Supply chain ⛓ Supply Chain

Mitsubishi Electric Breach — Tick APT / Trend Micro OfficeScan Zero-Day (2019–2020)

📅 2019-06-28 🏢 Trend Micro OfficeScan (via China-based affiliated company) 🔎 CVE-2019-18187
Primary Source ↗

Incident Details

On June 28, 2019, threat actors — widely attributed to the Chinese state-sponsored APT group known as Tick (also tracked as Bronze Butler and associated with APT40) — breached Mitsubishi Electric’s corporate network through a China-based affiliate of the company. The intrusion was not publicly disclosed until January 20, 2020, following reporting by Japanese newspapers Asahi Shimbun and Nikkei that forced the company’s hand. Mitsubishi Electric had been investigating the breach internally since September 2019. The attackers exploited CVE-2019-18187, a directory traversal and arbitrary file upload vulnerability in Trend Micro OfficeScan antivirus software. Trend Micro had patched this flaw in October 2019, but the attackers had already used it as a foothold months earlier. The compromise began at a subsidiary or affiliated office in China, then pivoted laterally to Mitsubishi Electric’s systems in Japan, ultimately spreading across approximately 120 systems at 14 locations. Data stolen in the breach included: employment applications for approximately 8,122 individuals, the results of an employee survey completed by 4,566 people, details on 1,569 employees who retired between 2007 and 2019, corporate information including confidential technical documents and sales materials, and — critically — data relating to Japanese government agencies and defense programs. The Japan Ministry of Defense confirmed that sensitive defense-related data may have been compromised, with data connected to at least 10 public and government bodies including the Ministry of Defense, Cabinet Office, Nuclear Regulatory Commission, Ministry of the Environment, and the Agency for Natural Resources and Energy. The Tick APT group is known for long-running cyber espionage campaigns targeting defense contractors, aerospace firms, and critical infrastructure operators in Japan and Taiwan. The Mitsubishi Electric breach is consistent with their pattern of using subsidiary or affiliate access in China as a bridgehead into Japanese parent companies. The multi-month dwell time between initial compromise (June 2019) and public disclosure (January 2020) allowed extensive data exfiltration before detection. The incident prompted Japan to review its cybersecurity requirements for defense contractors and raised broader concerns about the security posture of Japanese industrial firms with significant operations in China.

Technical Details

Initial Attack Vector
Exploitation of zero-day vulnerability (CVE-2019-18187) in Trend Micro OfficeScan antivirus via compromised China-based affiliate, enabling lateral movement to Japan headquarters
Vendor / Product
Trend Micro OfficeScan (via China-based affiliated company)
Software Package
Trend Micro OfficeScan
CVE / GHSA References
CVE-2019-18187
Supply Chain Attack
✅ Confirmed third-party / vendor compromise

Timeline

  1. 2019-06-28 Breach occurred
  2. 2020-01-20 Publicly disclosed
  3. 2020-01-20 Customers notified