[Issue #3] Japan’s Expanding Cyberattack Surface and a Historic Shift in Defense Policy

Cybersecurity operations center with network monitoring screens

This report summarizes cybersecurity incidents and policy developments publicly disclosed in Japan during the coverage period. It is written for international readers who may be unfamiliar with Japan’s institutional landscape and corporate structures. Where relevant, brief contextual notes are provided.

⚡ Geopolitical Context

This issue is framed against an extraordinary geopolitical backdrop: on February 28, 2026, the United States and Israel launched Operation Epic Fury, a large-scale military campaign targeting Iran. The operation opened in cyberspace before expanding to kinetic strikes — and its reverberations have been felt in Japanese corporate networks, government policy timelines, and the global threat landscape throughout March.

Section 01

Cybersecurity Incidents

Ransomware & Intrusions into Critical Infrastructure

National Diet Library (NDL)
3rd Disclosure

March 11, 2026

Japan’s equivalent of the U.S. Library of Congress released its third disclosure regarding an unauthorized access incident first revealed in November 2025. The breach originated at a sub-contractor of Internet Initiative Japan (IIJ). The possible leak of user data remains under active investigation.

The case has re-ignited a structural policy debate: Japan’s Act on the Protection of Personal Information does not extend to the National Diet, the courts, or local assemblies — meaning institutions that process vast amounts of citizen data operate under a lighter accountability regime than ordinary government agencies or private companies.

Medica Publishing
Ransomware

March 17, 2026

A ransomware attack struck one of Japan’s leading publishers of medical and nursing textbooks, professional journals, and clinical decision-support tools. System disruption and potential data leakage were confirmed. The company’s role as a trusted information hub for tens of thousands of healthcare practitioners raises concerns about downstream exposure across Japan’s medical community.

Nihon Swagelok FST
Ransomware

March 13, 2026

The Japanese subsidiary of U.S. industrial fittings and fluid systems manufacturer Swagelok disclosed a ransomware attack that caused malfunctions across its internal network.

Maruko Kogyo
Unauthorised Access

March 13, 2026

The industrial company disclosed that its file server had been accessed without authorization on March 1.

Context. Victims this month span healthcare, manufacturing, printing, and logistics — a cross-sector pattern consistent with 2025 trends. Japan designates hospitals and utilities as critical infrastructure under its national cybersecurity framework, yet ransomware actors continue to target them with little apparent deterrence.

Ransomware warning on computer screen
Cross-sector ransomware attacks continued to disrupt Japanese organizations throughout March 2026.

Manufacturing & Intellectual Property Incidents

Murata Manufacturing
2nd Breach in 3 yrs

March 6, 2026

One of the world’s largest manufacturers of electronic components — a key supplier in global semiconductor and consumer electronics supply chains — disclosed an unauthorized IT intrusion. Murata’s annual revenue exceeds approximately USD 12 billion. The company acknowledged the possible unauthorized reading of both its own proprietary data and records relating to external business partners, while asserting that its order-management systems remained operational.

Notably, this is Murata’s second publicly disclosed intrusion in three years. The 2023 incident was traced to entry through an overseas subsidiary — a pattern that recurred as a probable vector here.

Institute for Infocomm Research and Training (INPIT)
IP Risk

March 6, 2026

INPIT — the body under Japan’s Patent Office responsible for managing national databases of patents, trademarks, and industrial designs — disclosed an unauthorized access incident. As a repository of proprietary technical information with direct ties to Japan’s industrial competitiveness and export-control regime, even a partial breach carries implications beyond simple data loss.

Context. Japan’s manufacturing sector is characterized by tightly integrated domestic and international supply chains. Attacks targeting component makers or IP custodians like INPIT can have far-reaching effects on industries and trading partners well beyond Japan’s borders.

Supply Chain Cascades

Context. Japan’s corporate ecosystem is built on layered subcontracting: prime contractors routinely delegate work to second- and third-tier vendors, each of which may share systems or data with the original client. The Japan Network Security Association (JNSA) identified cascading supply-chain liability — including multimillion-dollar legal claims between companies — as the defining domestic cyber threat of 2025.

Other Notable Incidents

Survey Data: KPMG Japan / Nikkei Cybersecurity Survey 2026

Conducted across 424 listed Japanese companies, October–November 2025.

49.2%

Reported phishing attacks (whether or not damage resulted)

38.2%

Affected by AI-enhanced business email compromise

6.9%

Reported actual business disruption from ransomware

6.2%

Experienced deepfake-based fraudulent payment instructions

63.2%

Rated their cybersecurity budget as insufficient

¥1B+

First-ever respondent reporting losses exceeding JPY 1 billion in a single year

Section 02

Operation Epic Fury & the Cyber Dimension of the Middle East Conflict

A War That Began in Cyberspace

When the United States and Israel launched Operation Epic Fury against Iran on February 28, 2026, the first shots were not fired from aircraft — they came from keyboards. U.S. Cyber Command and Space Force conducted disruption operations against Iranian communications networks and surveillance infrastructure in the hours before the kinetic strikes began. Iranian domestic internet connectivity fell to an estimated 1–4% of normal levels within hours, effectively severing the country’s state-affiliated cyber units from their command-and-control (C2) networks.

Operation Epic Fury opened with coordinated cyber operations before any kinetic strikes were launched.

That initial disruption proved to be a double-edged development. While it degraded Iran’s coordinated offensive capacity inside the country, threat actors operating Iranian-linked infrastructure abroad continued unimpeded. Within 24 hours of hostilities beginning, approximately 60 hacktivist groups — including pro-Russian factions — had organized under a coordination structure called the Electronic Operations Room, conducting DDoS campaigns against Western financial institutions, government portals, and energy sector targets.

Phishing emails posed as U.S. State Department communications sharing “classified images” of Supreme Leader Khamenei’s death. A second wave claimed to provide evidence of Israeli preparations for attacks on Gulf oil and gas infrastructure. The speed of deployment suggests pre-positioning of operational infrastructure ahead of anticipated conflict.

State-Sponsored Espionage Surges — Exploiting the Conflict as Cover

Security firm Proofpoint documented a rapid intensification of nation-state espionage campaigns targeting Middle Eastern government and diplomatic bodies in the days following the outbreak — with multiple actors using the conflict itself as bait.

UNK_InnerAmbush
China-linked · Active from March 1

Phishing emails posed as U.S. State Department communications sharing “classified images” of Supreme Leader Khamenei’s death. A second wave claimed to provide evidence of Israeli preparations for attacks on Gulf oil and gas infrastructure. The speed of deployment suggests pre-positioning of operational infrastructure ahead of anticipated conflict.

TA473 (Winter Vivern)
Belarus-linked · Active March 3–5

This group — which had not previously been observed targeting Middle Eastern entities — impersonated a European Council spokesperson in HTML-attachment phishing sent to European and Middle Eastern government targets. The broadening of TA473’s targeting scope is itself a notable indicator.

Context. Japan is not a direct party to the conflict, but Japanese firms operating in the Gulf region reported a sharp uptick in targeted intrusion attempts throughout March — consistent with the broader pattern of conflict-opportunistic cyberattacks.

Section 03

State-Sponsored Attacks Targeting Japan

MirrorFace / Earth Kasha — VSCode Tunneling Abuse
State-sponsored

March 11, 2026

MirrorFace — assessed to be operating on behalf of Chinese state interests — was found to be abusing the remote tunneling feature built into Microsoft Visual Studio Code (VSCode) to establish hidden communication channels inside Japanese technology companies. The technique is significant: by repurposing a legitimate, widely trusted developer tool as covert infrastructure, the group can evade many conventional security controls that look for known malware signatures rather than behavioral anomalies.

MirrorFace has operated against Japan since at least 2019, targeting government ministries, the Ministry of Defense, semiconductor manufacturers, JAXA, politicians, and think tanks. It has more recently expanded its remit to manufacturing and applied research institutions — sectors now central to Japan’s economic security agenda.

State-sponsored hacking — code on dark terminal screen
MirrorFace abused Microsoft VSCode's remote tunneling feature to evade conventional detection controls.
Government-Funded Research Breach — Semiconductor & Battery Technology
Critical IP Theft

March 11, 2026

Unauthorized exfiltration of sensitive data from government-funded research programs in the semiconductor and next-generation battery sectors was detected on March 5. Japanese authorities convened emergency countermeasures. Official disclosure remains limited — but the sectors targeted sit at the very core of Japan’s Chip Act-era industrial strategy and its alliance commitments on technology security.

Context. Japan’s NPA and NISC issued a joint advisory in January 2025 assessing MirrorFace as conducting “systematic cyber attack activity with suspected Chinese involvement, aimed at stealing information related to Japan’s national security and advanced technology.” March activity represents a direct continuation of that campaign. Japan thus faces a two-front challenge: financially-motivated criminal ransomware, and patient state-sponsored espionage — each requiring a fundamentally different response posture.

Section 04

Policy Developments

🛡 Active Cyber Defense Target Date: October 1, 2026 (Cabinet Announcement, March 17)

The government announced on March 17 its target to begin operationalizing its “active cyber defense” framework from October 1, 2026 — though this date has not yet been formally confirmed by ordinance, and some legal analyses cite a statutory window of “on or before November 2026.” Chief Cabinet Secretary Minoru Kihara made the announcement. The move translates legislation passed by the Diet in May 2025 into operational rules, granting the National Police Agency and Self-Defense Forces authority to conduct proactive cyber operations against threat actors — including pre-emptive disruption of infrastructure used to prepare attacks against Japan. Full-scale operation is broadly expected to follow in FY2027.

The government framed Japan’s current threat environment as “the most complex security environment since World War II.” Defense analysts have noted that the model closely mirrors U.S. Cyber Command’s “defend forward” doctrine, and the timing — announced weeks after the cyber-first opening of Operation Epic Fury — is unlikely to be coincidental.

📋 IPA Releases Organizational Guidance — Information Security Top 10 Threats 2026 (March 12)

Japan’s Information-technology Promotion Agency (IPA) — roughly analogous to CISA in a guidance and awareness capacity — published the organizational commentary volume accompanying its annual threat ranking. AI-enabled attack techniques featured prominently on this year’s list.

📅 Cybersecurity Month Closes (February 1 – March 18)

Japan’s government-designated awareness campaign period concluded. The Cabinet Secretariat’s National Cyber Director’s Office (NCO) — established in July 2025 as the successor to the former NISC — led public-facing awareness activities.

Japanese government cybersecurity policy — digital governance
Japan's October 2026 active cyber defense launch marks the most significant shift in the country's cybersecurity posture in decades.

Context. Japan has historically approached offensive cyber authority with considerable caution — a posture rooted in constitutional constraints, alliance sensitivities, and parliamentary skepticism. The October 2026 operationalization of active cyber defense marks a fundamental departure. Coming in the wake of Operation Epic Fury’s demonstration that modern conflicts are won or lost first in the electromagnetic and digital domains, the decision reflects a broader recalibration of Japan’s security posture that will be closely watched by allies and adversaries alike.

Section 05

International Cooperation

Context. Japan’s approach to cyber policy has always been shaped by its alliance commitments — particularly with the United States — and by the desire to maintain interoperability with European regulatory frameworks. The targeted October 2026 active cyber defense launch will be the most significant test yet of how those alliance relationships translate into joint operational practice.

Summary Asessment

March 2026 illustrated with unusual clarity that Japan’s cybersecurity challenges are no longer separable from its national security challenges.

On the incident side, the month’s disclosures spanned healthcare, precision manufacturing, intellectual property custodians, public institutions, and educational organizations — confirming that no sector is insulated. The simultaneous presence of financially-motivated ransomware actors and patient, state-directed espionage groups (MirrorFace; the research data breach) means organizations must defend against fundamentally different threat models at the same time.

On the policy side, the government’s March 17 announcement targeting an October 2026 launch of active cyber defense operations represents the most consequential shift in Japan’s cybersecurity posture since the country began treating cyber as a security domain — though the exact implementation date remains subject to formal ordinance.

For international observers, Japan in March 2026 is a country in transition: from reactive incident management toward a more assertive, strategy-driven posture. The gap between policy ambition and institutional capacity remains significant, but the direction of travel is clear.

JICSS Special Feature

Expert Commentary

IK

Ilya Kulyatin

Founder, Ai Foundry - Tokyo

Ilya is the CEO of Foundry Labs, a Tokyo-based AI systems integrator providing AI engineering services across enterprise, physical, and scientific domains. He is also the Founder of Tokyo AI (TAI), Japan’s largest international AI community with over 4,500 members, focused on making Japan a premier destination for AI and robotics.

 

With an interdisciplinary background spanning Business, Finance, and Machine Learning, Ilya has built startups and led quantitative research and machine learning initiatives across Italy, USA, UK, Netherlands, Singapore, and Japan. He is actively involved in shaping cross-border AI collaboration, including policy discussions on democratic AI governance and international research partnerships. His work bridges Japanese and global startup ecosystems, connecting founders, investors, and researchers across markets.
Practitioner's Perspective
Sovereign AI and Japan's Resilience Stack

Sovereign AI has entered the mainstream policy vocabulary. But as someone building AI systems in Tokyo and working closely with Japan’s startup and enterprise ecosystem, I want to offer a practitioner’s perspective: sovereignty is an architecture problem. For Japan’s national resilience, the architecture has some important gaps.

I think of sovereign AI as a five-layer stack: data residency at the base, then hardware (chips), cloud infrastructure (data centers), AI models, and inference (where AI actually runs in production). Each layer has its own dependency profile, and sovereignty at the top layers is hollow without control of the layers beneath.

5 · Inference
where AI runs in production
4 · AI Models
LLMs, foundation models
3 · Cloud Infrastructure
data centers, compute platforms
2 · Hardware
chips, GPUs
1 · Data Residency
base layer

Are we moving in the right direction? Japan’s AI Basic Plan, approved in December 2025, rightly frames AI as critical infrastructure. The government has committed ¥10 trillion to semiconductors and ¥1 trillion over five years to AI development. Serious numbers. But Japan still runs primarily on four foreign platforms (Amazon, Microsoft, Google, and Oracle). Domestic GPU compute covers roughly 30% of demand. That’s a significant gap between ambition and operational reality.

For this security community, let’s consider three implications.

Implication 01
Inference is the new attack surface

Two-thirds of AI compute is now inference: running models in production, processing data, generating outputs. AI agents are making thousands of API calls per task, each an authentication and authorization event. Yet only 11% of Japanese organizations conduct real-time API security testing, even as 85% of APAC organizations report API security incidents annually. The proliferation of AI agents is creating a massive, under-defended surface.

Implication 02
AI compresses attacker timelines

Autonomous AI tools can discover vulnerabilities, craft exploits, and move laterally in 48 hours. This cycle used to take months. When the adversary operates at machine speed, human-paced incident response becomes structurally inadequate. This now requires distributed security architectures, inspecting AI traffic at the edge, as the round-trip time to the data center is too slow.

Implication 03
Identity is the hidden sovereignty layer

Non-human identities (AI agents, service accounts, API keys) now outnumber human identities 82 to 1. Whoever controls the authentication and authorization layer controls what AI systems can access and do. Most of that identity infrastructure today is foreign-operated SaaS. For critical sectors such as finance, healthcare, and defense, this is a dependency that warrants the same scrutiny we give to hardware supply chains. The recent software supply chain attacks are just the start.

Japan has the components for a genuinely sovereign AI stack: world-class robotics and physical AI talent, domestic LLMs matching frontier performance on Japanese tasks, and one of the most AI-friendly regulatory environments among advanced democracies. But it would be misleading to suggest the components are all in place. Data governance is tightening but enforcement remains untested. Hardware still depends overwhelmingly on a single foreign supplier. Cloud infrastructure runs primarily on foreign platforms. Domestic models exist but adoption lags every major economy. Inference and security architectures are nascent to say the least.

No single layer can be ignored, because weakness at any level undermines sovereignty at every level above it. The baseline is there, but what Japan needs now is a full-stack view: an honest assessment of each layer’s maturity, and the integration work to connect them into deployable, secure, enterprise-grade systems that local and foreign institutions can actually trust.

“We can’t just declare sovereignty. We need to build it, layer by layer, in the field. Japan’s security posture depends on getting this right.”

Information in this report reflects publicly available sources as of April 10, 2026.

This report was compiled from open-source materials available as of April 10, 2026. Findings may be updated as investigations and policy processes develop. This document is for informational purposes only.

Share the Post:

Related Posts

Login

Please log in below.

Privacy Policy

The Japan Institute for CyberSpace Studies (hereinafter referred to as "JICSS") has established the following privacy policy (hereinafter referred to as "the Policy") regarding the handling of personal information of users in the services provided on this website (hereinafter referred to as "the Services").

Article 1 (Personal Information)
“Personal information” refers to "personal information" as defined in the Act on the Protection of Personal Information, and includes information about living individuals that can be used to identify specific individuals by name, date of birth, address, telephone number, contact information, and other descriptions, as well as data related to appearance, fingerprints, voiceprints, and health insurance card insurer numbers.

Article 2 (Method of Collecting Personal Information)
When you submit an inquiry form, JICSS will obtain your name and e-mail address.

Article 3 (Purpose of Collection and Use of Personal Information)
The purposes for which JICSS collect and use personal information are as follows

To provide and operate our services
To respond to inquiries from users (including identification)
To send e-mail notifications of new features, updates, campaigns, etc. of the service the user is using, as well as information on other services provided by the Company.
To contact you as necessary for maintenance, important notices, etc.
To identify users who violate the Terms of Use or who attempt to use the service for illegal or unjust purposes, and to refuse their use of the service.
To allow users to view, change, or delete their own registration information, or to view the status of their use of the service.
To bill users for paid services.
For purposes incidental to the above purposes of use

Article 4 (Change of Purpose of Use)
JICSS shall change the purpose of use of personal information only when it is reasonably recognized that the purpose of use is related to the purpose of use before the change.
In the event of a change, JICSS shall notify the User of the changed purpose or publicly announce it on this website in a manner prescribed by JICSS.

Article 5 (Provision of Personal Information to Third Parties)
Except in the following cases, JICSS will not provide personal information to a third party without the prior consent of the user. However, this excludes cases permitted under the Personal Information Protection Law and other laws and regulations.
When it is necessary for the protection of the life, body, or property of an individual and it is difficult to obtain the consent of the individual.
When the provision of personal information is especially necessary for improving public health or promoting the sound growth of children, and it is difficult to obtain the consent of the individual concerned.
When it is necessary to cooperate with a national agency, a local government, or an individual or entity entrusted by either a national agency or local government to execute affairs prescribed by law, and obtaining the consent of the individual is likely to impede the execution of such affairs.
When we have notified or announced the following matters in advance, and when we have notified the Personal Information Protection Committee
The purpose of use includes provision to a third party
Data items to be provided to the third party
Means or method of provision to third parties
Cessation of provision of personal information to third parties at the request of the individual
The method of accepting the request of the person in question
Notwithstanding the provisions of the preceding paragraph, in the following cases, the party to which the relevant information is provided shall not fall under the category of a third party.
(i) When we outsource all or part of the handling of personal information within the scope necessary for the achievement of the purpose of use
When personal information is provided as a result of the succession of business due to a merger or other reasons
When personal information is used jointly with a specific person, and the Company notifies the person in advance or makes the information readily accessible to the person in advance to that effect, the items of personal information jointly used, the scope of joint use, the purpose of use by the person using the information, and the name of the person responsible for managing the personal information Article 6 (Disclosure of Personal Information)

Article 6 (Disclosure of Personal Information)
When requested to disclose personal information by the person in question, JICSS will disclose such information to the person without delay. However, if JICSS decides not to disclose the personal information, it will notify the individual to that effect without delay. A fee of 1,000 yen will be charged for each case of disclosure of personal information.
When there is a risk of harm to the life, body, property, or other rights or interests of the person concerned or a third party
If there is a risk of significant hindrance to the proper conduct of our business
If it violates any other laws or regulations.
Notwithstanding the preceding paragraph, in principle, JICSS will not disclose information other than personal information, such as historical information and characteristic information.

Article 7 (Correction and Deletion of Personal Information)
If the User's personal information held by JICSS is incorrect, the User may request JICSS to correct, add, or delete (hereinafter referred to as "correct, etc.") his/her personal information in accordance with procedures determined by JICSS.
If we deem it necessary to respond to the request from the user as described in the preceding paragraph, we will make the correction, etc. to the relevant personal information without delay.
In the event that JICSS makes corrections, etc. based on the preceding paragraph, or decides not to make such corrections, etc., JICSS will notify the User of such decision without delay.

Article 8 (Suspension of Use of Personal Information)
When we receive a request from a user to stop using or delete (hereinafter referred to as "stop using, etc.") his/her personal information on the grounds that it has been handled beyond the scope of the purpose of use or that it has been obtained by wrongful means, we will conduct the necessary investigation without delay.
If, based on the results of the investigation described in the preceding paragraph, we determine that it is necessary to comply with the request, we will suspend the use of the relevant personal information without delay.
When JICSS suspends the use of personal information in accordance with the preceding paragraph or decides not to suspend the use of personal information, JICSS will notify the user of this decision without delay.
Notwithstanding the preceding two paragraphs, in cases where the suspension of use involves a large amount of cost or it is otherwise difficult to suspend the use of personal information, and alternative measures can be taken to protect the rights and interests of the user, these alternative measures shall be taken.

Article 9 (Changes to Privacy Policy)
The contents of this Privacy Policy may be changed without notice to the User, except as otherwise provided by law or other regulations.
Unless otherwise specified by the Company, the revised Privacy Policy shall take effect from the time it is posted on the Website.

Article 10 (Contact for Inquiries)
Inquiries regarding this policy should be directed to the following contact

Commercial Disclosure

Legal Name The Japan Institute for CyberSpace Studies (JICSS), also registered as 一般社団法人 サイバー空間総合研究所.

Representative Our operations are led by our Director, Terutaka Kawabata.

Address Our headquarters are located at the Ginza Main Office: 4F Ginza KR II Bldg, 2-15-2 Ginza, Chuo-ku, Tokyo 104-0061, Japan.

Contact Information For inquiries, please contact us via email at info@jicss.org or by phone at +81 3 6281 5152. Our telephone support is generally available during standard business hours (10:00–17:00 JST), excluding weekends and public holidays.

Pricing and Additional Fees Service prices and membership dues are clearly displayed on the respective registration or checkout pages. There are no additional hidden fees for digital services; however, any bank transfer fees or internet connection costs remain the responsibility of the customer.

Payment Methods and Timing We accept payments via Credit Card (processed through Stripe) and Bank Transfer. Credit card payments are processed immediately at the time of purchase. For bank transfers, payment is required within 7 days of the order.

Delivery of Services Digital memberships and access to research materials are provisioned immediately upon successful completion of the payment process.

Cancellations and Refunds Due to the nature of digital content and immediate access to membership benefits, we generally do not offer refunds once a transaction is completed. You may cancel your membership at any time to prevent future billing through your account settings, but previous payments are non-refundable.