Breaking cybersecurity news, news analysis, commentary, and other content from around the world, with an initial focus on the Middle East & Africa.

Fujitsu Suffers Worm-Like Attack From Something That Wasn't Ransomware

The CE giant released its investigative findings regarding a March cyberattack that resulted in data exfiltration affecting its Japanese operations.

Tokyo Skyline and Tokyo Tower Japan Asian Cityscape
Source: Patrick Batchelder via Alamy Stock Photo

After months of postmortem investigation, Fujitsu now says the malware that affected its systems in a cyberattack last March was not ransomware as previously speculated — and noted that the binary self-propagated, worming its way through the company's internal networks in Japan.

In its rundown of the investigative findings this week, the consumer electronics and networking giant confirmed that the malware first established a beachhead on one of Fujitsu's business PCs, attacking from an external server (it didn't mention what the initial access method was). The malware was "particularly difficult to detect," according to Fujitsu, using sophisticated techniques to cloak itself as it replicated onto 49 other PCs within the network.

Only its Japanese footprint was affected.

"The affected computers were not managed through the cloud services provided by Fujitsu," the company noted in the advisory. "Additionally, no trace of access to the services provided by Fujitsu to customers was found. The investigation concluded that the damage did not spread outside of the company's business computers, including to customers' network environments."

Nonetheless, the attack resulted in data exfiltration, including files containing "personal or business-related information about certain customers."

The company said it has since beefed up its security measures, including implementing security monitoring rules for the unnamed malware to all business PCs, and enhancing virus detection software functions and updates.

About the Author(s)

Tara Seals, Managing Editor, News, Dark Reading

Tara Seals has 20+ years of experience as a journalist, analyst and editor in the cybersecurity, communications and technology space. Prior to Dark Reading, Tara was Editor in Chief at Threatpost, and prior to that, the North American news lead for Infosecurity Magazine. She also spent 13 years working for Informa (formerly Virgo Publishing), as executive editor and editor-in-chief at publications focused on both the service provider and the enterprise arenas. A Texas native, she holds a B.A. from Columbia University, lives in Western Massachusetts with her family and is on a never-ending quest for good Mexican food in the Northeast.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights