Categories: HackingMalware

Japan Aerospace Exploration Agency hit again by malware

The New Your Times has recently published the news the Japan Aerospace Exploration Agency was hit by a virus that stolen secret information on newest rockets from an internal computer. The precious information was stored from a computer in Tsukuba Space Center located in northeast area of Tokyo, where it has been detected a malware that was stealing information. The stolen data includes details on ongoing projects such as the Epsilon project, a solid-fuel rocket, this last feature is desirable for the attackers due the possible implication in military use.

The Japanese Epsilon project, started two years ago, is very innovative, it’s new generation of rockets superior to the existing H-IIA rocket due to its reduced size that allow the shipment into orbit of satellite at a quarter of actual launch cost. But reduced dimension means also major capacity of manageability in military, solid-fuel rockets could in fact be used in military as intercontinental ballistic missiles.

The incident happened last November 21th , security experts detected a malicious agent inside the network of the agency that silently stolen data related to advanced projects of the agency. Immediately was started the procedure to sanitize the internal network and to conduct the necessary forensic analysis. It’s not clear the real intent of the offensive that appears to be a targeted attack to steal intellectual property.

This is the second time during this year that Japan Aerospace Exploration Agency is hit by a cyber attack, last time a virus stole sensible information related another technological advanced project related to the design of an unmanned vessel that ferries cargo to the International Space Station, the “H-2 Transfer Vehicle”.

The Epsilon rocket will be launched next autumn but as highlighted by New York Times it is a complex project with a meaningful technological component and innovative contents. We must consider that Japan industry has been victims of different attacks during last year that used different instances of known viruses hitting mainly defense companies.

Following a shot list of known events :

Mitsubishi Heavy Industries (defense contractor) August 2011 Companies networks infected by malware that sent outside information on defense systems.
Japan’s lower house of parliament October 2011 A cyber espionagecampaign originated from China exposed sensible information at least a month.The infection was possible thanks phishing campaign against Lower House member started in July. Also in this case a malware was used for the attack.
Japan Aerospace Exploration Agency January 2012 Malware infected a data terminal at Japan’s space agency stealing sensitive information including data related to H-2 Transfer Vehicle
The Japanese Finance Ministry July 2012 The Japanese Finance Ministry declares that its computers have been infected with a virus in the from 2010 to 2011 causing leaks of information.

 

Some attacks were originated from China, the nation most active in cyber espionage, and it’s my opinion that we are facing with the tip of the iceberg, the Elderwood project is the demonstration that groups of hackers are exploiting zero-day vulnerabilities to steal sensible information and to exploit systems inside critical infrastructures.

Similar events are on the agenda, some revealed, others rightly kept secret, the prevention is crucial, fundamental is the definition of protective and efficient countermeasures and the adoption and diffusion of security best practices.

Pierluigi Paganini

[adrotate banner=”9″]

Pierluigi Paganini

(Security Affairs – Japan Aerospace Exploration Agency, malware)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Paragon Graphite Spyware used a zero-day exploit to hack at least two journalists’ iPhones<gwmw style="display:none;"></gwmw><gwmw style="display:none;"></gwmw>

Security researchers at Citizen Lab revealed that Paragon's Graphite spyware can hack fully updated iPhones…

6 hours ago

SinoTrack GPS device flaws allow remote vehicle control and location tracking

Two vulnerabilities in SinoTrack GPS devices can allow remote vehicle control and location tracking by…

14 hours ago

U.S. CISA adds Wazuh, and WebDAV flaws to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Wazuh, and WebDAV flaws to its Known…

17 hours ago

Exposed eyes: 40,000 security cameras vulnerable to remote hacking

Over 40,000 internet-exposed security cameras worldwide are vulnerable to remote hacking, posing serious privacy and…

18 hours ago

Operation Secure: INTERPOL dismantles 20,000+ malicious IPs in major cybercrime crackdown

INTERPOL announced that a joint operation code-named Operation Secure took down 20,000+ malicious IPs/domains tied…

1 day ago

Over 80,000 servers hit as Roundcube RCE bug gets rapidly exploited

A critical remote code execution (RCE) vulnerability in Roundcube was exploited days after patch, impacting…

2 days ago