The Update: Nikkei confirmed the breach originated from an infected personal device used by an employee to access Slack. The malware stole login credentials, which were then used by attackers to enter the company’s internal Slack environment. The compromised data includes names, email addresses, and chat histories of 17,368 users, encompassing both employees and business partners. The company stated that no journalistic materials or confidential reporting data were accessed.
Upon discovery, Nikkei enforced password resets and reported the incident voluntarily to Japan’s Personal Information Protection Commission. Although not legally required to report under Japanese privacy law, the company said transparency was critical due to the incident’s scale and significance.
Why It Matters: This breach underscores the growing cybersecurity risks tied to collaboration platforms like Slack, particularly when employees use personal devices for work. Infostealer malware has become one of the most common cyber threats globally, frequently harvesting credentials later sold on dark web markets.
The Australian Cyber Security Centre (ACSC) has repeatedly warned that personal devices often lack the enforced protections of corporate-managed hardware, making them high-risk entry points. The Nikkei incident highlights the urgent need for organisations to implement multi-factor authentication, tighten bring-your-own-device (BYOD) policies, and maintain continuous employee awareness around credential hygiene.
As remote work continues to blur personal and corporate boundaries, this attack serves as a timely reminder that one compromised endpoint can jeopardise the integrity of entire communication ecosystems.