A threat actor operating under the alias “victim” has claimed responsibility for a significant data breach targeting Tokyo FM Broadcasting Co., Ltd., a central radio broadcasting station in Japan.
The alleged intrusion, which was observed on January 1, 2025, reportedly exposed the personal information of millions of individuals.
The Alleged Breach
According to cybersecurity monitoring sources, the hacker group claims to have compromised Tokyo FM’s internal systems.
The threat actor claims to have successfully accessed and exfiltrated a database containing over 3 million records.
The data allegedly stolen in this attack includes a wide range of personally identifiable information (PII). The compromised fields reportedly contain:
- Full names
- Email addresses
- Dates of birth
- IP addresses
- User agent strings
- Job-related information
- Login IDs for multiple internal systems
If verified, this breach could pose a serious privacy risk to the affected individuals, potentially exposing them to targeted phishing attacks, identity theft, and social engineering campaigns.
Tokyo FM Broadcasting operates in the News and Multimedia sector, making it a high-profile target for cybercriminals seeking media attention or valuable user data. The incident has been classified as a “Cybercrime” threat.
Security analysts at Hackmanac, who issued an alert about the claim, have noted that the information was obtained from both clear- and dark-web sources. However, the breach currently remains in a “Pending verification” status.
According to the latest reports, no confidential or proprietary business data has been confirmed as having been downloaded, copied, or redistributed by the researchers who identified the threat.
Sensitive details from the proof-of-compromise screenshots were redacted to protect user privacy.
Tokyo FM Broadcasting has not officially confirmed the claims made by the “victim” group.
Security experts advise organisations in the media sector to remain vigilant, as threat actors often target these entities to demonstrate their capabilities or disrupt operations.
The situation is developing, and further details regarding the authenticity of the data and the method of intrusion are expected to emerge as investigations proceed.
Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.
