Thursday, February 22, 2024

Casio Hacked: Customers’ Personal Details Exposed

Casio Computer Co., Ltd. has apologized for a data leak due to unauthorized server access. 

The server contained the personal information of customers who registered for its educational web service, “ClassPad[.]net.” The leak affected customers both in Japan and abroad.

The company expressed deep regret for the trouble and worry this incident caused its customers and stakeholders. 

The company admitted that it failed to prevent the breach, which was a serious violation of its security standards.

The breach was caused by an external cyber-attack that targeted a database in the development environment for “ClassPad[.]net.” 

The attackers were able to access and leak the personal information of some of Casio’s customers. However, no other assets besides this database were compromised.

Document
FREE Demo

Deploy Advanced AI-Powered Email Security Solution

Implementing AI-Powered Email security solutions “Trustifi” can secure your business from today’s most dangerous email threats, such as Email Tracking, Blocking, Modifying, Phishing, Account Take Over, Business Email Compromise, Malware & Ransomware

Background of the Incident

The breach was discovered on the night of Wednesday, October 11, when Casio’s development team noticed a database failure in the ClassPad.net environment. 

Upon further investigation, they found that on Thursday, October 12, customers’ personal information outside Japan had been accessed and leaked.

The investigation revealed that some network security settings in the development environment had been turned off due to an operational mistake by the company’s system management department. 

The lack of proper operational management and supervision was the main reason for the breach, which allowed an external entity to exploit these weaknesses.

Casio took immediate action to deal with the breach. All databases in the development environment affected by the attack have been made inaccessible from outside the environment. 

The incident has been reported to Japan’s Personal Information Protection Commission and JUAS, the “PrivacyMark” certification organization. 

Casio has consulted with external security experts to conduct further investigations and implement necessary measures. The company is also considering legal actions, including cooperation with law enforcement agencies. Moreover, 

Casio is working with the police in their ongoing investigation.

The data breach exposed the following personal information:

  1. Customer names
  2. Customer email addresses
  3. Country/region of residence
  4. Purchasing information (order details, payment method, license code, etc.)
  5. Service usage information (log data, nicknames, etc.)
  6. Credit card information was not stored.

The number of individuals affected by the breach was large:

  • Customers in Japan: 91,921 items, including 1,108 educational institution customers and individual customers.
  • Customers outside Japan: 35,049 items from 148 countries and regions.

Casio is contacting all customers whose personal information may have been leaked through email and other means. They have set up a dedicated contact point for inquiries from affected customers.

Service Availability

There was no unauthorized access to the “ClassPad.net” application itself. It is still available for use as normal.

Future measures

In its recent notice, Cisco mentioned that it plans to improve its technical safety management by strengthening its security for network routes and databases.

It will also review its operational procedures and enhance its employee education and training. 

And do their best to restore trust and prevent recurrence of such incidents

Protect yourself from vulnerabilities using Patch Manager Plus to patch over 850 third-party applications quickly. Take advantage of the free trial to ensure 100% security.

Website

Latest articles

Leak of China’s Hacking Documentation Stunned Researchers

In a startling revelation that has sent shockwaves through the cybersecurity community, a massive...

Apex Code Vulnerabilities Let Hackers Steal Salesforce Data

Hackers target Apex code vulnerabilities in Salesforce to exploit security weaknesses, gain unauthorized access...

Beware of New AsukaStealer Steal Browser Passwords & Desktop Screens

An updated version of the ObserverStealer known as AsukaStealer was observed to be advertised as...

US to Pay $15M for Info About Lockbit Ransomware Operator Data

In a significant move against cybercrime, the U.S. government has announced a bounty of...

Earth Preta Hackers Abuses Google Drive to Deploy DOPLUGS Malware

Threat actors abuse Google Drive for several malicious activities due to its widespread use,...

Swiggy Account Hacked, Hackers Placed Orders Worth Rs 97,000

In a startling incident underscoring the growing menace of cybercrime, a woman's Swiggy account...

Beware of VietCredCare Malware that Steals businesses’ Facebook Accounts

A new cybersecurity threat targeting Facebook advertisers in Vietnam, known as VietCredCare, has emerged....
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Live Account Takeover Attack Simulation

Live Account Take Over Attack

Live Webinar on How do hackers bypass 2FA ,Detecting ATO attacks, A demo of credential stuffing, brute force and session jacking-based ATO attacks, Identifying attacks with behaviour-based analysis and Building custom protection for applications and APIs.

Related Articles