The Japanese government has uncovered a sophisticated Trojan attack that has been stealing sensitive meeting documents from its networks for over two years, according to the region's Kyodo news service.
The Finance Ministry reportedly confirmed the attack on 21 July, admitting the attack had likely first infected the government's network in January 2010. A second infection was also confirmed in November 2011.
The infections were reportedly discovered last week, though at the time of publishing the agency's press office had not responded to V3's request for confirmation.
The Trojan had reportedly infected 123 of the 2,000 machines the agency checked. The government claimed confidential information, such as taxpayers' details have not been compromised and that the only data taken related to ministry meetings.
Kyodo indicated that the government suspects hacktivist collective Anonymous of playing a role in the attack.
The collective is currently mounting a series of attacks targeting Japanese businesses and agencies to protest a copyright infringement law passed by the government.
If true, the Trojan would mark an escalation in Anonymous attack pattern, with the collective usually using more basic techniques, like distributed denial of service attacks.
The Trojan is one of many new cyber campaigns discovered targeting government data. Previously the Madi malware was discovered targeting several Middle Eastern government agencies' networks.
Claims to have "the most competitive logic density" in the industry
Dell's high-end mobile workstations upgraded with Intel Coffee Lake CPUs
Webstresser admins were also arrested in the UK, Croatia, Canada and Serbia
Security firm claims that 117,638 sites out of 135,035 analysed contain serious security flaws