{"id":8390,"date":"2021-04-13T16:00:00","date_gmt":"2021-04-13T07:00:00","guid":{"rendered":"https:\/\/www.capcom.co.jp\/ir\/news\/.html"},"modified":"2021-11-25T20:41:13","modified_gmt":"2021-11-25T11:41:13","slug":"e210413","status":"publish","type":"post","link":"https:\/\/www.capcom.co.jp\/ir\/english\/news\/html\/e210413.html","title":{"rendered":"<strong>4<sup>th<\/sup> Update Regarding Data Security Incident<br>Due to Unauthorized Access: Investigation Results<\/strong>"},"content":{"rendered":"\n<div class=\"mainText\">\n<p class=\"mT45\">Capcom Co., Ltd. (Capcom) has previously issued statements from November 4, 2020 through January 12, 2021 (&#8220;previous announcements,&#8221; below) announcing that it has been the victim of an attack due to unauthorized access to its network by a third party and that some personal information maintained by the Capcom Group has been compromised (&#8220;the incident,&#8221; below).<\/p>\n\n<p class=\"mT15\">The investigation into the incident, carried out with the cooperation of external specialist companies, has been completed and Capcom has received their findings. As such, Capcom can now make an announcement regarding the findings of that investigation as well as the measures it will take to prevent future incidents. At this point in time, the Capcom Group&#8217;s internal systems are near to completely restored, and while coordinating with the newly established Information Technology Security Oversight Committee, the company will work toward continuously strengthening both security and the protection of personal information going forward.<\/p>\n\n<p class=\"mT15\">Capcom offers its sincerest apologies for any complications and concerns its customers as well as its many stakeholders may have experienced, and further, would like to express its deepest gratitude for their ongoing support during this time.<\/p>\n\n\n\n<p class=\"mT35\">1. <span class=\"kasen\">Incident Response Timeline<\/span><\/p>\n\n<table class=\"mT15 timeline\">\n<tbody>\n<tr>\n<th class=\"blue\" style=\"width:20%;\">November  2, 2020<\/th>\n<td>Detected connectivity issues with internal network. Shut down systems and began examining.<\/td>\n<\/tr>\n<tr>\n<th class=\"blue\">November  2, 2020<\/th>\n<td>Confirmed that these issues stemmed from a ransomware attack, which encrypted data on devices on the company&#8217;s network. Discovered a threatening message from a group that calls itself Ragnar Locker on the affected devices and contacted the Osaka Prefectural Police. Requested support for system restoration from external companies.<\/td>\n<\/tr>\n<tr>\n<th class=\"blue\">November 3, 2020<\/th>\n<td>Began contacting the relevant organizations in each country, including investigative authorities and those that oversee the protection of personal information.<\/td>\n<\/tr>\n<tr>\n<th class=\"blue\">November  4, 2020<\/th>\n<td>Issued the press release:  &#8220;<a href=\"e201104.html\">Notice Regarding Network Issues due to Unauthorized Access.<\/a>&#8220;<\/td>\n<\/tr>\n<tr>\n<th class=\"blue\">November 12, 2020<\/th>\n<td>Verified that nine items of personal information and some corporate information had been compromised.<\/td>\n<\/tr>\n<tr>\n<th class=\"blue\">November  13, 2020<\/th>\n<td>Approached external IT security specialist company regarding investigating the root cause of this matter.<\/td>\n<\/tr>\n<tr>\n<th class=\"blue\">November  16, 2020<\/th>\n<td>Issued the press release: &#8220;<a href=\"e201116.html\">Update Regarding Data Security Incident Due to Unauthorized Access.<\/a>&#8220;<br>\nContinued investigation into compromised and potentially compromised data.<\/td>\n<\/tr>\n<tr>\n<th class=\"blue\">December  21, 2020<\/th>\n<td>Held preparatory meeting ahead of the launch of the Information Technology Security Oversight Committee, which functions as an advisory group for matters related to system security with external security experts.<\/td>\n<\/tr>\n<tr>\n<th class=\"blue\">January  12, 2021<\/th>\n<td>Issued the press release: &#8220;<a href=\"e210112.html\">3<sup>rd<\/sup> Update Regarding Data Security Incident Due to Unauthorized Access.<\/a>&#8220;<\/td>\n<\/tr>\n<tr>\n<th class=\"blue\">January  18, 2021<\/th>\n<td>Held first Information Technology Security Oversight Committee meeting.<\/td>\n<\/tr>\n<tr>\n<th class=\"blue\">February  25, 2021<\/th>\n<td>Held second Information Technology Security Oversight Committee meeting.<\/td>\n<\/tr>\n<tr>\n<th class=\"blue\">March  26, 2021<\/th>\n<td>Held third Information Technology Security Oversight Committee meeting.<\/td>\n<\/tr>\n<tr>\n<th class=\"blue\">March  31, 2021<\/th>\n<td>Received investigation findings from external IT security specialist company.<\/td>\n<\/tr>\n<tr>\n<th class=\"blue\">March  31, 2021<\/th>\n<td>Received additional information from external software company.<\/td>\n<\/tr>\n<tr>\n<th class=\"blue\">April 13, 2021<\/th>\n<td>Issued the press release: &#8220;4<sup>th<\/sup> Update Regarding Data Security Incident Due to Unauthorized Access: Investigation Results.&#8221;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\n\n\n\n\n<p class=\"mT50\">2. <span class=\"kasen\">Root Cause and Scope<\/span><\/p>\n\n<p class=\"mT15\">Capcom worked with multiple companies including major security vendors and IT specialist companies to carry out an investigation into the devices and transmission logs affected in the attack. As a result of carrying out this investigation, Capcom has found that the incident occurred as described in the following summary. Further, as stated in previous announcements, the Company has been coordinating both domestically and overseas with law enforcement and related organizations, while also continually reporting and corresponding on a timely basis with the authorities that oversee the protection of personal information in each country.<\/p>\n\n<p class=\"mT20\">According to the IT specialists, unauthorized access to the Company&#8217;s internal network was acquired in October 2020 through a cyberattack carried out on an older backup VPN (Virtual Private Network) device that had been maintained at its North American subsidiary (Capcom U.S.A., Inc.). At that time, the Capcom Group, including the North American subsidiary, had already introduced a different, new model of VPN devices; however, due to the growing burden on the Company&#8217;s network stemming from the spread of COVID-19 in the State of California, where this North American subsidiary is located, one of the aforementioned older VPN devices remained solely at this North American subsidiary as an emergency backup in case of communication issues, and it became the target of the attack. The device in question has already been removed from the network at this time.<\/p>\n\n<p class=\"mT20\">The IT specialists determined that following this, some devices were compromised at both the Company&#8217;s U.S. and Japanese offices through the affected old VPN device at the Company&#8217;s North American subsidiary, leading to the theft of information. While the Company had existing perimeter<sup>*1<\/sup> security measures in place and, as explained below, was in the processes of adopting defensive measures such as a SOC<sup>*2<\/sup> service and EDR<sup>*3<\/sup>, the Company had been forced to prioritize infrastructure improvements necessitated by the spread of COVID-19. As a result, the use of these measures was still in the process of being verified (not yet implemented) at the time this matter took place.<\/p>\n\n<p class=\"mT20\">Following the final stage of the attack, some devices at both the Company&#8217;s U.S. and Japanese offices were infected with ransomware on November 1, 2020 beginning at approximately 11 PM (JST), resulting in the files on affected devices being encrypted. Beginning in the early morning hours of November 2, 2020 some of the Capcom Group networks experienced issues that affected access to certain systems, including email and file servers. While the Company halted certain operations, it worked to quickly restore them. The above is a broad explanation of the incident from the external specialist companies, who have provided Capcom with the conclusion that the incident was a malicious, multi-faceted attack that would be difficult to defend against.<\/p>\n\n<div class=\"txt11\">\n<p class=\"indent2em\">*1: Security measures that include placing a firewall at the perimeter between external networks and internal networks.<\/p>\n\n<p class=\"mT5 indent2em\">*2: Acronym standing for Security Operation Center. A SOC service is a system that monitors systems and networks around the clock, and supports the detection, analysis and handling of attacks.<\/p>\n\n<p class=\"mT5 indent2em\">*3: Acronym standing for Endpoint Detection and Response. A system that introduces software to detect unusual activity on devices such as the PCs and servers utilized by end-users and supports quick responses to issues.<\/p>\n<\/div>\n\n<p class=\"txtC mT25\"><img decoding=\"async\" src=\"\/ir\/english\/news\/html\/images\/e210413.png\"><\/p>\n\n\n\n<p class=\"mT50\">3. <span class=\"kasen\">Security Measures to Prevent Reoccurrences<\/span><\/p>\n\n<p class=\"mT15\">In addition to the Company&#8217;s existing perimeter security measures, following the incident, Capcom has taken a variety of measures to strengthen existing security with the aim of preventing any reoccurrence. This includes the introduction of an SOC service, which continuously monitors external connections, and EDR, which allows for early detection of unusual activity on devices. Below are explanations of both the measures Capcom has taken to address the incident and those it plans to carry out, as of the time of this announcement.<\/p>\n\n\n<p class=\"mT20 indent1-5em\">i. Technical Measures<\/p>\n\n<div class=\"Box01 mT5\">\n<p>[Implementation complete] (list of major items only)<\/p>\n<ul class=\"num_circle nostyle mB5\">\n<li>a. Leading software company carried out cleaning of all compromised devices<\/li>\n<li>b. Reverified the safety of all VPN devices and that security measures are complete (further, old VPN device at North American subsidiary described above has been disposed of)<\/li>\n<li>c. Introduced SOC (Security Operation Center) service in order to monitor external connections around the clock<\/li>\n<li>d. Introduced the latest EDR (Endpoint Detection and Response) to provide early detection of unusual activity and computer virus infection on devicese<\/li>\n<li>e. Reviewed accounts used for business purposes<\/li>\n<li>f.Further improved management methods for VPN and other devices, including those pertaining to long-term storage of logs to facilitate a quick response in the case that an incident occurs<\/li>\n<\/ul>\n<p>[Implementation planned]<\/p>\n<p>While Capcom has been informed by external specialist companies and the Information Technology Security Oversight Committee that items a.~f. above are in line with current best practices, it is possible that new threats and methods of attack could be created. Going forward, Capcom will continue to take various measures to address any such future developments with direction from the Information Technology Security Oversight Committee.<\/p>\n<\/div><!--\/\/Box-->\n\n\n<p class=\"mT20 indent1-5em\">ii.Organizational Measures<\/p>\n<div class=\"Box01 mT5\">\n<p>[Implementation complete] <\/p>\n<ul class=\"num_circle nostyle mB5\">\n<li>a. Launched the Information Technology Security Oversight Committee in the latter half of January 2021 in order to receive recommendations on a continuous basis from external experts based on the latest trends, with an aim to procure external checks and the swift accumulation of knowhow regarding strengthening cyber security (including data protection for securing personal information, etc.). Externally, there are four<sup>*4<\/sup> Committee members who consist of two university professors who are cyber security experts, one lawyer who is an expert on both cyber security and the Act on the Protection of Personal Information, and one certified public accountant that is an IT system audit specialist; internally, one director as well as three technicians who oversee security and networks participate. The Committee plans to continue to regularly hold meetings to strengthen protection standards. <\/li>\n<li>b. Established the Information Technology Surveillance Section in December 2020, a new section directly under the Information Technology Security Oversight Committee, which gathers information regarding cyber security and builds knowledge of preventative measures to make recommendations, etc.<\/li>\n<li>c. Strengthened the system for regular verification, including for the adoption of tools, in the management of accounts used for business purposes.<\/li>\n<li>d. Constructed system to further raise awareness of security and the management of personal information at the Group overall.<\/li>\n<\/ul>\n<p>[Implementation planned]<\/p>\n<p>Build out and regulate a system for further strengthening security based on the PDCA cycle<\/p>\n<\/div><!--\/\/Box01-->\n\n<p class=\"mT15\">*4: Prof. Tetsutaro Uehara of Ritsumeikan University; Hisamichi Okamura, attorney-at-law, of Cyber Law Japan Eichi Law Offices; Prof. Atsuo Inomata of Osaka University; Mitsuhiko Maruyama, Partner at PwC Consulting LLC.<\/p>\n\n\n\n\n<p class=\"mT50\">4.<span class=\"kasen\">Compromised and Potentially Compromised Information<\/span><\/p>\n\n<div class=\"Box01\">\n<p class=\"mT15 indent1-5em\">i. Information verified to have been compromised<br>\nSince the January 12, 2021 announcement, the cumulative total for information verified to have been compromised since this investigation began decreased by 766 people, down to 15,649 people.<\/p>\n\n<p class=\"mT15 indent1-5em\">ii. Potentially compromised data<br>\nThere have been no changes following the January 12, 2021 announcement.<\/p>\n<\/div><!--\/\/Box01-->\n\n<p class=\"mT15\">As described in previous announcements, none of the at-risk data contains credit card information. All online transactions etc. are handled by a third-party service provider on a separate system (not involved in this attack), and as such Capcom does not maintain any such information internally.<\/p>\n\n<p class=\"mT15\">Additionally, the areas that were impacted in the incident are unrelated to those systems used when connecting to the internet to play or purchase the company&#8217;s games online, which utilized and continue to utilize either an external third-party server or an external server (not involved in this attack). As such, these systems were outside the scope of the incident, and it remains safe for Capcom customers or others to connect to the internet to play or purchase the company&#8217;s games online.<\/p>\n\n<p class=\"mT15\">Further, regarding the total number of people whose data was potentially compromised, because a portion cannot specifically be ascertained due to issues including logs having been lost as a result of the attack, Capcom has included the maximum number of individuals whose data was maintained on all potentially compromised servers. Additionally, the company has not been able to confirm any damages, etc. resulting from actual misuse of the compromised information at this point in time. (For information regarding ransom demands made to the company, see &#8220;6. Regarding Capcom&#8217;s Awareness of Ransom Demands,&#8221; below.)<\/p>\n\n\n\n\n<p class=\"mT50 indent1-5em\">5. <span class=\"kasen\">Support for those whose personal information has been confirmed to have been compromised and those whose information has potentially been compromised<\/span><\/p>\n<div class=\"Box01\">\n<p class=\"mT10 indent1-5em\">i. Capcom is notifying those whose personal information or corporate information has been confirmed to have been compromised to discuss the background of this incident and current situation.<\/p>\n\n\n<p class=\"mT25 indent1-5em\">ii.For individuals who wish to inquire about compromised personal information, as has been described in previous announcements, please contact the following support desks in your country or region:<\/p>\n\n<table class=\"layout narw mT10 mL10\">\n<tbody>\n<tr>\n<td colspan=\"4\">Japan: Capcom Data Security Incident Support Line (Japanese only)<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"2\" width=\"6%\">&nbsp;<\/td>\n<td rowspan=\"2\" width=\"16%\">Tel. (toll-free):<br><\/td>\n<td width=\"40%\">Game customer inquiries<\/td>\n<td width=\"38%\">0120-400161<\/td>\n<\/tr>\n<tr>\n<td>General inquiries<\/td>\n<td>0120-896680<\/td>\n<\/tr>\n<tr>\n<td><p>&nbsp;<\/p><\/td>\n<td colspan=\"3\">Hours: 10:00  AM &#8211; 08:00 PM<\/td>\n<\/tr>\n<tr>\n<td colspan=\"4\">North America: Capcom USA Customer Support Page<\/td>\n<\/tr>\n<tr>\n<td>&nbsp;<\/td>\n<td colspan=\"3\"><a href=\"https:\/\/www.capcom.com\/support\" target=\"_blank\" rel=\"noopener\">www.capcom.com\/support <\/a><\/td>\n<\/tr>\n<tr>\n<td colspan=\"4\">EMEA: Capcom Europe Customer Support<\/td>\n<\/tr>\n<tr>\n<td>&nbsp;<\/td>\n<td colspan=\"3\">feedback@capcom.com <\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n\n\n<p class=\"mT15\">The number of inquiries the company has received in Japan has been declining: In the month prior to this announcement, the daily average was 0.2 inquiries per day; in the week prior to this announcement, the daily average was 0.1 inquires per day.<\/p>\n\n\n\n\n<p class=\"mT50 indent1-5em\">6. <span class=\"kasen\">Regarding Capcom&#8217;s Awareness of Ransom Demands<\/span><\/p>\n\n<p class=\"mT15\">While it is true that the threat actor behind this attack left a message file on the devices that were infected with ransomware containing instructions to contact the threat actor to negotiate, there was no mention of a ransom amount in this file. As explained in previous announcements, Capcom consulted with law enforcement and determined to not engage the threat actor in negotiations; the Company in fact took no steps to make contact (see the company&#8217;s November 16, 2020 announcement), and as such Capcom is not aware of any ransom demand amounts.<\/p>\n\n<p class=\"mT50\">While there have been no changes to the most recent forecast for the Capcom Group&#8217;s consolidated business results (for the fiscal year ended March 31, 2021), the company will swiftly make an announcement in the case that any further disclosure is necessary.<\/p>\n\n\n<p class=\"mT15\">Capcom would once again like to reiterate its deepest apologies for any complications or concerns caused by the incident. As a company that handles digital content, it is treating this incident with the utmost seriousness, and will take the appropriate action to address any requests or directions provided by law enforcement and other relevant authorities in each country. At the same time, Capcom will endeavor to further strengthen its management structure while coordinating with the relevant organizations to pursue its legal options regarding criminal acts.<\/p>\n\n\n<\/div><!-- mainText -->\n","protected":false},"excerpt":{"rendered":"<p>Capcom Co., Ltd. (Capcom) has previously issued statements from November 4, 2020 through January 12, 2021 (&#8220;previous announcements,&#8221; below) announcing that it has been the victim of an attack due to unauthorized access to its network by a third party and that some personal information maintained by the Capcom Group has been compromised (&#8220;the incident,&#8221; below).<\/p>\n","protected":false},"author":5,"featured_media":15801,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[930],"tags":[2459],"class_list":["post-8390","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-enterprise","tag-4_"],"acf":[],"aioseo_notices":[],"lang":"english","translations":{"english":8390,"ja":2766},"pll_sync_post":[],"_links":{"self":[{"href":"https:\/\/www.capcom.co.jp\/ir\/wp-json\/wp\/v2\/posts\/8390"}],"collection":[{"href":"https:\/\/www.capcom.co.jp\/ir\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.capcom.co.jp\/ir\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.capcom.co.jp\/ir\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.capcom.co.jp\/ir\/wp-json\/wp\/v2\/comments?post=8390"}],"version-history":[{"count":3,"href":"https:\/\/www.capcom.co.jp\/ir\/wp-json\/wp\/v2\/posts\/8390\/revisions"}],"predecessor-version":[{"id":13279,"href":"https:\/\/www.capcom.co.jp\/ir\/wp-json\/wp\/v2\/posts\/8390\/revisions\/13279"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capcom.co.jp\/ir\/wp-json\/wp\/v2\/media\/15801"}],"wp:attachment":[{"href":"https:\/\/www.capcom.co.jp\/ir\/wp-json\/wp\/v2\/media?parent=8390"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.capcom.co.jp\/ir\/wp-json\/wp\/v2\/categories?post=8390"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.capcom.co.jp\/ir\/wp-json\/wp\/v2\/tags?post=8390"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}