Reports have surfaced indicating that a hacking group specializing in ransomware has breached Fujitsu Servers’ computer network, purportedly stealing sensitive data. Details remain sparse, pending the conclusion of a thorough investigation by the IT company.

While Fujitsu has yet to identify the specific criminal group responsible, they’ve acknowledged the incident as the work of a file-encrypting malware syndicate, currently under scrutiny to assess the extent of financial losses incurred.

Mitigation efforts are underway to mitigate risks, with IT teams working around the clock to minimize the fallout.

Typically, victims of data theft by hackers find themselves in a precarious position, with no assurance that their personal information will be promptly deleted even upon ransom payment.

In light of this, both the NCSC and FBI are strongly advising against ransom payments. Instead, they urge victims to share any pertinent information to aid law enforcement in apprehending the perpetrators and dismantling their cyber infrastructure.

Similar scenarios have unfolded with other ransomware groups like Conti, LockBit, AlphaV/BlackCat, and Hive, demonstrating a concerning trend where criminals leverage critical data leaks or coercive tactics to rebuild their networks or evade law enforcement.

Compounding the issue, many ransomware victims opt to pay due to cost constraints on recovery efforts or a lack of expertise in handling such situations.

The post Ransomware attack on Fujitsu Servers appeared first on Cybersecurity Insiders.

Fujitsu, a Japanese multinational company specializing in software and technology services, has issued an apology in response to the IT scandal that unfolded within the UK Post Office. The company is currently facing allegations that its IT staff, tasked with serving the Post Offices in the United Kingdom, had unauthorized access to manipulate databases, raising serious privacy concerns among the British public.

Investigations into the Post Office IT scandal have revealed that the Fujitsu Software Support Centre (SSC) had privileged access to servers storing user information from August 2002 until 2023. The lack of IT service audits during this period allowed the access to persist, resulting in potential financial fraud, data errors leading to service disruptions, and overall violations of data protection regulations. Consequently, this issue has become a prominent and widely discussed topic across the UK.

John Simpkins, a spokesperson for SSC, acknowledged that the software giant indeed had unrestricted access to the systems as part of a technology contract. However, he refuted claims that the staff committed financial fraud, manipulated transactions on Horizon POS machines, or engaged in data theft for illicit purposes.

The Business and Trade Committee’s selected MPs are set to question Paul Patterson, Chief of Fujitsu European Division, on Thursday. The aim is to determine whether Post Office branch managers could face prosecution for alleged data theft and manipulation of account software.

For those unfamiliar with the background, Fujitsu has been providing digitalization and IT services to Post Offices across the UK since 1996, securing a Horizon contract from the government in 1999. Prior to Fujitsu, the British company ICL was responsible for delivering related services to the government organization.

Further updates on this unfolding situation will be provided shortly.

The post Fujitsu issues apology for IT and Data Privacy scandal of UK Post Offices appeared first on Cybersecurity Insiders.

Japan government has pressed a pause button on all its future deals with Fujitsu Cloud as the latter has failed to curb network misconfigurations that could have led to data leaks.
 
Going by the details, Fujitsu operates a cloud named FENICS that is used by government agen-cies and large corporate clients for storing sensitive data. In February 2023, the cloud service provider admitted that some of the data from FENICS could have reached the hands of hackers and investigations was being conducted to estimate the impact.

The Japanese tech giant issued a statement that it will submit a detailed report to Ministry of Internal Affairs and Communications on the issue and it did as it said in April 2022.

Since, the government lost trust in FENICS, as it couldn’t justify its data protection and reme-diation practices, the government of the island country of East Asia decided to suspend its data storage agreements at an immediate effect on all new deals.

NEXT is the news related to Nickelodeon, a pay TV online channel that targets mostly chil-dren as its audiences. The Paramount owned company has suddenly hit the news headlines for a data breach that appears to be of decades old info accounting to 500GB of docs and media files.

According to a reddit post made by an ethical hacker, the data leak of Nickelodeon appears to be the data stolen in January this year. It is unclear why the hacker who siphoned the data then, has released it on to the web now.

The TV channel spokesperson assured that the leaked data doesn’t contain any sensitive info of employees and is only related to program resources that have been archived long back.

The post Fujitsu Cloud Security rebuked by Japan and Nickelodeon Data Breach appeared first on Cybersecurity Insiders.