autotldr@lemmings.world
on 11 Jul 2024 12:10
collapse
This is the best summary I could come up with:
The company has now concluded its investigation into the attack after previously announcing a “possible” data leak in March.
Despite initially downplaying the likelihood of data theft, Fujitsu confirmed on Tuesday that affected individuals had been directly notified.
“This malware was not ransomware, but rather a type of attack that used advanced techniques, such as disguising itself in various ways to make it difficult to detect,” Fujitsu said.
All of the infected machines were isolated from the network after the malicious activity was detected and connections to external servers blocked, it said.
Fujitsu brought in outside experts to help with its investigation, which involved analyzing communication and operation logs, it said, which is where it found evidence of the malware executing copying commands on various files.
Fujitsu didn’t comment on the scale of the data theft, but given that notifications have been sent directly to affected individuals, per Japan’s data protection laws, the attack must have met at least one of the following conditions set by the country’s Personal information Protection Commission (PPC):
The original article contains 405 words, the summary contains 173 words. Saved 57%. I’m a bot and I’m open source!
threaded - newest
This is the best summary I could come up with:
The company has now concluded its investigation into the attack after previously announcing a “possible” data leak in March.
Despite initially downplaying the likelihood of data theft, Fujitsu confirmed on Tuesday that affected individuals had been directly notified.
“This malware was not ransomware, but rather a type of attack that used advanced techniques, such as disguising itself in various ways to make it difficult to detect,” Fujitsu said.
All of the infected machines were isolated from the network after the malicious activity was detected and connections to external servers blocked, it said.
Fujitsu brought in outside experts to help with its investigation, which involved analyzing communication and operation logs, it said, which is where it found evidence of the malware executing copying commands on various files.
Fujitsu didn’t comment on the scale of the data theft, but given that notifications have been sent directly to affected individuals, per Japan’s data protection laws, the attack must have met at least one of the following conditions set by the country’s Personal information Protection Commission (PPC):
The original article contains 405 words, the summary contains 173 words. Saved 57%. I’m a bot and I’m open source!