Chinese Hackers Target Japan & EU

The Chinese threat actor known as MirrorFace has been seen targeting a diplomatic organisation in the European Union, marking the first time the hacking crew has targeted an entity outside the Asian region.

The leading Slovak cyber security company ESET described the event, saying that this is an expansion in the threat group’s range of targets which have historically been restricted to target organisations in Japan.

Although the identity of the target diplomatic organisation wasn’t disclosed, the lure document was attached to a spear-phishing email with a Japanese theme, encouraging the target to download a document promoting an EXPO Exhibition in Japan in 2025.

Attacks on Japanese organisation by Chinese threat  groups has benn increasing and ESET note that, even considering this new EU targeting, "MirrorFace remains focused on Japan and events related to it.” 

Earlier this year Japanese security agencies reported an expansion in activities linked to MirrorFace. While the hackers focused initially on gaining access to media, political organisations, think-tanks and universities in Japan, they were also including manufacturers and research institutions. In August, Japan’s national cyber security agency (NISC) disclosed that had itself been hacked, with the attackers potentially accessing sensitive data for nine months before being discovered.

Japan has not publicly attributed the incident to a specific threat actor, however, a report by the Financial Times  names three government and private sector sources familiar with the situation, saying that state-backed Chinese hackers were suspected of being behind the attack.

This follows a report by the Washington Post that the US National Security Agency discovered Chinese military hackers had damagingly compromised Japan’s defence networks in 2020.

 ESET     |     JPCERT     |     FT     |     Washington Post     |     The Hacker News  |  The Record      

Image:  Ideogram

You Might Also Read:

Japan’s Leading Companies Exposed To Ransomware:


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Interpol Takes Down Cybercrime Network
Dealing With Cloud Security Challenges »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Jones Day

Jones Day

Jones Day is an international law firm based in the United States. Practice areas include Cybersecurity, Privacy & Data Protection.

MIT Internet Policy Research Initiative (IPRI)

MIT Internet Policy Research Initiative (IPRI)

IPRI's mission is to work with policy makers and technologists to increase the trustworthiness and effectiveness of interconnected digital systems

Qufaro

Qufaro

Qufaro is a new initiative designed to make it simpler for those with career ambitions in cyber security to access the UK’s cyber-specific education and innovation opportunities.

Quest Software

Quest Software

Simple IT management for a complex world. Whether it’s digital transformation, cloud expansion, security threats or something new, Quest helps you solve complex problems with simple solutions.

BIND 4.0

BIND 4.0

Bind 4.0 is an acceleration program geared toward tech startups with solutions applied to Advanced Manufacturing, Smart Energy, Health Tech or Food Tech fields.

Syber Technology

Syber Technology

Syber Technology is an IT project implementer empowering IT systems of Small to Medium Enterprises in the Middle East.

Nucleon Security

Nucleon Security

Nucleon Endpoint Detection and Response EDR is the most effective way to protect the value created by your organization against any threat.

Cranfield University

Cranfield University

Cranfield Defence and Security are at the forefront of their fields, offering capabilities ranging from cyber security and digital warfare to robotics, forensic sciences and simulation and analytics.

SolCyber

SolCyber

SolCyber, a Forgepoint company, is the first modern MSSP to deliver a curated stack of enterprise strength security tools and services that are accessible and affordable for any organization.

Dataships

Dataships

We help companies automate their privacy compliance while building healthy, transparent data relationships with their customers.

Analygence

Analygence

ANALYGENCE is your trusted partner for mission support, cyber solutions, and management services.

AutoRABIT

AutoRABIT

AutoRABIT provides DevSecOps tools built specifically for Salesforce developers to increase release velocity, produce consistently high-quality code, and enhance data security.

Aeries Technology

Aeries Technology

Aeries is a technology services organization offering capabilities in Technology Services, Digital Transformation, and Business Process Management.

Cybersecurity Dubai

Cybersecurity Dubai

Protect your business from cyber-attacks with Cybersecurity Dubai, your partner in online security solutions.

Spec

Spec

Spec is the only no-code orchestration platform that protects enterprise fraud defenses from being blocked, bypassed, and manipulated by modern attack tactics.

ZeroGPT

ZeroGPT

ZeroGPT.com stands at the forefront of AI detection tools, specializing in the precise identification of ChatGPT-generated text.