Nikkei Inc., the huge Japanese monetary information and media group and the proprietor of the Monetary Instances, made an announcement this week confirming a serious break-in to its networks.
The corporate, one of many world’s largest media firms, first found the incident in September after noticing uncommon logins to worker messaging accounts. This incident has, reportedly, led to the publicity of delicate, personal info belonging to over 17,000 individuals.
The Entry Level: A Stolen Slack Account
The entire incident began when an worker’s private laptop was contaminated with malware, permitting the attackers to steal login particulars. They used these compromised credentials as a direct gateway to realize unauthorised entry to Nikkei’s inner Slack workspace, the enterprise messaging platform utilized by its workers for day by day communication and coordination.
Upon investigation, Nikkei decided that the breach probably uncovered the names, e mail addresses, and chat histories of a complete of 17,368 people registered on the platform, together with workers and enterprise companions.
This sort of stolen knowledge, as we all know it, itself has change into a brand new type of leverage for criminals, more and more used to power funds by threatening to leak the information quite than simply locking up the corporate’s programs by way of ransomware assaults.
For example, in February 2024, the Change Healthcare assault concerned menace actors stealing the delicate knowledge of round 190 million people and demanding a large ransom cost to forestall its public launch.
Though Nikkei, recognized globally for its publications like The Nikkei newspaper and the extensively adopted Nikkei 225 inventory market index, has confirmed that no info associated to journalistic sources or reporting actions was compromised, the stolen info continues to be an issue.
Response and Danger Evaluation
Nikkei took fast motion, implementing password resets and different containment measures. Whereas Japanese regulation doesn’t strictly require disclosure for knowledge gathered for editorial functions, the corporate voluntarily knowledgeable the Private Data Safety Fee in Japan, given the incident’s significance and its dedication to transparency. The writer additionally issued a robust official assertion:
“No leakage of knowledge associated to sources or reporting actions has been confirmed. We take this incident significantly and can additional strengthen private info administration to forestall any recurrence,” the corporate said.
It’s value noting that this isn’t the primary safety situation for Nikkei; the corporate misplaced about $29 million in September 2019 as a result of a Enterprise Electronic mail Compromise (BEC) rip-off. As per Hackread.com’s report from 2019, this BEC rip-off concerned an worker being tricked by fraudsters impersonating an government into wiring the funds to a managed checking account.
This isn’t the primary time a information outlet from the Asia-Pacific (APAC) area has been focused by hackers. In June 2024, Tech in Asia, a know-how information platform masking startups and innovation throughout Asia, was breached, and the private knowledge of 221,470 customers was stolen and later leaked on-line.
Skilled commentary:
Mayank Kumar, Founding AI Engineer on the analysis agency DeepTempo, commented on the breach and shared his views with Hackread.com on why this assault was so efficient. Kumar said that the preliminary malware was solely a small transfer. The true goal was to steal legitimate login particulars, permitting the criminals to function unnoticed contained in the community and “mix seamlessly into regular enterprise actions.”
Kumar additional defined that “For a SIEM (safety info administration), the login was legitimate, so no rule would fireplace, however for an NDR (community detection response), the site visitors was encrypted, making payload inspection unimaginable.”
He added that the essential problem is now not simply stopping viruses, however recognizing when a certified consumer is performing an motion (like scraping 17,000 information) that’s essentially totally different from their regular exercise.

