Suspected Chinese hackers have successfully breached Japan’s National Center of Incident Readiness and Strategy for Cybersecurity (NISC), potentially compromising sensitive data stored on the agency’s networks for a span of nine months before being detected, as reported on Tuesday. The breach, which was not publicly attributed by NISC, reportedly allowed access to personal data linked to email exchanges, raising concerns about cybersecurity vulnerabilities. The Financial Times, citing informed sources, suggests that state-backed Chinese hackers are the likely culprits behind the attack.
This incident follows the revelation that Chinese military hackers compromised Japan’s defense networks in 2020, prompting concerns about intelligence-sharing disruptions and Japan’s strategic partnerships in the face of escalating geopolitical tensions.
Furthermore, China’s involvement in another incident affecting Japan’s cybersecurity landscape has emerged. The report notes that China was linked to an attack on Japan’s port of Nagoya earlier this year. Despite initial attributions to the LockBit ransomware gang, “government cyber experts” now believe that the attack was a result of China’s persistent efforts to test Japan’s infrastructural defenses, rather than a typical ransomware incident.
Japan’s Cabinet Office, responsible for NISC, did not respond to news requests regarding the breach. NISC, however, contested the extent of access achieved by the alleged hackers, emphasizing that the breach was confined to the agency’s email system.
In response to the allegations, China’s ministry of foreign affairs denied any involvement in the breach and instead placed blame on the United States. This accusation is noteworthy against the backdrop of international concerns about China’s cyber activities.
Beijing has recently pledged to disclose U.S. cyber espionage activities in light of criticisms and discussions surrounding its own hacking practices, further amplifying the complexities and tensions in the realm of global cybersecurity.