17,368
Nikkei Inc., a major Japanese publishing house and owner of the Financial Times, has revealed it suffered a data breach after an unauthorized actor gained access to its internal Slack workspace. The attacker leveraged credentials and session tokens stolen by infostealer malware from an employee's personal computer. The breach compromised the personal information and chat histories of 17,368 registered users, including employees and partners. The incident underscores the critical importance of endpoint security and protecting against credential harvesting attacks, which can bypass traditional network defenses.
The attack vector was an employee's personal computer infected with infostealer malware in August 2025. This type of malware is specifically designed to harvest sensitive information stored on a device, including login credentials, cookies, and session tokens saved in web browsers. By stealing a valid session token for Slack, the attacker was able to log into Nikkei's workspace (nikkeidevs.slack.com) and impersonate the legitimate employee, bypassing MFA and other login-time security controls. The breach was detected by Nikkei's internal security team in September 2025, about a month after the initial computer infection.
Initial Compromise: An employee's personal computer was infected with an unspecified infostealer malware. This likely occurred through a phishing email, a malicious download, or a compromised website.
Credential Access (T1555.003 - Credentials from Web Browsers): The infostealer scanned the computer's web browsers for stored data, successfully exfiltrating authentication credentials, cookies, and active session tokens for Nikkei's Slack workspace.
Initial Access & Defense Evasion (T1078.004 - Valid Accounts: Cloud Accounts): The attacker used the stolen session token to gain access to the nikkeidevs.slack.com workspace. This technique, often called session hijacking or pass-the-cookie, allows an attacker to take over an authenticated session without needing the password.
Collection (T1114.001 - Email Collection: Local Email Collection): Once inside, the attacker had access to the data within the Slack workspace. This included user profiles and the full chat history of all channels the compromised user was a member of.
The breach exposed the data of 17,368 individuals. The compromised information includes:
While Nikkei stated that no information related to journalistic sources was confirmed to be leaked, the exposure of internal communications is a significant security event. The compromised data could be used for:
nikkeidevs), could contain proprietary information, code snippets, API keys, or strategic project discussions.In response, Nikkei implemented a company-wide password reset, revoked compromised tokens, and reported the incident to Japan's Personal Information Protection Commission.
Deploying EDR or other endpoint security tools can detect and block the execution of infostealer malware.
Train employees to recognize phishing attempts and understand the risks of storing corporate credentials in personal browser profiles.
Implement policies and technical controls to prevent or limit the saving of credentials and session tokens in web browsers.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats