Thursday, January 30, 2025
HomeCyber Security NewsHackers Breached Japan Aerospace Company’s President Account

Hackers Breached Japan Aerospace Company’s President Account

Published on

SIEM as a Service

Follow Us on Google News

Hackers have infiltrated the Japan Aerospace Exploration Agency (JAXA), compromising the accounts of several high-ranking officials, including President Hiroshi Yamakawa.

This alarming incident is part of a series of cyberattacks targeting JAXA since June 2023, raising concerns about the security of sensitive information related to space exploration and national security.

Multiple Attacks Target High-Level Officials

According to the Asahi Shimbun report, JAXA has been the target of relentless cyberattacks, with four major incidents reported since mid-2023.

In the first attack, personal data belonging to about 5,000 employees was stolen, affecting nearly everyone in the agency’s network.

Analyse Any Suspicious Links Using ANY.RUN’s New Safe Browsing Tool: Try for Free

An internal investigation revealed that hackers took control of approximately 200 accounts, including those of five directors on JAXA’s nine-member board.

The targeted accounts belonged to senior officials involved in policy issues and budget affairs, indicating a strategic attempt to access confidential negotiations and planning information.

Compromised Cloud Services and Leaked Files

The breach investigation uncovered that Microsoft Corp.’s cloud service, Microsoft 365, was compromised during the June 2023 cyberattack.

Over 10,000 files stored on the platform could have been leaked, with more than 1,000 files provided by external parties under non-disclosure agreements.

These files included sensitive information from over 40 companies and organizations, such as NASA, the European Space Agency, Toyota Motor Corp., Mitsubishi Heavy Industries Ltd., and Japan’s Defense Agency.

The leaked documents primarily belonged to JAXA’s Strategic Planning and Management Department, Space Exploration Center, and Human Spaceflight Technology Directorate.

Impact on International Collaborations

Despite the severity of these breaches, JAXA has stated that there have been no reports of significant disruptions to operations or collaborations with domestic and international partners.

However, the agency acknowledges the potential damage to trust and is committed to enhancing its cybersecurity measures.

The leaked files included crucial data on international projects, such as NASA’s Artemis lunar exploration program and Toyota’s development of a manned lunar rover.

As investigations continue, JAXA remains focused on safeguarding its systems to prevent future incidents and maintain its collaborative efforts in space exploration. 

This series of cyberattacks highlights the growing threat to global aerospace agencies and underscores the need for robust cybersecurity strategies to protect sensitive information in an increasingly interconnected world.

Upgrade Your Cybersecurity Skills With 100+ Premium Cyber Security Courses Online - Enroll Here

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

10,000 WordPress Websites Hacked to Distributing MacOS and Microsoft Malware

Over 10,000 WordPress websites have been hijacked to deliver malicious software targeting both macOS...

New RDP Exploit Allows Attackers to Take Over Windows and Browser Sessions

Cybersecurity experts have uncovered a new exploit leveraging the widely used Remote Desktop Protocol...

New SMS-Based Phishing Tool ‘DevilTraff’ Enables Mass Cyber Attacks

Cybersecurity experts are sounding the alarm about a new SMS-based phishing tool, Devil-Traff, that...

DeepSeek Database Publicly Exposed Sensitive Information, Secret Keys & Logs

Experts at Wiz Research have identified a publicly exposed ClickHouse database belonging to DeepSeek,...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

10,000 WordPress Websites Hacked to Distributing MacOS and Microsoft Malware

Over 10,000 WordPress websites have been hijacked to deliver malicious software targeting both macOS...

New RDP Exploit Allows Attackers to Take Over Windows and Browser Sessions

Cybersecurity experts have uncovered a new exploit leveraging the widely used Remote Desktop Protocol...

New SMS-Based Phishing Tool ‘DevilTraff’ Enables Mass Cyber Attacks

Cybersecurity experts are sounding the alarm about a new SMS-based phishing tool, Devil-Traff, that...