
SoftBank Company Cyber Security Posture
softbank.jpEmbarking on a new stage of the Information Revolution with a "Beyond Carrier"โ strategy SoftBank Corp. (TOKYO: 9434) continues to push forward into a new stage of the Information Revolution by utilizing state-of-the-art technology such as AI, IoT, and robotics, and plays a central role in the SoftBank Group. We aim to take a flexible approach to expanding our business into a wide range of domains while pursuing synergies with group companies both domestically and overseas. We aspire to be a company that contributes to society by providing innovative services across a range of industries, going beyond the realms of conventional telecommunications carrier business models. Corporate Philosophy: "Information Revolution โ Happiness for everyone"โ Since our founding, the SoftBank Group has sought to use the Information Revolution to contribute to the wellbeing of people and society. The unlimited potential of the Information Revolution should be deployed in the right way, so that it brings happiness to humanity. This vision is a driving force for the SoftBank Group as we continue to pursue growth. Our slogan: "Smart & Fun!"โ The slogan "Smart & Fun!"โ is part of our workstyle reform initiative and represents a way of working that is optimized to each employee, aiming to maximize the productivity of individuals and the organization. The slogan encapsulates our aim of continuing to grow as an innovative and creative company with employees who work intelligently and enjoyably, incorporating new workstyles that utilize IT and AI.
SoftBank Company Details
softbank-mobile
4093 employees
37927.0
541
IT Services and IT Consulting
softbank.jp
Scan still pending
SOF_6160900
In-progress

Between 900 and 1000
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

SoftBank Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 900 and 1000 |
SoftBank Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|---|---|---|---|---|---|---|
SoftBank Corporation | Breach | 85 | 4 | 6/2025 | SOF606061225 | Link | |
Rankiteo Explanation : Attack with significant impact with customers data leaksDescription: SoftBank Corporation, an investment holding company, faced a significant data breach affecting 137,156 mobile subscribers through compromised third-party infrastructure. The incident involved the unauthorized access to customer names, residential addresses, and phone numbers stored within the systems of UF Japan, an external service provider contracted for telecommunications support operations. The breach did not extend to more sensitive financial data elements, but it highlighted critical failures in vendor security management and persistent vulnerabilities in outsourced data processing operations. The incident exposed the complexity of managing security across multi-vendor environments and the challenges of detecting insider threats. |
SoftBank Company Subsidiaries

Embarking on a new stage of the Information Revolution with a "Beyond Carrier"โ strategy SoftBank Corp. (TOKYO: 9434) continues to push forward into a new stage of the Information Revolution by utilizing state-of-the-art technology such as AI, IoT, and robotics, and plays a central role in the SoftBank Group. We aim to take a flexible approach to expanding our business into a wide range of domains while pursuing synergies with group companies both domestically and overseas. We aspire to be a company that contributes to society by providing innovative services across a range of industries, going beyond the realms of conventional telecommunications carrier business models. Corporate Philosophy: "Information Revolution โ Happiness for everyone"โ Since our founding, the SoftBank Group has sought to use the Information Revolution to contribute to the wellbeing of people and society. The unlimited potential of the Information Revolution should be deployed in the right way, so that it brings happiness to humanity. This vision is a driving force for the SoftBank Group as we continue to pursue growth. Our slogan: "Smart & Fun!"โ The slogan "Smart & Fun!"โ is part of our workstyle reform initiative and represents a way of working that is optimized to each employee, aiming to maximize the productivity of individuals and the organization. The slogan encapsulates our aim of continuing to grow as an innovative and creative company with employees who work intelligently and enjoyably, incorporating new workstyles that utilize IT and AI.
Access Data Using Our API

Get company history
.png)
SoftBank Cyber Security News
SoftBank Vision Fund Bounces Back Into Action
Last week, the SoftBank Vision Fund 2 co-led a massive $120 million round for drama-laden cybersecurity startup Cybereason.
SoftBank cashes in on Wiz investment in no time after Googleโs $32 billion buyout
A well-timed bet on the Israeli cybersecurity firm delivers a massive return for SoftBank.
SoftBank-Backed Cybereason CEO Resigns After Boardroom Turmoil
Cybereason Inc.'s chief has stepped down following a months-long feud with investors SoftBank Group Corp. and former US Treasury Secretaryย ...
SoftBank DataBreach - 137,000 Users Personal Data Exposed From Third-party Service Provider
SoftBank Corporation, an investment holding company, disclosed a significant data breach affecting 137,156 mobile subscribers throughย ...
US cybersecurity firm Cybereason raises $120m led by Softbank
Cybereason specializes in endpoint detection and response (EDR) technology and has struggled to secure new capital.
Cybereason secures $120m to expand cutting-edge cybersecurity solutions
Cybereason, a leader in the cybersecurity industry, has successfully raised $120m in a new funding round.
Backed by SoftBank investment, Wiz pushes plans for expansion in Asia
Israeli-founded cyber unicorn Wiz announced on Wednesday that it has secured a strategic investment from Japanese tech giant SoftBank to helpย ...
The top AI threats keeping cybersecurity leaders up at night
While AI phishing and deepfakes certainly rank highly as current cybersecurity concerns, there are other issues keeping them up at night.
Trustwave announces merger with Cybereason
Trustwave announces merger with Cybereason ยท Trustwave SpiderLabs exposes unique cybersecurity threats in public sector ยท Trustwave adds threatย ...

SoftBank Similar Companies

FUJISOFT INCORPORATED
Fujisoft is one of the largest Independent IT solution vendors in Japan with strong experience in mobile technology, digital information equipment's, consumer electronics etc .As an independent IT company, Fujisoft continues to remain unique, aggressively helping build the future of ubiquitous and

alnamic AG (now Avanade)
Alnamic is pleased to announce that it was acquired by Avanade on April 1st, 2020. Avanade is the leading provider of innovative digital and cloud services, business solutions, and design-led experiences delivered through the power of people and the Microsoft ecosystem. Learn more at www.avanade.co

Dimension Data
Dimension Data is a leading African born technology provider operating in the Middle East and Africa, offering a portfolio of services including systems integration, managed services infrastructure, cloud solutions, business applications, customer experience, and intelligent security solutions. We p

Sutherland
Artificial Intelligence. Automation. Cloud engineering. Advanced analytics. For business leaders, these are key factors of success. For us, theyโre our core expertise. At Sutherland, we are a leading global business and digital transformation partner. Our services span a diversified range of categ

NTT DATA Business Solutions
We Transform. SAPยฎ solutions into Value We understand the business of our clients and know what it takes to transform it into the future. At NTT DATA Business Solutions, we drive innovation โ from advisory and implementation to managed services and beyond. With SAP at our core and a powerful ecosys

CGI
Insights you can act on to achieve trusted outcomes. We are insights-driven and outcomes-focused to help accelerate returns on your investments. Across 21 industry sectors and 400 locations worldwide, we provide comprehensive, scalable and sustainable IT and business consulting services that are in

Frequently Asked Questions
Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
SoftBank CyberSecurity History Information
How many cyber incidents has SoftBank faced?
Total Incidents: According to Rankiteo, SoftBank has faced 1 incident in the past.
What types of cybersecurity incidents have occurred at SoftBank?
Incident Types: The types of cybersecurity incidents that have occurred incident Breach.
How does SoftBank detect and respond to cybersecurity incidents?
Detection and Response: The company detects and responds to cybersecurity incidents through law enforcement notified with True and remediation measures with Terminating contractual relationship with UF Japan, Enhanced vendor security assessments, Mandatory penetration testing, Compliance auditing, Continuous security monitoring requirements.
Incident Details
Can you provide details on each incident?

Incident : Data Breach
Title: SoftBank Data Breach
Description: SoftBank Corporation, an investment holding company, disclosed a significant data breach affecting 137,156 mobile subscribers through compromised third-party infrastructure.
Date Detected: March 2025
Type: Data Breach
Attack Vector: Physical access control vulnerabilities
Vulnerability Exploited: Inadequate physical access controls, Perimeter security measures
Threat Actor: Former employee of a partner company within the supply chain
What are the most common types of attacks the company has faced?
Common Attack Types: The most common types of attacks the company has faced is Breach.
How does the company identify the attack vectors used in incidents?
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Physical access control vulnerabilities.
Impact of the Incidents
What was the impact of each incident?

Incident : Data Breach SOF606061225
Data Compromised: Customer names, Residential addresses, Phone numbers
What types of data are most commonly compromised in incidents?
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Customer names, Residential addresses and Phone numbers.
Which entities were affected by each incident?

Incident : Data Breach SOF606061225
Entity Type: Investment Holding Company
Industry: Telecommunications
Location: Japan
Customers Affected: 137,156
Response to the Incidents
What measures were taken in response to each incident?

Incident : Data Breach SOF606061225
Law Enforcement Notified: True
Remediation Measures: Terminating contractual relationship with UF Japan, Enhanced vendor security assessments, Mandatory penetration testing, Compliance auditing, Continuous security monitoring requirements
Data Breach Information
What type of data was compromised in each breach?

Incident : Data Breach SOF606061225
Type of Data Compromised: Customer names, Residential addresses, Phone numbers
Number of Records Exposed: 137,156
Personally Identifiable Information: True
What measures does the company take to prevent data exfiltration?
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Terminating contractual relationship with UF Japan, Enhanced vendor security assessments, Mandatory penetration testing, Compliance auditing, Continuous security monitoring requirements.
Regulatory Compliance
Were there any regulatory violations and fines imposed for each incident?

Incident : Data Breach SOF606061225
Regulations Violated: Japanโs Personal Information Protection Act (PIPA)
Lessons Learned and Recommendations
What lessons were learned from each incident?

Incident : Data Breach SOF606061225
Lessons Learned: Strengthened vendor management protocols, including mandatory security certifications, regular vulnerability assessments, and real-time monitoring integration to prevent similar incidents across their outsourced operations ecosystem.
What are the key lessons learned from past incidents?
Key Lessons Learned: The key lessons learned from past incidents are Strengthened vendor management protocols, including mandatory security certifications, regular vulnerability assessments, and real-time monitoring integration to prevent similar incidents across their outsourced operations ecosystem.
References
Where can I find more information about each incident?

Incident : Data Breach SOF606061225
Source: Japanโs Public Broadcaster, NHK
Where can stakeholders find additional resources on cybersecurity best practices?
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Japanโs Public Broadcaster, NHK.
Initial Access Broker
How did the initial access broker gain entry for each incident?

Incident : Data Breach SOF606061225
Entry Point: Physical access control vulnerabilities
Post-Incident Analysis
What were the root causes and corrective actions taken for each incident?

Incident : Data Breach SOF606061225
Root Causes: Inadequate physical access controls, Perimeter security measures, Overly permissive access rights
Corrective Actions: Enhanced vendor security assessments, Mandatory penetration testing, Compliance auditing, Continuous security monitoring requirements
What corrective actions has the company taken based on post-incident analysis?
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Enhanced vendor security assessments, Mandatory penetration testing, Compliance auditing, Continuous security monitoring requirements.
Additional Questions
General Information
Who was the attacking group in the last incident?
Last Attacking Group: The attacking group in the last incident was an Former employee of a partner company within the supply chain.
Incident Details
What was the most recent incident detected?
Most Recent Incident Detected: The most recent incident detected was on March 2025.
Impact of the Incidents
What was the most significant data compromised in an incident?
Most Significant Data Compromised: The most significant data compromised in an incident were Customer names, Residential addresses and Phone numbers.
Data Breach Information
What was the most sensitive data compromised in a breach?
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Customer names, Residential addresses and Phone numbers.
What was the number of records exposed in the most significant breach?
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 137.2K.
Lessons Learned and Recommendations
What was the most significant lesson learned from past incidents?
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Strengthened vendor management protocols, including mandatory security certifications, regular vulnerability assessments, and real-time monitoring integration to prevent similar incidents across their outsourced operations ecosystem.
References
What is the most recent source of information about an incident?
Most Recent Source: The most recent source of information about an incident are Japanโs Public Broadcaster and NHK.
Initial Access Broker
What was the most recent entry point used by an initial access broker?
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Physical access control vulnerabilities.
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
