Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      BrowserStack launches Figma plugin for detecting accessibility issues in design phase

      July 22, 2025

      Parasoft brings agentic AI to service virtualization in latest release

      July 22, 2025

      Node.js vs. Python for Backend: 7 Reasons C-Level Leaders Choose Node.js Talent

      July 21, 2025

      Handling JavaScript Event Listeners With Parameters

      July 21, 2025

      I finally gave NotebookLM my full attention – and it really is a total game changer

      July 22, 2025

      Google Chrome for iOS now lets you switch between personal and work accounts

      July 22, 2025

      How the Trump administration changed AI: A timeline

      July 22, 2025

      Download your photos before AT&T shuts down its cloud storage service permanently

      July 22, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Laravel Live Denmark

      July 22, 2025
      Recent

      Laravel Live Denmark

      July 22, 2025

      The July 2025 Laravel Worldwide Meetup is Today

      July 22, 2025

      Livewire Security Vulnerability

      July 22, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Galaxy Z Fold 7 review: Six years later — Samsung finally cracks the foldable code

      July 22, 2025
      Recent

      Galaxy Z Fold 7 review: Six years later — Samsung finally cracks the foldable code

      July 22, 2025

      Halo and Half-Life combine in wild new mod, bringing two of my favorite games together in one — here’s how to play, and how it works

      July 22, 2025

      Surprise! The iconic Roblox ‘oof’ sound is back — the beloved meme makes “a comeback so good it hurts” after three years of licensing issues

      July 22, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Japan Warns of Hacked Trading Accounts and Unauthorized Trades

    Japan Warns of Hacked Trading Accounts and Unauthorized Trades

    April 21, 2025

    hacked trading accounts (image: Stockcharts)

    Japan’s Financial Services Agency (FSA) warned last week of the growing threat of hacked trading accounts that has resulted in nearly US $700 million in unauthorized trades since March.

    The FSA documented a sharp increase in the number of such fraudulent trades, from 33 in February to 685 in March and 736 through the first 16 days of April. Accounts in at least six securities firms have been targeted in the attacks.

    While the FSA cited stolen login information from “fake websites (phishing sites) disguised as websites of real securities companies,” a separate advisory from the Japan Securities Dealers Association (JSDA) also cited infostealer malware as a cause of some stolen credentials.

    The surge in compromised accounts has itself been used as a pretext for phishing attacks, JSDA said.

    “Taking advantage of this situation, we have also received many reports of emails being sent in the name of the Japan Securities Dealers Association or securities companies, warning people to be careful of phishing scams, with the aim of getting people to click on suspicious URLs,” the JSDA said.

    Chinese Stocks Left in Hacked Trading Accounts

    The number of unauthorized account accesses has also increased sharply in recent months, from 43 in February to 1,422 in March, and 1,847 through the first 16 days of April, for a three-month total of 3,312 compromised accounts, according to the FSA.

    In most cases, the FSA said “fraudsters gain unauthorized access to victim accounts and manipulate them to sell stocks etc. in the accounts, and use the proceeds to buy Chinese stocks etc. As a result of the fraudulent transactions, the Chinese stocks etc. remain in the victim accounts.”

    That suggests that share price manipulation could be one possible motive of the fraudulent transactions, to artificially move the share prices of Chinese stocks and other targeted securities that the fraudsters may have a position in.

    While the FSA listed total sales (50.6 billion yen) and purchase amounts (44.8 billion yen) for the fraudulent trades over the last three months, the agency noted that those figures do not equate to investor losses from the scams, merely the total amount of the transactions.

    Protecting Against Hacked Trading Accounts

    The FSA and JSDA both issued steps investors should take to protect themselves from account hacks.

    • Don’t open links contained in emails or texts “even if the sender looks familiar.”
    • Bookmark the correct website URL for your security company and access it only from the bookmark.
    • Enable enhanced security features offered by securities companies such as multi-factor authentication and notification services when logging in, executing a trade, and withdrawing funds, and watch for suspicious transactions.
    • Don’t reuse passwords, and don’t use simple passwords that are easy to guess. Combine numbers, uppercase and lowercase letters, and symbols.

    The FSA urged account holders to check the status of their accounts frequently, “and if you suspect that you may have entered information on a suspicious website or are engaged in suspicious transactions, contact the inquiry desk of your securities company and change your passwords immediately.”

    Dark web monitoring is a good resource for discovering leaked account credentials, both for financial services companies and their customers.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleZelenskyy Signs Law Advancing Cybersecurity of Ukraine’s State Networks and Critical Infrastructure
    Next Article SuperCard X Android Malware Enables Contactless ATM and PoS Fraud via NFC Relay Attacks

    Related Posts

    Development

    Laravel Live Denmark

    July 22, 2025
    Development

    The July 2025 Laravel Worldwide Meetup is Today

    July 22, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    IBM AI Releases Granite 4.0 Tiny Preview: A Compact Open-Language Model Optimized for Long-Context and Instruction Tasks

    Machine Learning

    CVE-2025-54066 – DiracX-Web Redirect Hijacking Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    How to share files with sensitive content securely on Windows 11

    News & Updates

    Leveraging Model Context Protocol (MCP) for AI Efficiency in Databricks

    Development

    Highlights

    CVE-2025-30167 – Jupyter Core Unrestricted Configuration File Path Vulnerability

    June 3, 2025

    CVE ID : CVE-2025-30167

    Published : June 3, 2025, 5:15 p.m. | 2 hours, 15 minutes ago

    Description : Jupyter Core is a package for the core common functionality of Jupyter projects. When using Jupyter Core prior to version 5.8.0 on Windows, the shared `%PROGRAMDATA%` directory is searched for configuration files (`SYSTEM_CONFIG_PATH` and `SYSTEM_JUPYTER_PATH`), which may allow users to create configuration files affecting other users. Only shared Windows systems with multiple users and unprotected `%PROGRAMDATA%` are affected. Users should upgrade to Jupyter Core version 5.8.0 or later to receive a patch. Some other mitigations are available. As administrator, modify the permissions on the `%PROGRAMDATA%` directory so it is not writable by unauthorized users; or as administrator, create the `%PROGRAMDATA%jupyter` directory with appropriately restrictive permissions; or as user or administrator, set the `%PROGRAMDATA%` environment variable to a directory with appropriately restrictive permissions (e.g. controlled by administrators _or_ the current user).

    Severity: 7.3 | HIGH

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    CVE-2025-4105 – Splitit WordPress Authorized Data Modification Vulnerability

    May 21, 2025

    CVE-2025-43955 – Convertigo TwsCachedXPathAPI Commons-JXPath API Deserialization Vulnerability

    April 20, 2025

    Look, no patches! Why Chainguard OS might be the most secure Linux ever

    April 3, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.