Feeds

Chinese hacktivists launch cyber attack on Japan

Government sites sink in dispute over islands

Internet Security Threat Report 2014

Chinese hackers have taken up cyber arms and followed up widespread anti-Japan protests in the People’s Republic over a set of disputed islands by attacking at least 19 Japanese government and other web sites.

Japan’s National Police Agency (NPA) revealed that 11 of the 19 sites, including those of the Defence Ministry and Internal Affairs and Communications Ministry, appeared to have been hit by Distributed Denial of Service attacks, Kyodo reported.

The remainder, including those of the Supreme Court and the Tokyo Institute of Technology, were defaced with pictures of the Chinese flag.

The web sites of banking, utilities and other private companies were also hit, although most now appear to be back up and running as normal.

Things got even worse for the the Tokyo Institute of Technology, whose site was defaced endured an attack that saw names and telephone numbers of over 1,000 members of staff leaked.

The NPA confirmed to AFP that 300 Japanese web sites were short-listed for attack on a message board of Chinese hacktivist group Honker Union, while around 4,000 individuals had posted messages about planned attacks on Chinese chat site YY Chat.

The dispute over the Diaoyu islands, or Senkaku as they’re known in Japan, intensified last week when the Tokyo decided to buy them from the Japanese family who had owned them for the past 100+ years. The uninhabited islands have only been actively claimed by China and Taiwan until the late 1960s when it was discovered they may house oil deposits.

The protests took a turn for the ugly earlier this week given 18 September marks the day of the Mukden, or Manchurian, Incident of 1931, which led to the Japanese invasion of China. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Home Office: Fancy flogging us some SECRET SPY GEAR?
If you do, tell NOBODY what it's for or how it works
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Syrian Electronic Army in news site 'hack' POP-UP MAYHEM
Gigya redirect exploit blamed for pop-rageous ploy
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.