Rapid7, a leader in cloud risk and threat detection, today released a new cyber threat landscape report focused on Japan and its global business footprint.
Theย Rapid7 Japan Cyber Threat Landscape Reportย highlights Japanese businessesโ unique threat profile, which has led to an increase in instances of sensitive data loss and business disruption via ransomware. Rapid7 researchers observed for example that, as of late 2022 and early 2023, LockBit 3.0 ransomware operators were specifically targeting Japanese organisations โ particularly Japanese manufacturers. The prevalence of manufacturing within Japan makes it the leading target for ransomware groups and nation states, whereas healthcare is the most common target in other parts of the world.
โManufacturing organisations have a low tolerance for downtime or any other type of operational disruption, and ransomware operators know that makes them vulnerable to extortion,โ said Paul Prudhomme, Rapid7 principal security analyst and Japan Cyber Threat Landscape Report author.
โWhen a Japanese manufacturerโs operations are disrupted like this it can have supply chain implications worldwide, as many other manufacturers depend on supplies of Japanese components.โ
Risk of overseas entities
As the worldโs third largest economy, Japan is home to global corporations with complex networks of overseas operations in countries like Australia, that include subsidiaries, third-party suppliers, and other affiliates. In addition to its findings on ransomware, the report notes that many of the most recent compromises of Japanese companies began with unauthorised access to a subsidiary, at which point the attacker was able to move laterally into the parent companyโs network.
โAs the Japanese parent company brings new subsidiaries and affiliates into its fold, there are likely to be visibility issues that can inhibit proper risk management and mitigation,โ said Prudhomme.
According to Rob Dooley, Rapid7โs Vice President, Asia Pacific and Japan, it is common for cyber adversaries to pursue access to a company through a roundabout route.
โIsland hopping is growing in popularity with perpetrators โhoppingโ through a series of intermediary steps to achieve their end objectives. This includes indirectly targeting the intended victim organisation via the more vulnerable locations to undermine the parent companyโs cyber defences and gain access to their network,โ said Dooley.
โRapid7 recommends that Japanese businesses with extensive foreign operations, subsidiaries, or other holdings follow the specific steps outlined in the reportโs recommendations to reduce their risk to ransomware and other advanced cyber threats.โ
To access the complete Rapid7 Japan Cyber Threat Landscape Report and related resources, clickย here.
About Rapid7
Rapid7, Inc. (NASDAQ: RPD) is on a mission to create a safer digital world by making cybersecurity simpler and more accessible. We empower security professionals to manage a modern attack surface through our best-in-class technology, leading-edge research, and broad, strategic expertise. Rapid7โs comprehensive security solutions help more than 10,000 global customers unite cloud risk management and threat detection to reduce attack surfaces and eliminate threats with speed and precision. For more information, visit ourย website, check out ourย blog, or follow us onย LinkedInย orย Twitter.