TFIGlobal
TFIGlobal
TFIPOST English
TFIPOST हिन्दी
No Result
View All Result
  • Indo-Pacific
  • Americas
  • Canada
  • Indian Subcontinent
  • West Asia
  • Europe
  • Africa
  • The Caribbean
TFIGlobal
  • Indo-Pacific
  • Americas
  • Canada
  • Indian Subcontinent
  • West Asia
  • Europe
  • Africa
  • The Caribbean
No Result
View All Result
TFIGlobal
TFIGlobal
No Result
View All Result
  • Indo-Pacific
  • Americas
  • Canada
  • Indian Subcontinent
  • West Asia
  • Europe
  • Africa
  • The Caribbean

For the first time in history, the Japanese Police Chief names and shames China over cyberattacks

Sohil Sinha by Sohil Sinha
May 17, 2021
in Indo-Pacific
Japan, China, Cyberattack
Share on FacebookShare on X

The National Public Safety Commission’s weekly news conference, which is usually a dull affair, created a stir recently in the global cybersecurity community after Japanese Police Chief Mitsuhiro Matsumoto officially named China as the perpetrator of a cyberattack on Japan.

While Tokyo has earlier refused to name and shame China for the atrocious cyber attacks in the past, but in recent months Tokyo has upped the ante. This time, and also for the first time, Japan has explicitly blamed China for the attack. By doing so, it has put immense pressure on Beijing.

Also Read

US – China trade deal brings reprieve in the escalating tariff war

How US vs Russia, China clash is damaging global cybersecurity?

Putin’s show of strength, as global leaders gather for Victory Day Parade

The National Police Agency has been inundated with questions about the allegation from international governments and media outlets. The Tokyo Metropolitan Police Department filed a lawsuit against a Chinese systems engineer, who is also a member of the Chinese Communist Party, two days before the April 22 news conference, for allegedly participating in cyberattacks against the Japan Aerospace Exploration Agency (JAXA) and 200 other Japanese companies and research institutions in 2016 and 2017.

According to Tokyo police, the perpetrator, who has already fled Japan, used a false ID to register a web server in the country for cyberattacks against JAXA, and that China’s People’s Liberation Army was likely involved in the massive cyberattack.

During the press conference, Matsumoto, the police commissioner-general, said that the attacks were carried out by a Chinese hacker group known as Tick. “It’s highly likely that cyber espionage was carried out by the PLA’s Unit 61419, a strategic support unit based in the Chinese city of Qingdao in Shandong Province.”

Cyber attribution, the process of tracking and eventually identifying the source of cyberattacks, is a difficult and time-consuming job, particularly when nations are involved. It necessitates several levels of technological and strategic investigation. This crucial move, which is carried out to formulate a national response to attacks, necessitates painstaking work by security analysts to gather shards of evidence and create detailed timelines.

Even if efforts are effective in detecting bad actors, whether governments or groups, the perpetrators seldom accept responsibility for their actions. Beijing has categorically refuted Japan’s claims about the JAXA attacks. “China is strongly opposed to any nation or organisation [using accusations of] cyberattacks to throw mud at China,” Chinese Foreign Ministry spokesperson Wang Wenbin said.

Even in the presence of incorruptible facts, bringing culpable foreign nationals working abroad to justice is unlikely. However, this does not negate the importance of cyber attribution. Since it is not a formal criminal procedure, it allows a government to show its cybersecurity capabilities without revealing confidential investigative details or providing court-worthy proof. Cyber attribution can be used to “name and shame” suspected criminals in the hopes of deterring further attacks, or it can be used to pave the legal groundwork for penalties against them.

The Japan Pension Service was struck by a cyberattack in 2015, resulting in a major data breach that exposed over 1 million names and pension identification numbers, some of which included birthdates and addresses. The attack was investigated by Tokyo Metropolitan Police, who looked into the malware used and where the data was sent. The investigation uncovered evidence that servers in China were used. However, since there was no definitive evidence that Beijing was behind the attack, Tokyo refrained from saying it was state-sponsored.

Better forensics by Tokyo police this time gave the Japanese government the green light to blame Beijing. The cops found a mysterious server and started tracking it, eventually discovering a cyberattack on JAXA. It was discovered that the intruder was attempting to exploit a flaw in the space agency’s security programme, and it urged businesses facing similar threats to take preventive steps. The department then tracked down and interrogated the Chinese man who had leased the server.

Japan has increased the pressure on Beijing, whether it be over the Senkaku islands, the issue of Xinjiang, or Taiwan. By explicitly naming China, Japan has given resolve to the fact that China does take part in these atrocious cyber attacks all around the world.

Tags: ChinaJapan
ShareTweetSend
Sohil Sinha

Sohil Sinha

Also Read

Turmoil in Philippines continues as the Duterte and Marcos families battle it out in the elections

Turmoil in Philippines continues as the Duterte and Marcos families battle it out in the elections

May 15, 2025
North Korea successfully test-fires surface-to-air missile

North Korea successfully test-fires surface-to-air missile, as South Korea and the United States conduct joint military drills

March 22, 2025
A New Alliance in Making, Philippines invites India to Join 'Squad'

Philippines invites India and South Korea to Join ‘Squad’ to deter Chinese Influence in its region

March 21, 2025
China Response to US Accusations on Fentanyl Trade

“US should say thank you”: China Rejects US Accusations on Fentanyl Trade

March 13, 2025
Chinese experimented how to destroy Starlink satelite in is orbit

China readies tech to blow up Musk’s Starlink satellites

January 16, 2025
China Unveils Aspiring Plan for Space-Based Solar Power Stations

China unveils ambitious plans for space-based solar power station

January 13, 2025
Youtube Twitter Facebook
TFIGlobalTFIGlobal
Right Arm. Round the World. FAST.
  • About Us
  • Contact Us
  • TFIPOST – English
  • TFIPOST हिन्दी
  • Careers
  • Brand Partnerships
  • Terms of use
  • Privacy Policy

©2025 - TFI MEDIA PRIVATE LIMITED

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Indo-Pacific
  • Americas
  • Canada
  • Indian Subcontinent
  • West Asia
  • Europe
  • Africa
  • The Caribbean
TFIPOST English
TFIPOST हिन्दी

©2025 - TFI MEDIA PRIVATE LIMITED

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. View our Privacy and Cookie Policy.