9.1 C
New York
Monday, March 18, 2024

Fujitsu hack raises questions, after agency confirms buyer information breach • Graham Cluley


Fujitsu hack raises questions, after firm confirms customer data breachFujitsu hack raises questions, after firm confirms customer data breach

Fujitsu has warned that cybercriminals might have stolen recordsdata with private and buyer information after it discovering malware on its laptop programs.

The agency on the middle of the British Submit Workplace scandal, mentioned in a Japanese press launch that it had found the presence of malware on its computer systems, the potential theft of buyer information, and apologised for any concern or inconvenience prompted.

Fujitsu announcementFujitsu announcement
Announcement printed on Fujitu’s Japanese web site.

The press launch (a Google-translated model might be learn right here), is considerably scant on element.

As an example:

  • Fujitsu doesn’t disclose the malware discovered, the variety of affected computer systems, or the interior programs or databases accessed.
  • Fujitsu doesn’t specify the kind of malware discovered – a distant entry backdoor? ransomware? one thing else?
  • Fujitsu doesn’t share particulars concerning the stolen data, calling it “private data and buyer data.” As an example, does it embrace contact particulars, passwords, or fee data?
  • Fujitsu introduced on Friday 15 March that it suffered a cyber assault, however didn’t specify when it was found or how lengthy the hackers had entry to its programs and information.

Fujitsu says it has reported the incident to regulators and can contact affected people and clients.

The corporate additionally says that it has not seen any experiences of the doubtless stolen data being misused. Statements like these are supposed to reassure affected events, however they don’t make you’re feeling rather more comfy in actuality.

An absence of proof will not be proof of absence. How might an organization ever confidently and actually declare it has incontrovertible proof that exfiltrated information has not been exploited by malicious hackers and on-line fraudsters?

Signal as much as our free publication.
Safety information, recommendation, and suggestions.

Prior to now, there have been many incidents the place information stolen in a hack has not instantly proven up, earlier than showing on the darkish internet months and even years later.






Supply hyperlink

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles