Casio Hacked: Customers’ Personal Details Exposed

Casio Computer Co., Ltd. has apologized for a data leak due to unauthorized server access. 

The server contained the personal information of customers who registered for its educational web service, “ClassPad[.]net.” The leak affected customers both in Japan and abroad.

The company expressed deep regret for the trouble and worry this incident caused its customers and stakeholders. 

The company admitted that it failed to prevent the breach, which was a serious violation of its security standards.

The breach was caused by an external cyber-attack that targeted a database in the development environment for “ClassPad[.]net.” 

The attackers were able to access and leak the personal information of some of Casio’s customers. However, no other assets besides this database were compromised.

Document
FREE Demo

Deploy Advanced AI-Powered Email Security Solution

Implementing AI-Powered Email security solutions “Trustifi” can secure your business from today’s most dangerous email threats, such as Email Tracking, Blocking, Modifying, Phishing, Account Take Over, Business Email Compromise, Malware & Ransomware

Background of the Incident

The breach was discovered on the night of Wednesday, October 11, when Casio’s development team noticed a database failure in the ClassPad.net environment. 

Upon further investigation, they found that on Thursday, October 12, customers’ personal information outside Japan had been accessed and leaked.

The investigation revealed that some network security settings in the development environment had been turned off due to an operational mistake by the company’s system management department. 

The lack of proper operational management and supervision was the main reason for the breach, which allowed an external entity to exploit these weaknesses.

Casio took immediate action to deal with the breach. All databases in the development environment affected by the attack have been made inaccessible from outside the environment. 

The incident has been reported to Japan’s Personal Information Protection Commission and JUAS, the “PrivacyMark” certification organization. 

Casio has consulted with external security experts to conduct further investigations and implement necessary measures. The company is also considering legal actions, including cooperation with law enforcement agencies. Moreover, 

Casio is working with the police in their ongoing investigation.

The data breach exposed the following personal information:

  1. Customer names
  2. Customer email addresses
  3. Country/region of residence
  4. Purchasing information (order details, payment method, license code, etc.)
  5. Service usage information (log data, nicknames, etc.)
  6. Credit card information was not stored.

The number of individuals affected by the breach was large:

  • Customers in Japan: 91,921 items, including 1,108 educational institution customers and individual customers.
  • Customers outside Japan: 35,049 items from 148 countries and regions.

Casio is contacting all customers whose personal information may have been leaked through email and other means. They have set up a dedicated contact point for inquiries from affected customers.

Service Availability

There was no unauthorized access to the “ClassPad.net” application itself. It is still available for use as normal.

Future measures

In its recent notice, Cisco mentioned that it plans to improve its technical safety management by strengthening its security for network routes and databases.

It will also review its operational procedures and enhance its employee education and training. 

And do their best to restore trust and prevent recurrence of such incidents

Protect yourself from vulnerabilities using Patch Manager Plus to patch over 850 third-party applications quickly. Take advantage of the free trial to ensure 100% security.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Chinese Hackers Breach Belgium State Security Service as Investigation Continues

Belgium’s State Security Service (VSSE) has suffered what is being described as its most severe…

16 minutes ago

Hacktivist Groups Emerge With Powerful Tools for Large-Scale Cyber Operations

Hacktivism, once synonymous with symbolic website defacements and distributed denial-of-service (DDoS) attacks, has evolved into…

20 minutes ago

New Pass-the-Cookie Attacks Bypass MFA, Giving Hackers Full Account Access

Multi-factor authentication (MFA), long considered a cornerstone of cybersecurity defense, is facing a formidable new…

6 hours ago

Chinese Hackers Exploit Check Point VPN Zero-Day to Target Organizations Globally

A sophisticated cyberespionage campaign linked to Chinese state-sponsored actors has exploited a previously patched Check…

7 hours ago

PingAM Java Agent Vulnerability Allows Attackers to Bypass Security

A critical security flaw (CVE-2025-20059) has been identified in supported versions of Ping Identity’s PingAM…

8 hours ago

New GitHub Scam Uses Fake “Mods” and “Cracks” to Steal User Data

A sophisticated malware campaign leveraging GitHub repositories disguised as game modifications and cracked software has…

9 hours ago