Feeds

Japanese boffins fear virus nicked spacecraft blueprints

Tokyo, we have a problem

5 things you didn’t know about cloud backup

Japanese space engineers have admitted one of their computers has been infected by a Trojan that may have leaked sensitive data, including system login information, to hackers.

The breach also exposed blueprints stored in the attacked terminal, according to a statement by the Japanese Aerospace Exploration Agency (JAXA). Information potentially divulged by the malware includes data related to the H-II cargo transfer vehicle that is used to ferry equipment to the International Space Station.

The infected computer was removed from the agency's network as soon as a red flag was raised over its erratic behaviour last August. Subsequent analysis revealed evidence of a virus infection. The machine was "cleaned up" before it was returned to use.

The same computer began playing up again earlier this month. A subsequent - and more thorough - investigation revealed the presence of a different species of malware. Logs revealed that data was extracted from the compromised machine between early July 2011 and 11 August 2011, or around a month before malware infection was first detected.

Data exposed by the breach may have included emails, technical specifications and operational information as well as login credentials. The space agency has reset potentially exposed passwords while it continues to investigate the scope of the breach.

The attack on JAXA follows a run of similar cyber-assaults against the Japanese government and industrial giants. Last September Mitsubishi Heavy Industries acknowledged that it had become the victim of the most high-profile of these cyber-attacks. The Japanese parliament confirmed it had been hit by another assault in October. Both attacks were blamed on Chinese hackers. ®

Build a business case: developing custom apps

More from The Register

next story
Boffins ID freakish spine-smothered prehistoric critter: The CLAW gave it away
Bizarre-looking creature actually related to velvet worms
ANU boffins demo 'tractor beam' in water
The current state of the art, apparently
China to test recoverable moon orbiter
I'll have some rocks and a moon cheese pizza please, home delivery
NASA's rock'n'roll shock: ROLLING STONE FOUND ON MARS
No sign of Ziggy Stardust and his band
What does a flashmob of 1,024 robots look like? Just like this
Sorry, Harvard, did you say kilobots or KILLER BOTS?
Why your mum was WRONG about whiffy tattooed people
They're a future source of RENEWABLE ENERGY
Vulture 2 spaceplane autopilot brain surgery a total success
LOHAN slips into some sexy bespoke mission parameters
Another step forward for diamond-based quantum computers
Square cut or pear-shaped, these qubits don't lose their shape
LOHAN acquires aircraft arboreal avoidance algorithm acronyms
Is that an ARMADILLO in your PANTS or are you just pleased to see me?
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.