{"id":47272,"date":"2022-06-27T10:44:06","date_gmt":"2022-06-27T10:44:06","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/contractor-loses-entire-japanese-citys-personal-data-in-usb-fail\/"},"modified":"2022-06-27T10:44:06","modified_gmt":"2022-06-27T10:44:06","slug":"contractor-loses-entire-japanese-citys-personal-data-in-usb-fail","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/contractor-loses-entire-japanese-citys-personal-data-in-usb-fail\/","title":{"rendered":"Contractor loses entire Japanese city&#8217;s personal data in USB fail"},"content":{"rendered":"<p><span class=\"label\">In brief<\/span> A Japanese contractor working in the city of Amagasaki, near Osaka, reportedly mislaid a USB drive containing personal data on the metropolis&#8217;s 460,000 residents.<\/p>\n<div class=\"CaptionedImage Center Border\" readability=\"7\"><a href=\"https:\/\/regmedia.co.uk\/2022\/06\/27\/shutterstock_amagasaki.jpg\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2022\/06\/27\/shutterstock_amagasaki.jpg?x=648&amp;y=486&amp;infer_y=1\" alt=\" The lock, 17 m wide, having 4 sector gates was designed to protect Amagasaki area with the same elevation of sea level\" title=\"The lock, 17 m wide, having 4 sector gates was designed to protect Amagasaki area with the same elevation of sea level\" height=\"486\" width=\"648\"><\/a><\/p>\n<p class=\"text_center\">Amagasaki lock in Amagasaki&#8217;s Nishinomiya Ashiya port<\/p>\n<\/div>\n<p>The unidentified man, who was a contractor with the city working to disburse pandemic subsidies, placed the drive containing all the records into his bag, which he took with him on a night out on the town earlier this week.&nbsp;<\/p>\n<p>It&#8217;s unknown how good of a time the man had, but he did reportedly end up passing out in the street, Japanese news source NHK <a href=\"https:\/\/www3.nhk.or.jp\/nhkworld\/en\/news\/20220624_27\/#:~:text=A%20city%20in%20western%20Japan,said%20the%20USB%20was%20lost.\" rel=\"nofollow\">reported<\/a> the company who employed him as saying, elaborating on an <a target=\"_blank\" href=\"https:\/\/www.city.amagasaki.hyogo.jp\/kurashi\/seikatusien\/1027475\/1030947.html\" rel=\"noopener\">incident report<\/a> from the Amagasaki city government. The company told the newspaper that, upon waking, the contractor found his bag was missing.<\/p>\n<p>The incident report states that the memory stick contained names, birth dates, addresses, tax details, banking information, and social security records \u2013 all of it very private and potentially harmful if stolen.<\/p>\n<p>Amagasaki officials said the data on the USB stick was encrypted, and offered apologies for harming the public&#8217;s trust in their administration.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"condor\" data-xsm=\",fluid,mpu,\" data-sm=\",fluid,mpu,\" data-md=\",fluid,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/cso&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2Yrm2TXM1GtGdKeoPz6MbEQAAAAc&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/cso&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2Yrm2TXM1GtGdKeoPz6MbEQAAAAc&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>All the worry came to naught, though. After searching the area with police, the bag and the USB stick were found. Amagasaki officials said there&#8217;s no evidence anyone attempted to access the information.&nbsp;<\/p>\n<h3 class=\"crosshead\"> <span>CISA fields advisor recommendations, warns that Log4j is still around<\/span><br \/>\n<\/h3>\n<p>The Cybersecurity and Infrastructure Security Agency (CISA) held its third Cybersecurity Advisory Committee meeting this week, where it made <a href=\"https:\/\/www.cisa.gov\/news\/2022\/06\/22\/readout-cisas-third-cybersecurity-advisory-committee-meeting\" rel=\"nofollow\">a laundry list<\/a> of recommendations on its programs and policies.<\/p>\n<p>After six months of prognostication here&#8217;s a quick rundown of the recommendations made by advisors from Mastercard, Apple, the University of Washington, and other organizations, which met in six subcommittees:<\/p>\n<ul>\n<li>CISA needs to prioritize developing a strong workforce by improving its talent acquisition process to compete with the private sector<\/li>\n<li>Create a new chief people officer at CISA<\/li>\n<li>CISA should launch a nationwide &#8220;311&#8221; program to provide an emergency call line for SMBs hit by cyber attacks<\/li>\n<li>CISA needs to expand its &#8220;More Than a Password&#8221; MFA campaign by reaching out to NGOs, other government agencies, and private sector partners<\/li>\n<li>CISA should take all necessary steps to ensure all companies working with the US Federal Government have fully adopted MFA by 2025<\/li>\n<li>Streamline the incident reporting and vulnerability reporting processes<\/li>\n<li>Establish a central platform to handle intake of suspected vulnerabilities<\/li>\n<li>Improve communication between security researchers, agencies and vendors<\/li>\n<li>Address the risks of misinformation, disinformation, and malinformation in American society<\/li>\n<\/ul>\n<p>Of the recommendations, two were mentioned by more than one subcommittee: expanding the More Than a Password campaign, and establishing the SMB 311 line.<\/p>\n<p>CISA director Jen Easterly said that the next meeting would focus on strategies to develop a national alert system for cyber risks.&nbsp;<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xmd=\",fluid,mpu,leaderboard,\" data-lg=\",fluid,mpu,leaderboard,\" data-xlg=\",fluid,billboard,superleaderboard,mpu,leaderboard,\" data-xxlg=\",fluid,billboard,superleaderboard,brandwidth,brandimpact,leaderboard,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/cso&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44Yrm2TXM1GtGdKeoPz6MbEQAAAAc&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/cso&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44Yrm2TXM1GtGdKeoPz6MbEQAAAAc&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<div class=\"adun_eagle_desktop_story_wrapper\">\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"mid\" data-raptor=\"eagle\" data-xxlg=\",mpu,dmpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/cso&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33Yrm2TXM1GtGdKeoPz6MbEQAAAAc&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/cso&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33Yrm2TXM1GtGdKeoPz6MbEQAAAAc&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<\/p><\/div>\n<p>CISA also released a cybersecurity alert this week warning that Log4Shell is still around and actively being exploited. Together with the US Coast Guard Cyber Command, CISA released an <a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/current-activity\/2022\/06\/23\/malicious-cyber-actors-continue-exploit-log4shell-vmware-horizon\" rel=\"nofollow\">advisory<\/a> stating that hackers and state-sponsored APT groups are still exploiting Log4Shell on devices that haven&#8217;t been patched.&nbsp;<\/p>\n<p>CISA said the info it reported was derived from two related incidents. It wasn&#8217;t immediately clear how the Coast Guard was involved.<\/p>\n<h3 class=\"crosshead\"> <span>Chrome add-ons can be used to fingerprint browsers<\/span><br \/>\n<\/h3>\n<p>Modern privacy software has undone much of the methods for browser fingerprinting, but it&#8217;ll have a hard time undoing <a href=\"https:\/\/github.com\/z0ccc\/extension-fingerprints\" rel=\"nofollow\">this problem<\/a> with Chrome, which seems to be inherent to the way the browser handles extensions.&nbsp;<\/p>\n<p>Browser fingerprinting involves gathering information left behind by sessions that identify the browser, or the person behind it, well enough to serve ads and tailor online experiences.&nbsp;In the case of Chrome extensions, says a security researcher going by z0ccc on GitHub, the combination in any given browser can easily ID users.&nbsp;<\/p>\n<p>Chrome stores a list of its extensions in a web-accessible resource file that any web page can view. z0ccc was able to build a <a href=\"https:\/\/z0ccc.github.io\/extension-fingerprints\/\" rel=\"nofollow\">demo website<\/a> that scans for over 1,000 Chrome browser extensions and returns a percentage-based chance that another user was using the exact same extensions.&nbsp;<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xsm=\",fluid,mpu,\" data-sm=\",fluid,mpu,\" data-md=\",fluid,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/cso&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44Yrm2TXM1GtGdKeoPz6MbEQAAAAc&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/cso&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44Yrm2TXM1GtGdKeoPz6MbEQAAAAc&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>In this hack&#8217;s case, only 0.003 percent of Chrome users have the same set of add-ons used, meaning the extension fingerprint would be pretty likely to be identified from a pool of other visitors.&nbsp;<\/p>\n<p>For those concerned there&#8217;s no place safe from browser fingerprinting online, z0ccc said that Firefox uses unique extension IDs for every browser instance, and thus can&#8217;t be fingerprinted the same way. Microsoft Edge is vulnerable, however.&nbsp;<\/p>\n<h3 class=\"crosshead\"> <span>Smart Jacuzzi not so smart with user data<\/span><br \/>\n<\/h3>\n<p>A security researcher trying to set up their Jacuzzi SmartTub discovered an easily exploited flaw that gave them access to personal info of hot tub owners from around the world.<\/p>\n<p>SmartTub, like other IoT products, lets users control their appliance from outside the home using an app. The bug in Jacuzzi&#8217;s SmartTub system comes from its web portal, which uses a white-labeled Auth0 login page.<\/p>\n<p>&#8220;I entered my details, thinking this was a website alternative to the mobile app. I was greeted with an Unauthorized screen. Right before that message appeared, I saw a header and table briefly flash on my screen&#8230; I was surprised to discover it was an admin panel populated with user data,&#8221; <a href=\"https:\/\/eaton-works.com\/2022\/06\/20\/hacking-into-the-worldwide-jacuzzi-smarttub-network\/\" rel=\"nofollow\">said<\/a> the researcher, who goes by Eaton Works.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" id=\"story_eagle_xsm_sm_md_xmd_lg_xlg\" data-pos=\"mid\" data-raptor=\"eagle\" data-xsm=\",mpu,dmpu,\" data-sm=\",mpu,dmpu,\" data-md=\",mpu,dmpu,\" data-xmd=\",mpu,dmpu,\" data-lg=\",mpu,dmpu,\" data-xlg=\",mpu,dmpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/cso&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33Yrm2TXM1GtGdKeoPz6MbEQAAAAc&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/cso&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33Yrm2TXM1GtGdKeoPz6MbEQAAAAc&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>All it took for Eaton to break into the admin panel was using web debugging tool Fiddler to intercept and modify an HTTP response to give himself admin access. &#8220;Once into the admin panel, the amount of data I was allowed to was staggering,&#8221; Eaton exclaimed.<\/p>\n<p>Details on each tub, owner name and email address, dealer location, and more were available to view on customers from around the world. Eaton said it also appeared he could edit any data he wanted to, though he didn&#8217;t confirm if changes would be saved.<\/p>\n<p>Jacuzzi wasn&#8217;t very willing to talk to Eaton about his findings either. &#8220;Dialog was not established until Auth0 stepped in. Even then, communication with Jacuzzi\/SmartTub eventually dropped off completely, without any formal conclusion or acknowledgement they have addressed all reported issues,&#8221; Eaton reported.&nbsp;<\/p>\n<p>Eaton added that the admin panel has been taken offline, and can&#8217;t be accessed via the web anymore. Eaton also has other security concerns with Jacuzzi not addressed in their report, and is open to speaking to the hot tub maker to help.<\/p>\n<h3 class=\"crosshead\"> <span>Mitel VoIP zero-day found exploited in the wild<\/span><br \/>\n<\/h3>\n<p>CrowdStrike security researchers have discovered a flaw in Mitel VoIP appliances being actively exploited to launch ransomware attacks.&nbsp;<\/p>\n<p>The novel exploit was found by CrowdStrike when investigating a failed ransomware attack on a customer. &#8220;All of the identified malicious activity had originated from an internal IP address&#8221; discovered to be &#8220;a Linux-based Mitel VoIP appliance sitting on the network perimeter,&#8221; CrowdStrike <a href=\"https:\/\/www.crowdstrike.com\/blog\/novel-exploit-detected-in-mitel-voip-appliance\/\" rel=\"nofollow\">said<\/a>.<\/p>\n<p>All the attacker needed to gain access to the VoIP appliances was to send a pair of GET requests: one to mask traffic to a malicious address, and a second to inject a command that pointed the GET request to attacker-controlled infrastructure.<\/p>\n<p>CrowdStrike said the attack was stopped before ransomware could be deployed, and said Mitel has released a patch that addresses the problem. Of the exploit itself, CrowdStrike said that edge appliances like Mitel VoIP devices have extremely limited security or endpoint detection options available, making timely patching a must.<\/p>\n<p>Additionally, CrowdStrike emphasize security best practices, like isolating critical assets from perimeter devices, segmenting a network, maintaining an up-to-date asset inventory, keeping a short leash on service accounts and requiring MFA, especially for access to critical assets.&nbsp;\u00ae<\/p>\n<p> READ MORE <a href=\"https:\/\/go.theregister.com\/feed\/www.theregister.com\/2022\/06\/27\/security_in_brief\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Also, Chrome add-ons are great for fingerprinting, and hacked hot tubs splurge details In brief\u00a0 A Japanese contractor working in the city of Amagasaki, near Osaka, reportedly mislaid a USB drive containing personal data on the metropolis&#8217;s 460,000 residents.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":47273,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-47272","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Contractor loses entire Japanese city&#039;s personal data in USB fail 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/contractor-loses-entire-japanese-citys-personal-data-in-usb-fail\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Contractor loses entire Japanese city&#039;s personal data in USB fail 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/contractor-loses-entire-japanese-citys-personal-data-in-usb-fail\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-27T10:44:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/regmedia.co.uk\/2022\/06\/27\/shutterstock_amagasaki.jpg?x=648&amp;y=486&amp;infer_y=1\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/contractor-loses-entire-japanese-citys-personal-data-in-usb-fail\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/contractor-loses-entire-japanese-citys-personal-data-in-usb-fail\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Contractor loses entire Japanese city&#8217;s personal data in USB fail\",\"datePublished\":\"2022-06-27T10:44:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/contractor-loses-entire-japanese-citys-personal-data-in-usb-fail\\\/\"},\"wordCount\":1294,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/contractor-loses-entire-japanese-citys-personal-data-in-usb-fail\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/contractor-loses-entire-japanese-citys-personal-data-in-usb-fail.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/contractor-loses-entire-japanese-citys-personal-data-in-usb-fail\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/contractor-loses-entire-japanese-citys-personal-data-in-usb-fail\\\/\",\"name\":\"Contractor loses entire Japanese city's personal data in USB fail 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/contractor-loses-entire-japanese-citys-personal-data-in-usb-fail\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/contractor-loses-entire-japanese-citys-personal-data-in-usb-fail\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/contractor-loses-entire-japanese-citys-personal-data-in-usb-fail.jpg\",\"datePublished\":\"2022-06-27T10:44:06+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/contractor-loses-entire-japanese-citys-personal-data-in-usb-fail\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/contractor-loses-entire-japanese-citys-personal-data-in-usb-fail\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/contractor-loses-entire-japanese-citys-personal-data-in-usb-fail\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/contractor-loses-entire-japanese-citys-personal-data-in-usb-fail.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/contractor-loses-entire-japanese-citys-personal-data-in-usb-fail.jpg\",\"width\":648,\"height\":486},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/contractor-loses-entire-japanese-citys-personal-data-in-usb-fail\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Contractor loses entire Japanese city&#8217;s personal data in USB fail\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Contractor loses entire Japanese city's personal data in USB fail 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/contractor-loses-entire-japanese-citys-personal-data-in-usb-fail\/","og_locale":"en_US","og_type":"article","og_title":"Contractor loses entire Japanese city's personal data in USB fail 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/contractor-loses-entire-japanese-citys-personal-data-in-usb-fail\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-06-27T10:44:06+00:00","og_image":[{"url":"https:\/\/regmedia.co.uk\/2022\/06\/27\/shutterstock_amagasaki.jpg?x=648&amp;y=486&amp;infer_y=1","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/contractor-loses-entire-japanese-citys-personal-data-in-usb-fail\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/contractor-loses-entire-japanese-citys-personal-data-in-usb-fail\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Contractor loses entire Japanese city&#8217;s personal data in USB fail","datePublished":"2022-06-27T10:44:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/contractor-loses-entire-japanese-citys-personal-data-in-usb-fail\/"},"wordCount":1294,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/contractor-loses-entire-japanese-citys-personal-data-in-usb-fail\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/06\/contractor-loses-entire-japanese-citys-personal-data-in-usb-fail.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/contractor-loses-entire-japanese-citys-personal-data-in-usb-fail\/","url":"https:\/\/www.threatshub.org\/blog\/contractor-loses-entire-japanese-citys-personal-data-in-usb-fail\/","name":"Contractor loses entire Japanese city's personal data in USB fail 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/contractor-loses-entire-japanese-citys-personal-data-in-usb-fail\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/contractor-loses-entire-japanese-citys-personal-data-in-usb-fail\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/06\/contractor-loses-entire-japanese-citys-personal-data-in-usb-fail.jpg","datePublished":"2022-06-27T10:44:06+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/contractor-loses-entire-japanese-citys-personal-data-in-usb-fail\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/contractor-loses-entire-japanese-citys-personal-data-in-usb-fail\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/contractor-loses-entire-japanese-citys-personal-data-in-usb-fail\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/06\/contractor-loses-entire-japanese-citys-personal-data-in-usb-fail.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/06\/contractor-loses-entire-japanese-citys-personal-data-in-usb-fail.jpg","width":648,"height":486},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/contractor-loses-entire-japanese-citys-personal-data-in-usb-fail\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Contractor loses entire Japanese city&#8217;s personal data in USB fail"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/47272","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=47272"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/47272\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/47273"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=47272"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=47272"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=47272"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}