top of page

Tech Giant Fujitsu Suffers a Cyber Attack

  • Writer: Reef Noor
    Reef Noor
  • Mar 19, 2024
  • 1 min read

Japanese tech giant Fujitsu detected malware infections in its systems, with customer data theft.


Fujitsu, the world's sixth-largest IT services provider, employs 124,000 people, generating $23.9 billion in annual revenue. Its diverse portfolio includes computing products, software, telecommunications equipment, and services like cloud solutions and IT consulting. With a global presence spanning over 100 countries, Fujitsu collaborates extensively with the Japanese government on public sector and R&D projects, contributing significantly to national security.



Fujitsu Corporate Headquarters

Fujitsu disclosed a significant cybersecurity incident last week, revealing compromised systems and customer data. Malware was found on business computers, leading to potential unauthorized access to personal and customer information. Fujitsu promptly isolated affected computers and heightened monitoring. Investigations continue into the malware's entry and data exfiltration. The company has informed regulatory authorities and is preparing individual notices for affected customers.


Fujitsu 2021 Cyber Attack


This incident follows a hack in May 2021 involving Fujitsu's ProjectWEB tool, resulting in unauthorized access to government offices and data theft. Vulnerabilities in ProjectWEB led to the breach, prompting its replacement with a more secure information-sharing tool.




Key takeaways for your business:


  1. Invest in cybersecurity: Protect your business and customer data from cyber threats.

  2. Respond quickly: Act fast if you detect any security issues to prevent further damage.

  3. Stay compliant: Follow data protection regulations and report breaches promptly.

  4. Educate your team: Provide cybersecurity training to your employees to help them recognize and respond to potential threats effectively.

  5. Learn and improve: Analyze past incidents to strengthen your cybersecurity measures and prevent future breaches.



Complementary Introduction Meeting
30
Book Now



bottom of page