Thursday, September 21, 2023
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Cybersecurity

Rapid7: Japan Threat Landscape Takes on Global Significance

Researcher by Researcher
June 29, 2023
in Cybersecurity
0
Sentra Raises $30 Million for DSPM Technology
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


Japan is the world’s third largest economy. It attracts both criminal and nation-state cyberattacks. The effects of these attacks can be felt on a global scale.

The primary cause of cyberattacks against Japanese computer systems are the strength and quality of its manufacturing base. The size of Japanese manufacturers makes them an attractive target for criminal extortion. The quality of Japanese products makes the manufacturers’ IP an attractive target for nation-state attackers seeking to improve their own knowledge and economy.

The nature and effect of the attacks turns attacks against Japan into global events – as explained in a Rapid7 report (PDF) titled Japan and Its Global Business Footprint.

The geographical and geopolitical position of Japan places it adjacent and opposed to three of the world’s four greatest wielders of state-affiliated cyberattacks: to the east of China, the south of Russia, and close to North Korea. China and Russia have a history of using cyberespionage to steal IP for their own military or economic use. North Korea is more concerned with stealing money to support its government against global sanctions, but has been known to use ransomware to these ends. For both money and IP, Japan is an attractive target.

Geopolitically, Japan is part of the western coalition, and has its own problems with Russia in the territorial dispute over the Kuril Islands. Its support for Ukraine against Russia likely increases any geopolitical tensions with Russia, but there is relatively little evidence of direct Russian geopolitical retribution against Japan. 

Two possibilities noted by Rapid7 include the Killnet DDoS attacks against the websites of Japanese government organizations and private sector companies in September 2022 (The Japan Times), and the earlier ransomware attack against Toyota in February 2022. The ransomware attack followed the Russian ambassador’s warning to Japan not to support western sanctions over Ukraine, and has led to suspicion (not proof) that there may have been Russian state involvement.

Outside of geopolitics, it is the nature and importance of globalism and the global supply chain that gives attacks against Japan their global relevance. Japanese manufacturers have many subsidiaries outside of Japan. Smaller subsidiaries are likely to be less well-defended than their parent companies and can be used as the entry route taken by attackers.

Advertisement. Scroll to continue reading.

The report notes two further reasons that make this non-Japan route attractive or open to attackers (both criminal and nation state). The first is language. Japanese is widely spoken in Japan, but almost nowhere else, where English is the global business language. For foreign attackers, it is easier to compose a compelling phishing email in English than it is in Japanese. 

“Generally speaking,” Paul Prudhomme, principal security analyst at Rapid7 (and author of the report) told SecurityWeek, “if you speak English, it is easier to send somebody a phishing email or some sort of other social engineering attack.” Foreign subsidiaries or suppliers are consequently a route used to attack Japanese firms. “If you’re a US or UK subsidiary of a Japanese company, you could be at higher risk simply by virtue of the fact that you speak English, which makes you easier to phish.”

The second is the nature of globalism and foreign acquisitions. “If the overseas subsidiary was an acquisition,” he continued, “perhaps that acquisition came with existing compromises or some sort of existing security issue. This is also a key vulnerability.”

Nation state attackers generally avoid causing damage – their primary intent is to steal information, often as quietly as possible. Criminals operate differently. Their purpose is to extort money by whatever means – and ransomware is the favored weapon. In extortion attacks that include encryption of both IT and OT, the purpose is to halt, and ransom, the manufacturing process.

Japanese manufacturers are particularly susceptible to this through the common use of ‘just in time manufacturing’. This is considered an efficient business process – supplies are not accrued and kept in storage until use, but rather are delivered directly to the production line. This releases funds otherwise tied up in stored stock warehouses.

The downside, however, is that there are no stock reserves. This leaves the firm particularly vulnerable to business disruption attacks – the effect is felt immediately. But this is just the beginning. If the manufacturer cannot produce new parts, they cannot be shipped to customers, and those customers may be located anywhere in the world.

The criminals are gambling that the speed of wide scale negative effects from a disruption attack against Japanese manufacturing will facilitate their extortion attempts.

It is the size of the Japanese economy that makes Japan an attractive target for cyberattacks, but it is globalism that makes the effects of those attacks a global issue. The attackers may be nation state actors or outright criminals. They will commonly attack through non-Japanese affiliates or subsidiaries, but the effect of the attacks will reach beyond Japan through exported Japanese manufacturing parts.

The biggest single take-away from Rapid7’s report is that regardless of your organization’s location, if you do business with Japan, you need to consider the ramifications of Japan’s global business footprint and the cybersecurity posture of your Japanese partner or parent. “I cannot emphasize this enough,” said Prudhomme. “With these large and well-known Japanese brands, the attackers will often go after the overseas subsidiaries or affiliates, and then use the initial footholds to move laterally into the parent company in Japan.”

Related: Toyota: Data on 2 Million Vehicles at Risk in Decade-Long Breach

Related: Chinese Cyberspies Targeted Japanese Political Entities

Related: Japanese Gaming Company Confirms Cyberattack

Related: Hackers Steal $97 Million from Japanese Crypto-Exchange



Source link

Related articles

Sentra Raises $30 Million for DSPM Technology

Northern Ireland’s Top Police Officer Apologizes for ‘Industrial Scale’ Data Breach

August 13, 2023
Minimizing Risk Through Proactive Apple Device Management: Addigy

Minimizing Risk Through Proactive Apple Device Management: Addigy

August 12, 2023
Tags: GlobalJapanLandscapeRapid7SignificancetakesThreat
Share76Tweet47

Related Posts

Sentra Raises $30 Million for DSPM Technology

Northern Ireland’s Top Police Officer Apologizes for ‘Industrial Scale’ Data Breach

August 13, 2023
0

Northern Ireland’s top police officer apologized Thursday for what he described as an “industrial scale” data breach in which the...

Minimizing Risk Through Proactive Apple Device Management: Addigy

Minimizing Risk Through Proactive Apple Device Management: Addigy

August 12, 2023
0

Enterprise IT teams are struggling to cope with three major forces of change: the evolving regulatory environment, a globally dispersed...

Decipher Podcast: Katelyn Bowden and TC Johnson

Decipher Podcast: Katelyn Bowden and TC Johnson

August 12, 2023
0

Veilid main site: https://veilid.com/ Cult of the Dead Cow site: https://cultdeadcow.com/ Source link

In Other News: Government Use of Spyware, New Industrial Security Tools, Japan Router Hack 

In Other News: macOS Security Reports, Keyboard Spying, VPN Vulnerabilities

August 12, 2023
0

SecurityWeek is publishing a weekly cybersecurity roundup that provides a concise compilation of noteworthy stories that might have slipped under...

Used Correctly, Generative AI is a Boon for Cybersecurity

Used Correctly, Generative AI is a Boon for Cybersecurity

August 12, 2023
0

Adobe stock, by Busra At the Black Hat kickoff keynote on Wednesday, Jeff Moss (AKA Dark Tangent), the founder of...

Load More
  • Trending
  • Comments
  • Latest
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
Supply chain efficiency starts with securing port operations

Supply chain efficiency starts with securing port operations

March 15, 2022
Microsoft to Block Macros by Default in Office Apps

Qakbot Email Thread Hijacking Attacks Drop Multiple Payloads

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
LUCR-3 Attacking Fortune 2000 Companies Using Victims’ Own Tools

LUCR-3 Attacking Fortune 2000 Companies Using Victims’ Own Tools

September 21, 2023
EBANX Furthers Expansion into Africa; Adding 8 new Countries to its Ecosystem

EBANX Furthers Expansion into Africa; Adding 8 new Countries to its Ecosystem

September 21, 2023
Trend Micro Zero-day Vulnerability Let Attackers Run Arbitrary Code

Trend Micro Zero-day Vulnerability Let Attackers Run Arbitrary Code

September 21, 2023
Intel Reveals New 288-Core Sierra Forest CPU, Core Ultra Processors at Intel Innovation 2023

Intel Reveals New 288-Core Sierra Forest CPU, Core Ultra Processors at Intel Innovation 2023

September 21, 2023

Recent Posts

LUCR-3 Attacking Fortune 2000 Companies Using Victims’ Own Tools

LUCR-3 Attacking Fortune 2000 Companies Using Victims’ Own Tools

September 21, 2023
EBANX Furthers Expansion into Africa; Adding 8 new Countries to its Ecosystem

EBANX Furthers Expansion into Africa; Adding 8 new Countries to its Ecosystem

September 21, 2023
Trend Micro Zero-day Vulnerability Let Attackers Run Arbitrary Code

Trend Micro Zero-day Vulnerability Let Attackers Run Arbitrary Code

September 21, 2023

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • LetsAskBinuBlogs
  • Malware
  • Networking
  • Protection

Tags

Access attack Attacks banking BiWeekly bug Cisco cloud code critical Cyber Cybersecurity Data Digital exploited financial Fintech Flaw flaws Google Group Hackers Krebs Latest launches malware Microsoft million Network News open patches platform Ransomware RoundUp security Software Stories TFT Threat Top vulnerabilities vulnerability warns Week

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved