1.4 terabytes of stolen data. Attack occurred hot on the heels of another compromise on Bridgestone.
Cyber attack on Toyota's electronics and plastic parts supplier Kojima Industries shut down 28 production lines across 14 plants in Japan, exposing production supply chain vulnerabilities.
A Japanese government official disclosed a data leak that exposed Olympics ticket buyers' account credentials but the Olympics organizers denied being the source of the breach.
Cyber attack on Japan’s government agencies leaked 76,000 email addresses, and proprietary, business, and air traffic and control data, forcing Fujitsu to disable ProjectWEB.
Two major Japanese defense contractors recently admitted to data breaches back in 2015 and 2018 when they were infected with malware and possibly had their files stolen.
A warning has been issued for an expected state-sponsored cyber attack on Tokyo 2020 Games after uncovering some phishing emails made up to look as if they are coming from Olympic staff.