Wednesday, April 23, 2025
HomeCyber AttackJapan Suspects HGV Attack Missile Data Leak in Part of Cyberattack That...

Japan Suspects HGV Attack Missile Data Leak in Part of Cyberattack That Hit Mitsubishi Electric Corp

Published on

SIEM as a Service

Follow Us on Google News

Recently, the Mitsubishi Electric Corp has revealed a major security breach; and in a brief statement released on its website stated that “sensitive information on the development of attack missiles could have been stolen part of a cyberattack on the servers of the Japanese electronic manufacturer Mitsubishi Electric last year.”

The attack appeared to have occurred on June 28, 2019, and was investigated months later. After two local newspapers published the stories about the attack, now finally the company has decided to converse on the matter.

The company, Mitsubishi Electric Corp, has argued that it is industrial surveillance. Still, sources say that the hackers have targeted the defense industry, mainly to steal information on a prototype of a cutting-edge high-speed gliding missile.

- Advertisement - Google News

A government source has explained that “Although the data was not classified as highly confidential,, the fact is that, it is still sensitive information related to the future of Japan’s defense capabilities.”

Confronted with the development of hypersonic missiles (HGV) in China, Russia, and the United States, the Japanese Ministry of Defense also launched its own research on this type of missile with a varied trajectory in 2018, sending the required specifications to the candidate companies to develop the prototype, including the Mitsubishi Electric Corp as well.

The stolen information could have included information on range, propulsion, heat resistance, and the production of the missile prototype that was requested by the Defense Ministry during the bidding process for the contract to develop the weapon; these are the data that the candidate companies promised to protect.

According to the reports, the data was stolen from the company’s internal network, about 200MB of files, mostly commercial documents. And apparently, the attackers stole data from their trading partners and defense contracts.

This whole incident is being treated with the utmost severity in Japan due to the fact that Mitsubishi Electric Corp is one of the largest defense and infrastructure contractors in the country. Moreover, the stolen data can also facilitate terrorist operations, as there is data related to the telecommunications infrastructure, railways, and the electricity grid.

All these attacks were unveiled last January, and the Japanese manufacturer believes that it was executed by the group of Chinese ‘hackers’ known as, “Tick” or by another group, known as “Bronze Butler”, allegedly controlled by the country’s military. In short, these both hacker groups are government-backed hacker groups.

The Mitsubishi Electric Corp reportedly noticed such cyberattacks in late June 2019, when they detected suspicious activity on a server at its Kamakura Research and Technological Development Center in Kanagawa Prefecture. 

Moreover, since last July, more than 40 servers, more than 120 computer systems at its headquarters in Tokyo, and other of its offices have been infringed, and its personal data on some 8,000 people also have been leaked. 

Along with the Mitsubishi Electric Corp, several other Japanese defense contractors like NEC Corp., Pasco Corp., and Kobe Steel Ltd., were also hit by these cyberattacks this year. But, the Chief Cabinet Secretary Yoshihide Suga has stated that “the Defense Ministry is investigating the possible impact of the information leak on national security.”

So, what do you think about this? Share your views and thoughts in the comment section below.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Also Read:

EasyJet Hacked – More than 9 Million Customers Details Were Accessed

db8151dd – A Massive Unattributable Data Breach Leaked Tens of Millions of Records

4,000 Android apps on Google Play Expose Millions Of Passwords, Phone Numbers And Messages via Firebase

Home Chef Hacked – Hackers Selling 8M User Records on a Dark Web Marketplace

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Lattica Emerges from Stealth to Solve AI’s Biggest Privacy Challenge with FHE

Lattica, an FHE-based platform enabling secure and private use of AI in the cloud,...

FireEye EDR Vulnerability Allows Attackers to Execute Unauthorized Code

A critical vulnerability (CVE-2025-0618) in FireEye’s Endpoint Detection and Response (EDR) agent has been...

New Malware Hijacks Docker Images Using Unique Obfuscation Technique

A recently uncovered malware campaign targeting Docker, one of the most frequently attacked services...

Critical Browser Wallet Vulnerabilities Enable Unauthorized Fund Transfers

Researchers have disclosed a series of alarming vulnerabilities in popular browser-based cryptocurrency wallets that...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

New Malware Hijacks Docker Images Using Unique Obfuscation Technique

A recently uncovered malware campaign targeting Docker, one of the most frequently attacked services...

APT34 Hackers Use Port 8080 for Fake 404 Responses and Shared SSH Keys

Researchers have uncovered early indicators of malicious infrastructure linked to APT34, also known as...

Hackers Exploit Weaponized Word Docs to Steal Windows Login Credentials

A sophisticated phishing campaign has been uncovered by Fortinet’s FortiGuard Labs, targeting Windows users...