www.darkreading.com
Open in
urlscan Pro
2606:4700::6810:dfab
Public Scan
Submitted URL: https://t.co/sVV2iSYlhW
Effective URL: https://www.darkreading.com/endpoint-security/fujitsu-suffers-worm-attack-not-ransomware
Submission: On November 13 via manual from JP — Scanned from JP
Effective URL: https://www.darkreading.com/endpoint-security/fujitsu-suffers-worm-attack-not-ransomware
Submission: On November 13 via manual from JP — Scanned from JP
Form analysis
0 forms found in the DOMText Content
Dark Reading is part of the Informa Tech Division of Informa PLC Informa PLC|ABOUT US|INVESTOR RELATIONS|TALENT This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales and Scotlan. Number 8860726. Black Hat NewsOmdia CybersecurityAdvertise Newsletter Sign-Up Newsletter Sign-Up Cybersecurity Topics RELATED TOPICS * Application Security * Cybersecurity Careers * Cloud Security * Cyber Risk * Cyberattacks & Data Breaches * Cybersecurity Analytics * Cybersecurity Operations * Data Privacy * Endpoint Security * ICS/OT Security * Identity & Access Mgmt Security * Insider Threats * IoT * Mobile Security * Perimeter * Physical Security * Remote Workforce * Threat Intelligence * Vulnerabilities & Threats World RELATED TOPICS * DR Global * Middle East & Africa * Asia Pacific See All The Edge DR Technology Events RELATED TOPICS * Upcoming Events * Podcasts * Webinars SEE ALL Resources RELATED TOPICS * Library * Newsletters * Podcasts * Reports * Videos * Webinars * Whitepapers * * * * * Partner Perspectives SEE ALL * Endpoint Security * Cyberattacks & Data Breaches * Cybersecurity Analytics * Data Privacy Breaking cybersecurity news, news analysis, commentary, and other content from around the world, with an initial focus on the Middle East & Africa and the Asia Pacific FUJITSU SUFFERS WORM-LIKE ATTACK FROM SOMETHING THAT WASN'T RANSOMWAREFUJITSU SUFFERS WORM-LIKE ATTACK FROM SOMETHING THAT WASN'T RANSOMWARE The CE giant released its investigative findings regarding a March cyberattack that resulted in data exfiltration affecting its Japanese operations. Tara Seals, Managing Editor, News, Dark Reading July 11, 2024 1 Min Read Source: Patrick Batchelder via Alamy Stock Photo After months of postmortem investigation, Fujitsu now says the malware that affected its systems in a cyberattack last March was not ransomware as previously speculated — and noted that the binary self-propagated, worming its way through the company's internal networks in Japan. In its rundown of the investigative findings this week, the consumer electronics and networking giant confirmed that the malware first established a beachhead on one of Fujitsu's business PCs, attacking from an external server (it didn't mention what the initial access method was). The malware was "particularly difficult to detect," according to Fujitsu, using sophisticated techniques to cloak itself as it replicated onto 49 other PCs within the network. Only its Japanese footprint was affected. "The affected computers were not managed through the cloud services provided by Fujitsu," the company noted in the advisory. "Additionally, no trace of access to the services provided by Fujitsu to customers was found. The investigation concluded that the damage did not spread outside of the company's business computers, including to customers' network environments." Nonetheless, the attack resulted in data exfiltration, including files containing "personal or business-related information about certain customers." The company said it has since beefed up its security measures, including implementing security monitoring rules for the unnamed malware to all business PCs, and enhancing virus detection software functions and updates. ABOUT THE AUTHOR Tara Seals, Managing Editor, News, Dark Reading Tara Seals has 20+ years of experience as a journalist, analyst and editor in the cybersecurity, communications and technology space. Prior to Dark Reading, Tara was Editor in Chief at Threatpost, and prior to that, the North American news lead for Infosecurity Magazine. She also spent 13 years working for Informa (formerly Virgo Publishing), as executive editor and editor-in-chief at publications focused on both the service provider and the enterprise arenas. A Texas native, she holds a B.A. from Columbia University, lives in Western Massachusetts with her family and is on a never-ending quest for good Mexican food in the Northeast. See more from Tara Seals, Managing Editor, News, Dark Reading Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox. Subscribe You May Also Like -------------------------------------------------------------------------------- Endpoint Security RansomHub Rolls Out Brand-New, EDR-Killing BYOVD Binary Endpoint Security FishXProxy Phishing Kit Outfits Cybercriminals for Success Endpoint Security Eldorado Ransomware Cruises Onto the Scene to Target VMware ESXi Endpoint Security Apple 'Lockdown Mode' Attack Subverts Key iPhone Security Feature More Insights Webinars * Securing Tomorrow, Today: How to Navigate Zero Trust Nov 13, 2024 * The State of Attack Surface Management (ASM), Featuring Forrester Nov 15, 2024 * Applying the Principle of Least Privilege to the Cloud Nov 18, 2024 * The Right Way to Use Artificial Intelligence and Machine Learning in Incident Response Nov 20, 2024 * Safeguarding GitHub Data to Fuel Web Innovation Nov 21, 2024 More Webinars Events * Know Your Enemy: Understanding Cybercriminals and Nation-State Threat Actors Nov 14, 2024 * Cybersecurity Outlook 2025 Dec 5, 2024 More Events EDITOR'S CHOICE IT security cybersecurity workers Vulnerabilities & Threats Has the Cybersecurity Workforce Peaked?Has the Cybersecurity Workforce Peaked? byRobert Lemos, Contributing Writer Nov 7, 2024 7 Min Read Cloud with lock in center, blue background Application Security Sloppy Entra ID Credentials Attract Hybrid Cloud RansomwareSloppy Entra ID Credentials Attract Hybrid Cloud Ransomware byBecky Bracken, Senior Editor, Dark Reading Sep 30, 2024 5 Min Read Woman with her hand hovering over a laptop keyboard in front of a screen display of a mailbox icon with a red danger circle Threat Intelligence Flexible Structure of Zip Archives Exploited to Hide Malware UndetectedFlexible Structure of Zip Archives Exploited to Hide Malware byElizabeth Montalbano, Contributing Writer Nov 11, 2024 5 Min Read Reports * Managing Third-Party Risk Through Situational Awareness Jul 31, 2024 * 2024 InformationWeek US IT Salary Report May 29, 2024 More Reports Webinars * Securing Tomorrow, Today: How to Navigate Zero Trust Nov 13, 2024 * The State of Attack Surface Management (ASM), Featuring Forrester Nov 15, 2024 * Applying the Principle of Least Privilege to the Cloud Nov 18, 2024 * The Right Way to Use Artificial Intelligence and Machine Learning in Incident Response Nov 20, 2024 * Safeguarding GitHub Data to Fuel Web Innovation Nov 21, 2024 More Webinars White Papers * 6 Key Requirements of Multicloud Security * Product Review: Trend Vision One Cloud Security * RevealX Catches Ransomware Within Days of Deployment at WCH * Purple AI Datasheet * How to Use Threat Intelligence to Mitigate Third-Party Risk More Whitepapers Events * Know Your Enemy: Understanding Cybercriminals and Nation-State Threat Actors Nov 14, 2024 * Cybersecurity Outlook 2025 Dec 5, 2024 More Events DISCOVER MORE WITH INFORMA TECH Black HatOmdia WORKING WITH US About UsAdvertiseReprints JOIN US Newsletter Sign-Up FOLLOW US Copyright © 2024 Informa PLC Informa UK Limited is a company registered in England and Wales with company number 1072954 whose registered office is 5 Howick Place, London, SW1P 1WG. Home|Cookie Policy|Privacy|Terms of Use Cookies Button ABOUT COOKIES ON THIS SITE We and our partners use cookies to enhance your website experience, learn how our site is used, offer personalised features, measure the effectiveness of our services, and tailor content and ads to your interests while you navigate on the web or interact with us across devices. By clicking "Continue" or continuing to browse our site you are agreeing to our and our partners use of cookies. For more information seePrivacy Policy CONTINUE COOKIE POLICY When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. More information Allow All MANAGE CONSENT PREFERENCES STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. PERFORMANCE COOKIES Always Active These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. FUNCTIONAL COOKIES Always Active These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. TARGETING COOKIES Always Active These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. Back Button COOKIE LIST Search Icon Filter Icon Clear checkbox label label Apply Cancel Consent Leg.Interest checkbox label label checkbox label label checkbox label label Confirm My Choices