A massive and rapidly escalating wave of cybercrime is targeting Japan’s online trading community, with criminals hijacking brokerage accounts to execute fraudulent trades totaling a staggering 100 billion yen (approx. $920 million) since February 2025. This sophisticated campaign highlights critical vulnerabilities in online financial platforms and poses a significant threat to investor confidence.

The attacks, which show no signs of slowing, follow a dangerous pattern. Cybercriminals gain unauthorized access to individual investor accounts, often liquidate existing holdings, and then use the funds to purchase large volumes of thinly traded stocks, frequently listed overseas (like in China) or domestic penny stocks. This artificially inflates the stock prices, allowing perpetrators who established positions earlier to sell at a significant profit—leaving the compromised account holder with potentially worthless or rapidly declining assets and substantial losses.

Escalating Threat: A Stark Warning from Regulators

Japan’s Financial Services Agency (FSA) has issued urgent warnings about the sharp increase in these incidents. “[There has been a sharp increase] in unauthorized access and unauthorized trading… using stolen customer information (login IDs, passwords, etc.) from fake websites (phishing sites) disguised as websites of real securities companies,” the FSA alert stated.

FSA Alert (Japanese only)

The agency released alarming figures underscoring the rapid growth of the problem (based on known cases):

  • Affected Firms: Increased from 2 in February 2025 to 6 by mid-April.
  • Unauthorized Accesses: Exploded from 43 in February to 1,847 in April (totaling 3,312).
  • Fraudulent Transactions: Jumped from 33 in February to 736 in April (totaling 1,454).
  • Transaction Volume (3 months): Approx. 50.6 billion yen in sales and 44.8 billion yen in purchases, indicating the massive scale of the market manipulation.

It is important to note that these numbers represent executed transaction volumes, not necessarily the net loss to investors, which can be compounded by market volatility and margin debt.

The Human Cost and Systemic Weaknesses

The impact on individual investors has been devastating. One Tokyo resident reported losing around 50 million yen after his account was compromised in mid-April. Despite only ever holding S&P 500 index funds, his account was used to aggressively buy Japanese and Chinese stocks—some on margin. When prices inevitably fell, he was forced to sell at a loss, and his brokerage indicated his legitimate index holdings would be liquidated to cover the margin debt. The incident involving DesignOne Japan stock, which saw trading volume spike dramatically on April 16, exemplifies the pump-and-dump aspect of these attacks.

These breaches expose gaps in Japan’s cybersecurity posture in the financial sector. Reluctance from some securities firms to fully compensate victims has led to public frustration and could undermine Japan’s push to expand retail investing, particularly for retirement. Eight major brokers, including Rakuten Securities and SBI Securities, have confirmed unauthorized activity.

Attack Vectors: Phishing, AiTM, and Infostealers

Cybersecurity experts point to a variety of sophisticated techniques being used. Phishing remains a primary method—luring victims to fake login pages disguised as legitimate broker websites. As Turnkey Trading Partners has discussed in The Persistent Threat of Phishing in Financial Markets, vigilance against unsolicited emails and SMS messages is essential.

Beyond phishing, attackers are leveraging:

  1. Adversary-in-the-Middle (AiTM): More advanced than standard phishing, AiTM attacks intercept communications using fake sites that proxy to the real one. This allows the theft of active session cookies, potentially bypassing MFA.
  2. Infostealers: Malware delivered via email attachments, malicious ads, or infected websites that extract stored credentials from user devices. =

Experts like Nobuhiro Tsuji of SB Technology and Yutaka Sejiyama of Macnica Security Research Centre warn that the prevalence of browser-based trading in Japan, compared to mobile apps, may increase exposure. Macnica’s research uncovered at least 105,000 cases of leaked credentials, suggesting a vast pool of compromised data available for exploitation.

Potential Risk to Futures Trading Accounts

While the wave of fraudulent activity has primarily targeted equity brokerage accounts, there is growing concern that futures trading accounts could also be vulnerable. The attack methods—phishing, AiTM, and infostealers—are platform-agnostic, and if a hacker gains access to a futures account, the potential impact could be even greater due to the high leverage inherent in futures trading. Though no major futures-specific incidents have been reported publicly, the risk is real. Browser-based futures platforms, in particular, may be exposed if clients do not use robust endpoint protections. Futures traders should adopt strict cybersecurity measures, especially multi-factor authentication and proactive monitoring, to guard against the same tactics being used in this ongoing campaign.

Response and Prevention: A Call for Stronger Defenses

Industry groups and regulators are racing to respond. The Japan Securities Dealers Association (JSDA) is urging members to mandate multi-factor authentication (MFA). Finance Minister Katsunobu Kato has publicly called for brokerages to engage in “good faith” compensation discussions with victims. Some firms have even halted buy orders for stocks frequently targeted in these schemes.

For traders in Japan and globally, this serves as a stark reminder of the importance of cyber hygiene:

  • Do not click links in unsolicited emails or SMS messages claiming to be from your broker.
  • Access brokerage sites only via typed URLs or saved bookmarks.
  • Enable Multi-Factor Authentication (MFA) wherever available.
  • Use strong, unique passwords and avoid reuse. Consider a password manager.
  • Regularly monitor account activity and enable real-time login and transaction notifications.
  • Keep operating systems and browsers up to date.
  • Use reputable antivirus/anti-malware software.
  • Immediately report any suspicious account activity and reset credentials.

These align with recommendations in TTP’s Conflict in Europe Highlights the Need for Strong Cybersecurity .

The situation in Japan underscores that cybersecurity is not just an IT issue, but a fundamental requirement for market integrity and investor protection. While regulators and firms attempt to contain the damage and reinforce defenses, individual vigilance remains the most effective first line of defense.

For broader guidance on cybersecurity best practices, the Cybersecurity & Infrastructure Security Agency (CISA) provides valuable resources for individuals and institutions alike.