Trojan found on Japanese government computers

Parliament in Japan has been rocked after malware was found on three computers and a server, possibly compromising usernames and passwords used access internal documents and emails.

Data from 480 of Japan's Lower House members was reported by local media to have been compromised, but investigators had not found evidence it was stolen. The trojan has been linked to a command-and-control server based in China, Ashai Japan Watch reported.

The infection lasted for at least a month, until August, and began after a member had opened a malicious email attachment . Security software failed to stop the trojan from downloading additional "data stealing" software.

A Lower House committee held a meeting this week to investigate the incident. Chief Cabinet Secretary Osamu Fujimura said the government would take "all possible measures" to improve security, Ashai reported.

In response, members were asked to change passwords ahead of the normal three-month cycle. Ashai sources said hackers were able to access data using stolen credentials "without leaving any trace of illegal access."

Lawmakers use the computers to email government agencies and other Parliament members. The machines also store personal information about support groups, political accounting, and donations.

The attack comes on the heels of a malware infection that spread through machines owned by Japan's biggest defense contractor and Boeing partner Mitsubishi Heavy Industries. In that case, the company detected up to eight different instances of malware, including trojans and keyloggers, in factories used to manufacture submarines, missiles and nuclear power plant components.

Sign up to our newsletters

More in News

House Intelligence Committee OKs amended version of controversial CISPA

Despite the 18-to-2 vote in favor of the bill proposal, privacy advocates likely will not be satisfied, considering two key amendments reportedly were shot down.

Judge rules hospital can ask ISP for help in ID'ing alleged hackers

The case stems from two incidents where at least one individual is accused of accessing the hospital's network to spread "defamatory" messages to employees.

Three LulzSec members plead guilty in London

Ryan Ackroyd, 26; Jake Davis, 20; and Mustafa al-Bassam, 18, who was not named until now because of his age, all admitted their involvement in the hacktivist gang's attack spree.