Loading...
Loading...
Browse all stories on DeepNewz
VisitWhat method will MirrorFace primarily use in cyberattacks against Japan by end of 2025?
Malware-laden emails • 25%
Exploiting VPN vulnerabilities • 25%
Phishing attacks • 25%
Supply chain attacks • 25%
Cybersecurity reports or official announcements
Japan Links 210 Cyberattacks Since 2019 to Chinese Hacking Group
Jan 8, 2025, 06:35 AM
The Japanese National Police Agency (NPA) and the Cybersecurity Center of the Cabinet Office have linked 210 cyberattacks from 2019 to 2024 to a Chinese hacking group known as 'MirrorFace.' These attacks targeted government agencies, including the Ministry of Defense, the Ministry of Foreign Affairs, and the Japan Aerospace Exploration Agency (JAXA), as well as private companies and think tanks. The attacks aimed to steal sensitive information related to national security and advanced technology. The hacking group employed methods such as malware-laden emails and exploiting VPN vulnerabilities. The NPA has urged organizations to enhance their cybersecurity measures to prevent further breaches. The involvement of another group, 'Earth Kasha,' is also suspected. Despite the scale of the attacks, major information leaks have not been confirmed, although some personal data breaches at JAXA have been reported.
View original story
Exploiting software vulnerabilities • 25%
Phishing • 25%
Other • 25%
Insider threats • 25%
Other • 25%
Phishing attacks • 25%
Exploiting software vulnerabilities • 25%
Insider threats • 25%
Other Critical Infrastructure • 25%
U.S. Power Grid • 25%
U.S. Ports • 25%
U.S. Telecommunications • 25%
Other Civilian Infrastructure • 25%
Nuclear Power Plant • 25%
Steelworks • 25%
Kanmon Tunnel • 25%
Insider threats • 25%
Zero-day vulnerabilities • 25%
Supply chain attacks • 25%
Phishing attacks • 25%
Increase in defense budget • 25%
No significant response • 25%
Diplomatic negotiations • 25%
Strengthening alliances • 25%
Spoofing • 25%
Jamming • 25%
Other • 25%
Decoy Drones • 25%
Increase military spending • 25%
No significant action • 25%
Diplomatic protest • 25%
Conduct military exercises • 25%
Other methods • 25%
Social media manipulation • 25%
Deepfakes • 25%
Hacking and data breaches • 25%
U.S. pressure • 25%
Chinese military activities • 25%
North Korean threats • 25%
Domestic political factors • 25%
Corporate data • 25%
Personal data • 25%
Other • 25%
Government communications • 25%
Yes • 50%
No • 50%
Public awareness and education • 25%
Strengthening government agency defenses • 25%
Enhancing private sector cybersecurity • 25%
International cooperation and alliances • 25%