Most observers attribute the attack, which leveraged VPN and Microsoft 365 security holes, to state actors working for China. Credit: Gorodenkoff / Shutterstock The Japan Aerospace Exploration Agency (JAXA) has updated details about its October 2023 data breach and has confirmed that those attacking JAXA leveraged VPN and Microsoft 365 security holes. But the update noted that the attackers had “used multiple unknown malwares, making it difficult to detect the unauthorized access.” JAXA also revealed that its cybersecurity defenses had not detected the attack during or after the incident, but that it learned of the assault “based on a notification from an external organization.” “The attacker likely exploited a vulnerability in a VPN device to gain the initial access to JAXA’s internal servers and computers. It is highly likely that the previously announced vulnerability was exploited,” the space agency said. “Some information—including personal information of JAXA employees—stored on the compromised JAXA servers and computers may have been breached.” The phrase “may have been” signals that JAXA officials are still not certain what was and was not accessed. The agency also shared a cryptic comment that “In the course of taking the above measures and strengthening monitoring, we have detected and responded to multiple unauthorized accesses to JAXA’s network since January of this year—including zero-day attacks—though no information was compromised,” the statement said, revealing that JAXA has been hit subsequent to the initial attack, but that the agency believes it successfully fought the subsequent attacks and prevented further data leakage. JAXA has not said who the attackers were, but most cybersecurity observers are pointing the finger at state actors working for China. “The fact that a space agency was targeted with a sophisticated complex attack indicates a state actor with goals to compromise data, not just gather intelligence or send a political message, with the lead suspect being a China affiliated cyber security private company of some sort,” said Irina Tsukerman, a geopolitical analyst and the president of Scarab Rising, a global strategy advisory firm. “Such an attack is likely the work of either a state-backed independent hacker, possibly part of an intelligence gathering gang, whose methods could potentially be analyzed and compared to prior such attacks, or it could be attributed to a private cybersecurity company, most likely affiliated with China, in which case prior incidents could be harder to detect. The most interesting detail was the description of the attack and the fact that the attacker used several different types of malware and nevertheless went undetected. It indicates an unusually persistent and planned long term attack with an unusual level of complexity and stealth.” Amiram Shachar, CEO at security vendor Upwind, said he found the particular pattern of this attack to be different than what he would have expected. “The most surprising thing about the attack is the fact the attacker managed to access M365 through the on-prem environment and not the other way around. We usually see attackers attack the cloud first,” Shachar said. He also saw a worrying pattern of leveraging security holes that will inevitably exist as enterprises transition from mostly on-prem to mostly cloud. “Although VPN exploitation is something eastern APTs are quite known for, this attack used shared data and services between two environments to create even more damage. Modern services are sharing resources between on-premises and public cloud environments, allowing attackers to find more creative ways to perform privileged escalations and lateral movements,” Shachar said. “This middle hybrid stage — when enterprises are transitioning slowly from on-prem servers to the cloud— is one of the most dangerous stages to be on as they are exposed to an even bigger range of risks in both environments.” More data breach news: Evolve data breach impacted upward of 7.64 million consumers Hackers steal data of 200k Lulu customers in an alleged breach OpenAI failed to report a major data breach in 2023 Related content feature Ransomware recovery: 8 steps to successfully restore from backup The best way to recover from a ransomware attack is to have a reliable and fast backup process. Here's how to do it. By Maria Korolov 02 Sep 2024 17 mins Ransomware Malware Backup and Recovery feature 15 infamous malware attacks: The first and the worst Whether by dumb luck or ruthless skill, these malware attacks left their mark on the internet. By Josh Fruhlinger and John Leyden 30 Aug 2024 16 mins Ransomware Cyberattacks Malware news Iranian threat actors targeting businesses and governments, CISA, Microsoft warn Pioneer Kitten and Peach Sandstorm both believed to be state sponsored. By Howard Solomon 29 Aug 2024 7 mins Ransomware Cyberattacks Malware news Tool used by ransomware groups now seen killing EDR: Report The Poortry/BurntCigar toolkit has added more ways for it to evade detection, evolved into something akin to a rootkit. By Howard Solomon 28 Aug 2024 4 mins Ransomware Malware PODCASTS VIDEOS RESOURCES EVENTS SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe