{"id":35106,"date":"2020-05-21T15:58:06","date_gmt":"2020-05-21T15:58:06","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/31232\/Mitsubishi-Hack-May-Have-Disclosed-Prototype-Missile-Info.html"},"modified":"2020-05-21T15:58:06","modified_gmt":"2020-05-21T15:58:06","slug":"mitsubishi-hack-may-have-disclosed-prototype-missile-info","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/mitsubishi-hack-may-have-disclosed-prototype-missile-info\/","title":{"rendered":"Mitsubishi Hack May Have Disclosed Prototype Missile Info"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/zdnet3.cbsistatic.com\/hub\/i\/r\/2020\/05\/21\/ed621bb5-1f0f-4f76-a3db-26f125b6e427\/thumbnail\/770x578\/ab5a164f44d2076097c4c05ba697a1c3\/mis.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Japan has launched an investigation into the potential exposure of&nbsp;confidential missile data in the wake of a cyberattack on Mitsubishi Electric Corp.<\/p>\n<p>According to the <a href=\"https:\/\/apnews.com\/2e85904379adc4fa30ebc6aba3eb4d55\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Associated Press<\/a>, the leak of information relating to a prototype, &#8220;cutting-edge&#8221; missile is suspected.&nbsp;<\/p>\n<p>The missile, a speed glider known as HGV, was documented in files Mitsubishi and other manufacturers held as part of a bidding process. It has been reported by local news outlets that Mitsubishi did not win the bid.&nbsp;<\/p>\n<p><strong>See also:&nbsp;<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/verizons-data-breach-report-highlights-how-unsecured-cloud-storage-opens-door-to-attacks\/\" target=\"_blank\" rel=\"noopener noreferrer\">Verizon&#8217;s data breach report highlights how unsecured cloud storage opens door to attacks<\/a><\/p>\n<p>&nbsp;It is possible the missiles could have been deployed as a deterrent to Japan&#8217;s more remote islands &#8212; an area of contention considering China&#8217;s increased <a href=\"https:\/\/www.washingtonpost.com\/world\/asia_pacific\/japan-builds-an-island-wall-to-counter-chinas-intensifying-military-territorial-incursions\/2019\/08\/20\/802bc282-ae11-11e9-9411-a608f9d0c2d3_story.html\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">military presence<\/a> in the region.&nbsp;<\/p>\n<p>Chief Cabinet Secretary Yoshihide Suga said that Japan&#8217;s Defense Ministry is analyzing the &#8220;possible impact of the information leak on national security.&#8221;<\/p>\n<p>The cyberattack took place on June 28, 2019, but was only made public this year. The Japanese tech giant said approximately 200MB in files were stolen, but this was thought to primarily relate to members of staff.&nbsp;<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p><strong>CNET:&nbsp;<\/strong><a href=\"https:\/\/www.cnet.com\/how-to\/iphones-face-id-now-unlocks-faster-when-you-wear-a-face-mask-heres-what-to-do\/?ftag=CMG-01-10aaa1b\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">iPhone&#8217;s Face ID now unlocks faster when you wear a face mask. Here&#8217;s what to do<\/a><\/p>\n<p>Mitsubishi acknowledged the cyberattack and the potential theft of data belonging to roughly 8,000 individuals. In addition, the company informed the Defense Ministry of the potential exposure of sensitive information. The investigation is ongoing.<\/p>\n<p>ZDNet <a href=\"https:\/\/www.zdnet.com\/article\/trend-micro-antivirus-zero-day-used-in-mitsubishi-electric-hack\" target=\"_blank\" rel=\"noopener noreferrer\">previously learned<\/a> that the intrusion was made possible through the use of a zero-day vulnerability in Trend Micro OfficeScan antivirus software. The vulnerability has since been patched.&nbsp;<\/p>\n<p>A Chinese cyberespionage group known as Tick &#8212; or Bronze Butler &#8212; <a href=\"https:\/\/www.zdnet.com\/article\/mitsubishi-electric-discloses-security-breach-china-is-main-suspect\/\" target=\"_blank\" rel=\"noopener noreferrer\">has been blamed<\/a> for the attack.&nbsp;<\/p>\n<p><strong>TechRepublic:&nbsp;<\/strong><a href=\"https:\/\/www.techrepublic.com\/article\/how-healthcare-organizations-can-combat-cyberattacks-during-the-coronavirus\/?ftag=CMG-01-10aaa1b\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">How healthcare organizations can combat cyberattacks during the coronavirus<\/a><\/p>\n<p>While exploiting a zero-day vulnerability was potentially the key to pulling off this cyberattack, there are other methods that are far more common in security incidents today. According to Verizon&#8217;s 2020 <a href=\"https:\/\/www.zdnet.com\/article\/verizons-data-breach-report-highlights-how-unsecured-cloud-storage-opens-door-to-attacks\/\" target=\"_blank\" rel=\"noopener noreferrer\">Data Breach Investigation Report<\/a>, unsecured cloud storage, the use of stolen credentials, and phishing attacks are often the attack vectors involved in modern data breaches.&nbsp;<\/p>\n<p>ZDNet has reached out to Mitsubishi with additional queries and will update when we hear back.&nbsp;<\/p>\n<h3>Previous and related coverage<\/h3>\n<hr>\n<p><strong>Have a tip?<\/strong> Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0<\/p>\n<hr>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/31232\/Mitsubishi-Hack-May-Have-Disclosed-Prototype-Missile-Info.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":35107,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[8666],"class_list":["post-35106","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackerdata-losscyberwarjapan"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Mitsubishi Hack May Have Disclosed Prototype Missile Info 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/mitsubishi-hack-may-have-disclosed-prototype-missile-info\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mitsubishi Hack May Have Disclosed Prototype Missile Info 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/mitsubishi-hack-may-have-disclosed-prototype-missile-info\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-21T15:58:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/mitsubishi-hack-may-have-disclosed-prototype-missile-info.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"578\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mitsubishi-hack-may-have-disclosed-prototype-missile-info\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mitsubishi-hack-may-have-disclosed-prototype-missile-info\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Mitsubishi Hack May Have Disclosed Prototype Missile Info\",\"datePublished\":\"2020-05-21T15:58:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mitsubishi-hack-may-have-disclosed-prototype-missile-info\\\/\"},\"wordCount\":408,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mitsubishi-hack-may-have-disclosed-prototype-missile-info\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/mitsubishi-hack-may-have-disclosed-prototype-missile-info.jpg\",\"keywords\":[\"headline,hacker,data loss,cyberwar,japan\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mitsubishi-hack-may-have-disclosed-prototype-missile-info\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mitsubishi-hack-may-have-disclosed-prototype-missile-info\\\/\",\"name\":\"Mitsubishi Hack May Have Disclosed Prototype Missile Info 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mitsubishi-hack-may-have-disclosed-prototype-missile-info\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mitsubishi-hack-may-have-disclosed-prototype-missile-info\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/mitsubishi-hack-may-have-disclosed-prototype-missile-info.jpg\",\"datePublished\":\"2020-05-21T15:58:06+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mitsubishi-hack-may-have-disclosed-prototype-missile-info\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mitsubishi-hack-may-have-disclosed-prototype-missile-info\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mitsubishi-hack-may-have-disclosed-prototype-missile-info\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/mitsubishi-hack-may-have-disclosed-prototype-missile-info.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/mitsubishi-hack-may-have-disclosed-prototype-missile-info.jpg\",\"width\":770,\"height\":578},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mitsubishi-hack-may-have-disclosed-prototype-missile-info\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,data loss,cyberwar,japan\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackerdata-losscyberwarjapan\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Mitsubishi Hack May Have Disclosed Prototype Missile Info\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mitsubishi Hack May Have Disclosed Prototype Missile Info 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/mitsubishi-hack-may-have-disclosed-prototype-missile-info\/","og_locale":"en_US","og_type":"article","og_title":"Mitsubishi Hack May Have Disclosed Prototype Missile Info 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/mitsubishi-hack-may-have-disclosed-prototype-missile-info\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-05-21T15:58:06+00:00","og_image":[{"width":770,"height":578,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/mitsubishi-hack-may-have-disclosed-prototype-missile-info.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/mitsubishi-hack-may-have-disclosed-prototype-missile-info\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/mitsubishi-hack-may-have-disclosed-prototype-missile-info\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Mitsubishi Hack May Have Disclosed Prototype Missile Info","datePublished":"2020-05-21T15:58:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/mitsubishi-hack-may-have-disclosed-prototype-missile-info\/"},"wordCount":408,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/mitsubishi-hack-may-have-disclosed-prototype-missile-info\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/mitsubishi-hack-may-have-disclosed-prototype-missile-info.jpg","keywords":["headline,hacker,data loss,cyberwar,japan"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/mitsubishi-hack-may-have-disclosed-prototype-missile-info\/","url":"https:\/\/www.threatshub.org\/blog\/mitsubishi-hack-may-have-disclosed-prototype-missile-info\/","name":"Mitsubishi Hack May Have Disclosed Prototype Missile Info 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/mitsubishi-hack-may-have-disclosed-prototype-missile-info\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/mitsubishi-hack-may-have-disclosed-prototype-missile-info\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/mitsubishi-hack-may-have-disclosed-prototype-missile-info.jpg","datePublished":"2020-05-21T15:58:06+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/mitsubishi-hack-may-have-disclosed-prototype-missile-info\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/mitsubishi-hack-may-have-disclosed-prototype-missile-info\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/mitsubishi-hack-may-have-disclosed-prototype-missile-info\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/mitsubishi-hack-may-have-disclosed-prototype-missile-info.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/mitsubishi-hack-may-have-disclosed-prototype-missile-info.jpg","width":770,"height":578},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/mitsubishi-hack-may-have-disclosed-prototype-missile-info\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,data loss,cyberwar,japan","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerdata-losscyberwarjapan\/"},{"@type":"ListItem","position":3,"name":"Mitsubishi Hack May Have Disclosed Prototype Missile Info"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/35106","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=35106"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/35106\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/35107"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=35106"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=35106"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=35106"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}