* [Cyberattacks -& Data Breaches](/cyberattacks-data-breaches)* [Cyber Risk](/cyber-risk)* [Data Privacy](/cyber-risk/data-privacy)* [Threat Intelligence](/threat-intelligence)[![Dark Reading Global Logo](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltc8a6395802cafad0/654e0d60123f32040a075bab/Dark_Reading_Logo_Global_k.png?width=700&auto=webp&quality=80&disable=upscale ‘Dark Reading Global Logo’)Breaking cybersecurity news, news analysis, commentary, and other content from around the world, with an initial focus on the Middle East -& Africa and the Asia Pacific](/program/dr-global-articles) Yakuza Victim Data Leaked in Japanese Agency Attack Yakuza Victim Data Leaked in Japanese Agency Attack=======================================================================================================A local government resource for helping Japanese citizens cut ties with organized crime was successfully phished in a tech support scam, and could have dangerous consequences. ![Picture of Dark Reading Staff](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt99b391f0439c1434/64f179af7de67f4e4300e517/285801_DR23_Graphics_Website_Author_Logo_0.jpg?width=100&auto=webp&quality=80&disable=upscale ‘Picture of Dark Reading Staff’) [Dark Reading Staff](/author/dark-reading-staff), Dark ReadingNovember 22, 2024 1 Min Read ![A scattered group of magazines about Japan’s underworld](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt542489a536cab0f1/6740d347fba932e2d2b824db/yakuza-Robert_Gilhooly-Alamy.jpg?width=1280&auto=webp&quality=95&format=jpg&disable=upscale ‘A scattered group of magazines about Japan’s underworld’) Source: Robert Gilhooly via Alamy Stock Photo [](https://www.linkedin.com/sharing/share-offsite/?url=https://www.darkreading.com/cyberattacks-data-breaches/yakuza-victim-data-leaked-japanese-attack)[](http://www.facebook.com/sharer/sharer.php?u=https://www.darkreading.com/cyberattacks-data-breaches/yakuza-victim-data-leaked-japanese-attack)[](http://www.twitter.com/intent/tweet?url=https://www.darkreading.com/cyberattacks-data-breaches/yakuza-victim-data-leaked-japanese-attack)[](/cdn-cgi/l/email-protection#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)[](https://www.reddit.com/submit?url=https://www.darkreading.com/cyberattacks-data-breaches/yakuza-victim-data-leaked-japanese-attack&title=Yakuza%20Victim%20Data%20Leaked%20in%20Japanese%20Agency%20Attack) Japan’s web of ruthless Yakuza organized crime syndicates continues to operate, threatening the country’s citizens with everything from extortion to gangland murders. Local agencies within communities are set up to help those who get involved with gangsters — but unfortunately, one of them has been hacked, potentially leading to physical safety consequences for the victims.The Kumamoto Prefecture Violence Prevention Movement Promotion Center said that 2,500 people who have used its counseling services (which aid with everything from evading extortion to disentangling romantically from Yakuza members) have been impacted by a data breach following a successful [phishing effort](https://www.darkreading.com/threat-intelligence/transport-logistics-stealthy-phishing).’On November 15th, a center staff member was directed to a [support fraud website](https://www.darkreading.com/cyberattacks-data-breaches/as-phishing-gets-sneakier-browser-security-needs-to-step-up) while working and was illegally accessed,’ according to an [‘apology’ notice](https://www.kumamoto-boutsui.com/) on the agency’s website (via Google Translate). ‘When the staff member noticed something was wrong, he immediately cut off the power and network connection of the computer terminal, but we cannot deny the possibility that data including personal information used in work may have been leaked.’That information could include addresses, phone numbers, and names: ‘If you receive a phone call or mail using the name or staff of the ‘Violence Prevention Movement Promotion Center’ at your address or workplace, please immediately report it … without responding to the request of the other party or opening the mail.’Beyond follow-on phishing or fraud calls however, the information could be valuable for syndicates looking for those who have left ‘the life’ or extortion victims who got away. The center is contacting those who may have been affected. Read more about:[DR Global Asia Pacific](/keyword/asia-pacific) [](https://www.linkedin.com/sharing/share-offsite/?url=https://www.darkreading.com/cyberattacks-data-breaches/yakuza-victim-data-leaked-japanese-attack)[](http://www.facebook.com/sharer/sharer.php?u=https://www.darkreading.com/cyberattacks-data-breaches/yakuza-victim-data-leaked-japanese-attack)[](http://www.twitter.com/intent/tweet?url=https://www.darkreading.com/cyberattacks-data-breaches/yakuza-victim-data-leaked-japanese-attack)[](/cdn-cgi/l/email-protection#06397573646c6365723b5f676d737c6726506f65726f6b2642677267264a63676d6362266f68264c677667686375632647616368657f2647727267656d20676b763d6469627f3b4f233436726e6973616e72233436726e6323343660696a6a69716f68612334366074696b2334364267746d233436546367626f68612334366b6f616e722334366f687263746375722334367f6973282336422336472336422336472334365f676d737c67233436506f65726f6b233436426772672334364a63676d63622334366f682334364c6776676863756323343647616368657f23343647727267656d2336422336476e72727675233547233440233440717171286267746d746367626f68612865696b233440657f64637467727267656d752b626772672b64746367656e63752334407f676d737c672b706f65726f6b2b626772672b6a63676d63622b6c677667686375632b67727267656d)[](https://www.reddit.com/submit?url=https://www.darkreading.com/cyberattacks-data-breaches/yakuza-victim-data-leaked-japanese-attack&title=Yakuza%20Victim%20Data%20Leaked%20in%20Japanese%20Agency%20Attack) About the Author—————-![Dark Reading Staff](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt99b391f0439c1434/64f179af7de67f4e4300e517/285801_DR23_Graphics_Website_Author_Logo_0.jpg?width=400&auto=webp&quality=80&disable=upscale ‘Dark Reading Staff’) [Dark Reading Staff](/author/dark-reading-staff) Dark Reading Dark Reading is a leading cybersecurity media site. [See more from Dark Reading Staff](/author/dark-reading-staff) Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox. [Subscribe](https://dr-resources.darkreading.com/free/w_defa3135/prgm.cgi)You May Also Like*** ** * ** ***More Insights Webinars* [The Unreasonable Effectiveness of Inside Out Attack Surface Management](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_runz04&ch=SBX&cid=_upcoming_webinars_8.500001502&_mc=_upcoming_webinars_8.500001502)Dec 4, 2024[More Webinars](/resources?types=Webinar) Events* [Cybersecurity Outlook 2025](https://darkreading.tradepub.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa7201&ch=SBX&cid=_session_16.500326&_mc=_session_16.500326)Dec 5, 2024[More Events](/events) ### Editor’s Choice[Pegasus Spyware concept with binary code background ![](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltf0ced5ec34df837d/673bb5a504ba54193c84a12d/pegasus_Shubham_singh_007_shutterstock.jpg?width=700&auto=webp&quality=80&disable=upscale)](/endpoint-security/whatsapp-nso-group-operates-pegasus-spyware)[Endpoint Security](/endpoint-security) [WhatsApp: NSO Group Operates Pegasus Spyware for Customers](/endpoint-security/whatsapp-nso-group-operates-pegasus-spyware)[WhatsApp: NSO Group Operates Pegasus Spyware for Customers](/endpoint-security/whatsapp-nso-group-operates-pegasus-spyware) by[Jai Vijayan, Contributing Writer](/author/jai-vijayan) Nov 18, 2024 4 Min Read [Laptop with Palo Alto networks logo ![](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt3983709a8adb92d2/6737be7babe559b6e659ec17/palo_alto_tofino_alamy.jpg?width=700&auto=webp&quality=80&disable=upscale)](/cyberattacks-data-breaches/palo-alto-networks-patches-critical-zero-day-bug-firewalls)[Cyberattacks -& Data Breaches](/cyberattacks-data-breaches) [Palo Alto Networks Patches Critical Zero-Day Firewall Bug](/cyberattacks-data-breaches/palo-alto-networks-patches-critical-zero-day-bug-firewalls)[Palo Alto Networks Patches Critical Zero-Day Firewall Bug](/cyberattacks-data-breaches/palo-alto-networks-patches-critical-zero-day-bug-firewalls) by[Becky Bracken, Senior Editor, Dark Reading](/author/becky-bracken) Nov 18, 2024 3 Min Read [ChatGPT, typed out on a screen ![](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltb4bbc78591a9b823/6737abb198fab36b8a54d20c/ChatGPT-mundissima-Alamy.jpg?width=700&auto=webp&quality=80&disable=upscale)](/cloud-security/chatgpt-exposes-instructions-knowledge-os-files)[Сloud Security](/cloud-security) [ChatGPT Exposes Its Instructions, Knowledge -& OS Files](/cloud-security/chatgpt-exposes-instructions-knowledge-os-files)[ChatGPT Exposes Its Instructions, Knowledge -& OS Files](/cloud-security/chatgpt-exposes-instructions-knowledge-os-files) by[Nate Nelson, Contributing Writer](/author/nate-nelson) Nov 15, 2024 4 Min Read Reports* [Managing Third-Party Risk Through Situational Awareness](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_cybo171&ch=&cid=_analytics_7.300006016&_mc=_analytics_7.300006016)Jul 31, 2024* [2024 InformationWeek US IT Salary Report](https://iw-resources.informationweek.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_ingg253&ch=sbx&cid=_analytics_7.300006014&_mc=_analytics_7.300006014)May 29, 2024[More Reports](/resources?types=Report) Webinars* [The Unreasonable Effectiveness of Inside Out Attack Surface Management](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_runz04&ch=SBX&cid=_upcoming_webinars_8.500001502&_mc=_upcoming_webinars_8.500001502)Dec 4, 2024[More Webinars](/resources?types=Webinar) White Papers* [The Definitive Guide to Container Security](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_palo249&ch=SBX&cid=_whitepaper_14.500005836&_mc=_whitepaper_14.500005836)* [The State of Vulnerability Management in the Enterprise](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_adaa07&ch=SBX&cid=_whitepaper_14.500005831&_mc=_whitepaper_14.500005831)* [Solution Brief: Introducing the runZero Platform](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa6967&ch=SBX&cid=_whitepaper_14.500005792&_mc=_whitepaper_14.500005792)* [The ROI of RevealX Against Ransomware](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa6910&ch=SBX&cid=_whitepaper_14.500005780&_mc=_whitepaper_14.500005780)* [Generative AI Gifts](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_senu28&ch=SBX&cid=_whitepaper_14.500005773&_mc=_whitepaper_14.500005773)[More Whitepapers](/resources?types=Whitepaper) Events* [Cybersecurity Outlook 2025](https://darkreading.tradepub.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa7201&ch=SBX&cid=_session_16.500326&_mc=_session_16.500326)Dec 5, 2024[More Events](/events)
Related Tags:
NAICS: 923 – Administration Of Human Resource Programs
NAICS: 81 – Other Services (except Public Administration)
NAICS: 92 – Public Administration
NAICS: 813 – Religious
Grantmaking
Civic
Professional Services
Similar Services
Blog: Dark Reading
Phishing
Software Discovery: Security Software Discovery
Software Discovery
File and Directory Discovery
Associated Indicators: