Results of Investigation into Information Leakage, etc., Caused by Ransomware Attack
January 7, 2025
Casio Computer Co., Ltd. (hereafter “Casio”) announced on October 11, 2024 that Casio's servers were compromised by a ransomware attack. We deeply regret any inconvenience and concern this incident may cause to our customers and other concerned parties.
With the assistance of an external security specialist organization, Casio has been conducting a forensic investigation to identify the cause of this unauthorized access and to confirm the damage. Upon completion of the investigation as far as possible, Casio would like to report that some of its internal documents, including personal information, have been leaked. Details are as follows.
For the background to this case so far, please refer to "System Failure due to Unauthorized Access to Our Network" dated October 8, 2024 and "Notice of Partial Service Outage and Information Leak Caused by Ransomware Attack" dated October 11, 2024. If any new facts that should be announced found out, we will promptly announce them on the website.
1. Results of the investigation
- On October 5th, 2024, Casio's servers were illegally accessed from overseas, and several systems became unusable due to a ransomware attack. The investigation revealed that the cause of the incident was that, despite Casio's efforts to strengthen system security in response to the recent increase in cyberattacks, there were some deficiencies in the company's measures against phishing emails and its global network security system, including its overseas offices, it was unable to counter the cunning ransomware attacks from overseas.
- Casio confirmed that a part of the data of internal documents containing personal information was stolen and leaked as a result of the ransomware attack. It has confirmed that the leaked data includes the personal information listed in 2. Personal Information Confirmed to Have Been Leaked below.
- No evidence of data theft was found in the customer database or in the system that handles customers' personal information.
2. Personal information confirmed to have been leaked
As a result of the investigation, it was confirmed that some of the data stored for internal business use, such as internal documents, had been leaked, mainly from servers that had been attacked by ransomware.
It has been confirmed that the leaked internal documents contain personal information about our employees and also information about some of the business partners and customers.
Based on the results of the investigation, Casio is currently in the process of identifying the relevant business partners and customers, and will contact them individually as soon as they are identified. Casio will proactively take the necessary measures to protect the individual's privacy.
In addition, no credit card information was included in the leaked personal information.
Personal information confirmed to have been leaked | |
---|---|
Information on Casio employees, including temporary/contract employees, etc.
|
6,456 people
|
Personal information of Casio’s business partners
|
1,931 people
|
Personal information of customers
|
91 customers
|
Other information confirmed to have been leaked | |
|
* As previously announced, the CASIO ID and ClassPad.net service systems used for our applications and services are running on a different system from the server that was illegally accessed. Therefore, they are not affected with the incident caused by the unauthorized access.
* On December 3, 2024, a confirmation report was submitted to the Personal Information Protection Commission. Also, timely and necessary reports to overseas data protection supervisory authorities in accordance with applicable laws and regulations has been made.
* Following consultation with law enforcement agencies, outside counsel and security experts, Casio has not responded to any unreasonable demands from the ransomware group that carried out the unauthorized access.
If you have any other questions, please contact to the inquiry information below.
3. Preventive measures
- With the support and supervision of security specialist organization, Casio will continue to strengthen IT security for the entire group, including overseas offices.
- Casio will strive to prevent recurrence by reviewing its information management system and strengthening internal training to ensure thorough enforcement of rules.
4. Resumption of Service
As of this moment, with the exception of some individual services, Casio’s services, which had been suspended due to system failure, have resumed after confirming their safety.
We deeply regret for the inconvenience caused to its users for a long time.
5. Request for secondary damage prevention
To date, some employees have reported receiving unsolicited spam emails that may be related to this incident of unauthorized access. These spam emails were sent to Casio employees, and at this time there have been no reports of such secondary damage to business partners or customers.
To protect the privacy and safety of those involved and prevent secondary damage, please refrain from spreading information via social media and other means. Your cooperation will be greatly appreciated.
Casio will work in close cooperation with the police to take strict action in cases of any unsolicited email or related fake information being sent out, or any slanderous, libelous, or other unwanted actions against the people who were the relevant to the leaked information, or any employee of or any of its business partners.
Casio will sincerely implement the above measures to prevent the recurrence of such a situation, and will make daily improvements to provide reliable products and services to customers, business partners, and other related parties, and to be a company that its employees and related parties can work together with a sense of security.
Casio would like to reiterate its deepest apologies to all parties involved for any inconvenience caused.
For inquiries, please contact
Customer Service : (e-mail) cs-enquiry@casio.co.jp
Please note that it may take time to respond to individual inquiries.