Japan's Leading Mobile Service Provider Faces System Disruption Due to Cyberattack

Click to start listening
Japan's Leading Mobile Service Provider Faces System Disruption Due to Cyberattack

Tokyo, Jan 2 (NationPress) Japan's NTT Docomo Inc. announced on Thursday that it encountered a cyberattack resulting in a website failure and several service interruptions, according to local media reports. This incident comes on the heels of a wave of similar occurrences affecting significant firms across the country recently.

The nation's largest mobile service provider indicated that the system issue began at approximately 5:27 am local time, making it challenging to access services due to a distributed denial-of-service attack, where networks are inundated with data from numerous sources in a brief timeframe, as reported by Kyodo News.

Moreover, the search function for the “d payment” mobile payment service faced complications, although the company clarified that mobile phones and other communication services remained unaffected, according to Xinhua news agency.

Recently, a spate of system disruptions thought to be caused by similar attacks has impacted Japanese businesses.

Japan Airlines experienced a malfunction with its baggage check-in system on December 26, while MUFG Bank, Mizuho Bank, and Resona Bank reported issues with online transactions and other complications from late December through this past Wednesday.

Last week, Japan Airlines (JAL) disclosed that many of its operations were temporarily halted due to a network disruption that affected baggage check-ins and caused delays for over a dozen flights at various Japanese airports.

The airline ultimately had to disable the data transmission device responsible for the system failure.

JAL informed the police that it might have been targeted by a distributed denial-of-service (DDoS) attack, where networks are flooded with enormous volumes of data from multiple origins within a short span, as per investigative sources.

The company is actively working to counter the cyberattack and identify its origin.

The increasing reliance on complex and interconnected computer systems in various aspects of life significantly contributes to vulnerability to cyberattacks, as nearly all computer systems contain flaws that attackers can exploit.

While achieving a perfectly secure system is often unfeasible, numerous defense strategies exist to enhance a system's resilience against attacks, thereby making information security a field of growing significance in today's world.