Feeds

Japanese boffins fear virus nicked spacecraft blueprints

Tokyo, we have a problem

Beginner's guide to SSL certificates

Japanese space engineers have admitted one of their computers has been infected by a Trojan that may have leaked sensitive data, including system login information, to hackers.

The breach also exposed blueprints stored in the attacked terminal, according to a statement by the Japanese Aerospace Exploration Agency (JAXA). Information potentially divulged by the malware includes data related to the H-II cargo transfer vehicle that is used to ferry equipment to the International Space Station.

The infected computer was removed from the agency's network as soon as a red flag was raised over its erratic behaviour last August. Subsequent analysis revealed evidence of a virus infection. The machine was "cleaned up" before it was returned to use.

The same computer began playing up again earlier this month. A subsequent - and more thorough - investigation revealed the presence of a different species of malware. Logs revealed that data was extracted from the compromised machine between early July 2011 and 11 August 2011, or around a month before malware infection was first detected.

Data exposed by the breach may have included emails, technical specifications and operational information as well as login credentials. The space agency has reset potentially exposed passwords while it continues to investigate the scope of the breach.

The attack on JAXA follows a run of similar cyber-assaults against the Japanese government and industrial giants. Last September Mitsubishi Heavy Industries acknowledged that it had become the victim of the most high-profile of these cyber-attacks. The Japanese parliament confirmed it had been hit by another assault in October. Both attacks were blamed on Chinese hackers. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Antarctic ice THICKER than first feared – penguin-bot boffins
Robo-sub scans freezing waters, rocks warming models
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Your PHONE is slowly KILLING YOU
Doctors find new Digitillnesses - 'text neck' and 'telepressure'
Reuse the Force, Luke: SpaceX's Elon Musk reveals X-WING designs
And a floating carrier for recyclable rockets
NASA launches new climate model at SC14
75 days of supercomputing later ...
Britain's HUMAN DNA-strewing Moon mission rakes in £200k
3 days, and Kickstarter moves lander 37% nearer takeoff
prev story

Whitepapers

Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.