The organization has affirmed that a security episode at Kawasaki Heavy Industries has potentially exposed the company’s sensitive data to external agencies. 

Japanese conglomerate confirms the possible leak of sensitive information…

The Kawasaki Heavy Industries mainly focuses on manufacturing motorcycles, military aircraft, and industrial machinery, among many other vehicles and equipment, said a timely internal audit back in June uncovered that its local servers had been accessed by means of an abroad office in Thailand. 

Further unapproved access via satellite offices in Indonesia, the Philippines, and the US was also discovered.

The local sources reported that the access started back in September 2019 at the latest. The Japan Times likewise cited Kawasaki as saying that administrator ID and passwords had also been stolen as part of the incident.

Also read,

Not a trace

The Tokyo-headquartered organization reported that the breach to its servers “had been carried out with advanced technology that did not leave a trace”.

The press release issued on 28th December stated that an investigation found that the data related to “unknown content” may have been leaked to a third party.

The question of what kind of information was breached, or how severe the leak was is still unclear. 

As per the Japan Times, the cyber-attack may have been dispatched with an end goal of getting “defence-related data”, despite the fact that this has not been confirmed. 

“Since the affirmation of unapproved access, the Kawasaki Heavy Industries team of special projects drew in with an autonomous outer security expert firm and has been exploring and executing countermeasures.” peruses the security alert. 

It also added: “right now, we have discovered no proof of spilling data including individual data to outer gatherings. Clients who may have been influenced by this unapproved access are being reached exclusively.”

Kawasaki Industries has additionally settled an in-house cybersecurity team, which it says will “fortify safety measures, dissecting the latest unauthorized access techniques, to prevent recurrences”.