November 29, 2023 at 12:09PM
JAXA was hacked, risking sensitive space-tech data. The breach involved the agency’s Active Directory server, and the extent of damage is under investigation. JAXA was previously targeted by Chinese hackers, Tick. Concerns arise as Japan-US agencies warn of ongoing Chinese cyberattacks on networks. (50 words)
Meeting Takeaways:
1. The Japan Aerospace Exploration Agency (JAXA) experienced a cyberattack over the summer, which potentially exposed sensitive space technology and data.
2. The breach was brought to JAXA’s attention this autumn after law enforcement noticed system compromises.
3. During a press conference, Chief Cabinet Secretary Hirokazu Matsuno confirmed that attackers accessed JAXA’s Active Directory server, which is central to network operations and contains vital information like employee credentials.
4. JAXA is currently working with government cybersecurity experts and law enforcement to assess the extent of the breach.
5. No data leaks directly associated with this incident have been confirmed. However, there is substantial concern over the potential visibility of most information due to the AD server hack.
6. Historical context: JAXA has been previously targeted by Chinese state hackers, specifically in 2016 and 2017. In April 2021, the Japanese Metropolitan Police Department attributed those attacks to a Chinese military hacker group known as Tick (with aliases BRONZE BUTLER and STALKER PANDA).
7. JAXA has experienced previous attacks and has had an expanded role since 2012, including military space development like missile early warning systems, heightening the significance of security.
8. Recent warnings in September 2023 from US and Japanese cybersecurity agencies indicate that Chinese state-backed BlackTech hackers are currently active in cyberespionage activities, potentially relevant to the breach that occurred at JAXA.
**Follow-up Actions:**
– Ensure continuous collaboration with law enforcement and cybersecurity experts.
– Intensify internal security measures and employee training regarding cyber threats.
– Maintain vigilance and monitor for potential data leaks or further security incidents.
– Consider reviewing and potentially enhancing cooperation with international partners to bolster cyber defense capabilities.