Security

Cyber-crime

Casio keyed up after data loss hits customers in 149 countries

Crooks broke into the ClassPad server and swiped online learning database


Japanese electronics giant Casio said miscreants broke into its ClassPad server and stole a database with personal information belonging to customers in 149 countries.

ClassPad is Casio's education web app, and in a Wednesday statement on its website, the firm said an intruder breached a ClassPad server and swiped hundreds of thousands of "items" belonging to individuals and organizations around the globe. 

As of October 18, the crooks accessed 91,921 items belonging to Japanese customers, including individuals and 1,108 educational institution customers, as well as 35,049 items belonging to customers from 148 other countries. If Casio finds additional customers were compromised, it promises to update this count.

The data included customers' names, email addresses, country of residence, purchasing info including order details, payment method and license code, and service usage info including log data and nicknames. Casio noted that it doesn't not retain customers' credit card information, so presumably people's banking info wasn't compromised in the hack.

The electronics giant didn't immediately respond to The Register's questions about the intrusion. 

An employee discovered the incident on October 11 while attempting to work in the corporate dev environment and spotted the database failure.

"At this time, it has been confirmed that some of the network security settings in the development environment were disabled due to an operational error of the system by the department in charge and insufficient operational management," the official notice said

"Casio believes these were the causes of the situation that allowed an external party to gain unauthorized access."

The intruder didn't access the ClassPad.net app, according to Casio, so that is still available for use.

In response to the problem, Casio has blocked outside access to all databases in the development environment that were targeted by the attackers. The Japanese giant also said it's working with a third-party security firm on the breach investigation and response.

Casio has reported the incident to law enforcement, as well as Japan's Personal Information Protection Commission and JUAS, the PrivacyMark certification organization.

All customers whose personal information may have been accessed will be contacted, it promised, and Casio will also respond to inquiries via this contact form. ®

Casio's breach follows several other high-profile data heists disclosed this week, including a second batch of stolen data from 23andMe being leaked on a cybercrime data. It appears to be the same criminal who broke into the biotech company and leaked profile data two weeks ago. ®

Send us news
12 Comments

Iranian ransomware crew reemerges, promises big bucks for attacks on US or Israel

Tells would-be affiliates they don't need to worry because cyberattacks don't violate a cease fire

CitrixBleed 2 exploits are on the loose as security researchers yell and wave their hands

NetScaler vendor issued a patch but otherwise, stony silence

Massive browser hijacking campaign infects 2.3M Chrome, Edge users

These extensions weren't malware-laced from the start, researcher says

Suspected Scattered Spider domains target everyone from manufacturers to Chipotle

Plus: Qantas makes contact with 'potential cyber criminal'

Crims are posing as insurance companies to steal health records and payment info

Taking advantage of the ridiculously complex US healthcare billing system

Aloha, you’ve been pwned: Hawaiian Airlines discloses ‘cybersecurity event’

'No impact on safety,' FAA tells The Reg

FBI used bitcoin wallet records to peg notorious IntelBroker as UK national

Pro tip: Don't use your personal email account on BreachForums

Iran cyberattacks against US biz more likely following air strikes

Plus 'low-level' hacktivist attempts

That WhatsApp from an Israeli infosec expert could be a Iranian phish

Charming Kitten unsheathes its claws and tries to catch credentials

Typhoon-like gang slinging TLS certificate 'signed' by the Los Angeles Police Department

Chinese crew built 1,000+ device network that runs on home devices then targets critical infrastructure

Beware of fake SonicWall VPN app that steals users' credentials

A good reminder not to download apps from non-vendor sites

Back in black: Microsoft Blue Screen of Death is going dark

At least the BSOD acronym will still work