Preview

Softbank: Theft of Consumer Data for Extortion

Better Essays
Open Document
Open Document
905 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Softbank: Theft of Consumer Data for Extortion
Info 6027 Case Study

Project One
Softbank – theft of consumer data for extortion
Please read the report published by the IAPP in the journal Privacy Advisor.
Organisations do not normally volunteer any information about any sort of security breach unless they are compelled in some way. The incident described is no exception, it concerned Yahoo! BB and
Softbank BB.
Softbank of Japan offered broadband internet services across Japan through two subsidiaries – Yahoo!
BB and Softbank BB. In February 2004, the bank announced that the security of 4.5 million customer records had been compromised: data from both subsidiaries had been illegally copied and disseminated.
The leaked details included customer names, home phone numbers, addresses and email IDs, but did not include passwords, access logs or credit card details.
Softbank became aware of the problem only when they were approached by two groups of extortionists. The criminals produced apparently genuine customer data and threatened that all of the data would be posted to the internet if they were not paid a large sum of money.
Japanese police made three arrests but suspected that there may have been connections to organised crime and the political far-right. Amazingly, the police concluded that there had in fact been two simultaneous, yet independent, extortion attempts against Softbank, both of them masterminded by employees of the company. All of the people accused of extortion had been authorised to access the customer data; but it appeared that Softbank had inadequate procedures to protect against its unwarranted copying and dissemination.
The bank immediately announced a tightening of security, further restricting access to their systems and enforcing tighter security on all of their subsidiaries. Profuse apologies were offered to the affected customers and ¥4 billion (£20 million, $40 million CAD at the time) were paid in compensation.
Furthermore, Softbank BB's president, Masayoshi

You May Also Find These Documents Helpful

  • Best Essays

    Criminology is focused on the attempt to understand the meanings involved in social interaction. Theorists have tried to explain sociological behaviour by looking at the patterns created by individuals that commit crime. The August 2011 riots are pivotal in explaining criminological behaviour since official statistics show that 865 individuals were put in prison by the 9th September 2011 for offences related to the disorder between 6th and 9th August 2011. This is not to say that others were not involved, but that they have simply not been identified to date and may never be identified, however the evidence we do have about the recent riots gives us plenty to talk about. This essay will provide a basis for causes of the 2011 riots by applying the ‘Labelling theory’ and the ‘Anomie theory’ to events that led to such behaviour. Mark Duggan was shot by a police officer from the specialist firearms command team and as life-taking errors were made on behalf of the police force, such events that led up to the riots suggest that the police service could be to blame. It was on the 6th August that relatives sparked the riots by setting fire to police vehicles as they demanded information about Duggan’s death, however the British Prime Minister David Cameron rejected a causal relationship between the death of Mark Duggan and the subsequent looting.…

    • 4485 Words
    • 18 Pages
    Best Essays
  • Powerful Essays

    Clearly they were a well-respected, well-trusted company not too long before they were raided, and during a time that they were under investigation (not known to the public at the time) for fraudulent activity…

    • 1172 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Compliance violations via email increase ... A week after shutting down its PlayStation Network (PSN), Sony has ... an issue highlighted recently by security…

    • 394 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    However, too many organizations fail to identify the potential threats from information unintentionally leaked, freely available over the Internet, and not normally identifiable from standard log file analysis. Most critically, an attacker can passively gather this information without ever coming into direct contact with the organizations servers – thus being essentially undetectable. Very little information has been publicly discussed about arguably one of the least understood, and most significant stages of penetration testing – the process of Passive Information Gathering. This technical paper and information gathering plan reviews the processes and techniques related to the discovery of leaked information. It also includes details on both the significance of the leaked information, and steps organizations should take to halt or limit their exposure to this threat.…

    • 501 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    FXT2 Task2

    • 825 Words
    • 4 Pages

    The nature of this event describes an internal breach of security in order to access and manipulate sensitive data. This internal breach was caught by the auditor, but the communications from the auditor to those who’s data was breached was intercepted.…

    • 825 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Unit 1 Assignment 2

    • 313 Words
    • 2 Pages

    Identity theft occurs in some of the largest companies and often times this security breach is kept quiet. This company has been hacked for customer’s birthdates twice in one month. This means that they are experiencing severe vulnerabilities and they need to take action immediately. When customers start hearing that the companies they deal with have had security breaches in their computer systems data, they panic and most tend to, discontinue associating with that particular company.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Information that is stored in an organisation has to follow the security and confidentiality procedures. For example finances, customer’s and employee’s details should be secured and only certain members of staff should be able to access physical and electronic data unless you have been given authorisation. If information gets into the wrong hands it could have serious consequences and might lead to legal action.…

    • 777 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Is4550 Week5 Assignment1

    • 282 Words
    • 3 Pages

    your organization as management is thinking about this as a possible response to recent security…

    • 282 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    and stated that fraud is a major threat of the company. It is also been…

    • 5911 Words
    • 24 Pages
    Powerful Essays
  • Satisfactory Essays

    Most businesses have different information about people working for them, that's when the Data Protection Act 1998 protects the information held about people being misused.…

    • 605 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Background: Flayton Electronics, a second generation family business, has just been notified that there may have been a data breech associated with credit cards used at their stores. The initial reports indicates at least 1500 accounts may have been compromised although this number appears to be growing quickly as more banks and clearing houses are notified of the possible breech. Flayton is a small, regional electronics business with 32 stores in six (6) states. The case study is happening within 24 hours of first notification of the possible breech.…

    • 2381 Words
    • 9 Pages
    Better Essays
  • Satisfactory Essays

    IS 4560 Week 1

    • 309 Words
    • 2 Pages

    Data breaches that could lead to identity theft, by sector - the danger of data breaches are of particular importance for organizations that store and manage large amounts of personal information. Not only can compromises that result in the loss of personal data undermine customer and institutional confidence, result in costly damage to an organization’s reputation, and result in identity theft that may be costly for individuals to recover from, they can also be financially debilitating to organizations.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Managing a Global Team

    • 1255 Words
    • 6 Pages

    their entire system went down for two hours. It was a disaster for their online banking business. H S…

    • 1255 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    From the case, we know that Foremostco use only one year to rashly finish a new computer system for their logistics and even there are several bugs exists, they still decide to forge ahead with the switchover. The result turned to be a disaster. The computer system, newly designed to handle all the logistics of the business, was not doing what it was supposed to do. Due to the buggy system, almost all the important documents were printing out blank or not matched customer’ orders. So a great number of customers felt angry since they did not receive their orders or they were not even billed at all. Also since the new language is hard to learn, the staff was further frustrated and Foremostco lost several key employees. Foremostco also lost a great amount of money to develop this useless and buggy computer system.…

    • 998 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    It is also found out that it was a fall of Flipkart and the owners of Flipkart had to apologise with the customers and deal with the various arguments that were raised against them.…

    • 1854 Words
    • 8 Pages
    Good Essays