Japanese government data stolen in Fujitsu hack
Hackers gained access to the data through Fujitsu's project management software


Hackers have gained access to Fujitsu's project management platform resulting in data leaks from various Japanese government offices, according to reports.
A spokesperson for Fujitsu confirmed to IT Pro that an unauthorised third-party gained access to its "Project WEB" platform, a collaboration and project management software used for Japanese-based projects.
"Fujitsu is currently conducting a thorough review of this incident, and we are in close consultation with the Japanese authorities," said the spokesperson. "As a precautionary measure, we have suspended use of this tool, and we have informed any potentially impacted customers."
The Ministry of Land, Infrastructure, Transport, and Tourism said a third party illegally accessed Fujitsu's software which resulted in the ministry suffering a data breach. At least 76,000 email addresses were exposed, including those belonging to individuals outside of the ministry that were registered on its mailing list. The ministry also confirmed that the ProjectWEB software has been taken down.
The stolen information is said to relate to its equipment systems, staff business email addresses, and information on its business relationships.
Japan's National Cyber Security Centre was also affected by the leak, which said that measures were being taken to prevent the spread of the damage. Local media has also reported that hackers accessed software at Narita Airport and stole data held by air traffic control systems, as reported by NHK.
Chief Cabinet Secretary Kato Katsunobu said on Wednesday that no damage to the Cabinet's cyber security centre's system had been confirmed.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
He added that cyber security must be tightened, as hackers could target the Tokyo Olympics and Paralympics, which are scheduled to take place in two months time.
Zach Marzouk is a former ITPro, CloudPro, and ChannelPro staff writer, covering topics like security, privacy, worker rights, and startups, primarily in the Asia Pacific and the US regions. Zach joined ITPro in 2017 where he was introduced to the world of B2B technology as a junior staff writer, before he returned to Argentina in 2018, working in communications and as a copywriter. In 2021, he made his way back to ITPro as a staff writer during the pandemic, before joining the world of freelance in 2022.
-
Third time lucky? Microsoft finally begins roll-out of controversial Recall feature
News The Windows Recall feature has been plagued by setbacks and backlash from security professionals
By Emma Woollacott Published
-
The UK government wants quantum technology out of the lab and in the hands of enterprises
News The UK government has unveiled plans to invest £121 million in quantum computing projects in an effort to drive real-world applications and adoption rates.
By Emma Woollacott Published
-
A strategic approach to security: Intelligent, collaborative, and efficient
whitepaper How your security fabric can address the challenges of new tech investment
By ITPro Published
-
Anticipate, prevent, and minimize the impact of business disruptions
Whitepaper Nine best practices for building operational resilience
By ITPro Published
-
Thwart cyberthreats fast with security operations + AI Ops
Whitepaper How automated collaboration saves the day
By ITPro Published
-
Three steps to transforming security operations
Whitepaper How to be more agile, effective, collaborative, and scalable
By ITPro Published
-
Top ten ways to anticipate, eliminate, and defeat cyber threats like a boss
Whitepaper Improve your cyber resilience and vulnerability management while speeding up response times
By ITPro Published
-
Automation antidotes for the top poisons in cyber security management
Whitepaper How orchestration and collaboration tools can provide a healthy defense against the most serious threats
By ITPro Published
-
A prudent approach to major security incidents
Whitepaper Establish an effective strategy across four phases
By ITPro Published
-
Cybercriminals are resilient. How about you?
Whitepaper Stay ahead of those agile bad actors
By ITPro Published