Japan’s NTT Com discloses data breach affecting nearly 18K corporate clients

Japan’s NTT Com discloses data breach affecting nearly 18K corporate clients

NTT Communications Corporation (NTT Com), a major Japanese information and communication technology (ICT) provider, has disclosed a data breach that affects nearly 18,000 of its corporate clients. The incident, which occurred in early February, saw unauthorized access to the company’s internal systems, exposing sensitive customer information.

NTT Com, a subsidiary of Nippon Telegraph and Telephone Corporation (NTT), provides a wide range of services, including cloud, network, and security solutions to businesses and government agencies in over 190 countries and regions.

According to NTT Com, the breach took place on February 5, when an unknown threat actor gained access to its internal systems, including those hosting data related to services provided to its corporate clients. After detecting suspicious communication behavior the company restricted access to the compromised system.

However, on February 15, NTT Com discovered further unauthorized access to another system, which was subsequently blocked to prevent any additional data exfiltration.

The compromised systems contained a range of sensitive information about NTT Com’s corporate customers, including contract numbers, customer names, contact names, phone numbers, email addresses, physical addresses, and details of service usage. In total, 17,891 customer companies were affected by the breach.

NTT Com said that it is in the process of notifying all impacted clients regarding the breach and is working to ensure that appropriate measures are in place to address the situation. The company said that only corporate entities were affected by the breach, as the compromised systems did not store any information related to end users.

Back to the list

Latest Posts

UAT-5918 info-stealing campaign targets critical infrastructure entities in Taiwan

UAT-5918 info-stealing campaign targets critical infrastructure entities in Taiwan

The tactics and tools employed by UAT-5918 overlap with other state-sponsored threat groups, such as Volt Typhoon, Flex Typhoon, and Earth Estries.
20 March 2025
New supply chain attack allows to inject malicious code via AI code editors

New supply chain attack allows to inject malicious code via AI code editors

By exploiting hidden unicode characters and employing advanced evasion techniques, attackers can subtly alter the behavior of AI models.
19 March 2025
Russian disinformation actors employ new tactics to maintain influence

Russian disinformation actors employ new tactics to maintain influence

Rather than immediately deploying newly registered domains, many threat actors now secure domain names months in advance.
19 March 2025