{"id":4196,"date":"2025-12-01T15:30:00","date_gmt":"2025-12-01T06:30:00","guid":{"rendered":"https:\/\/www.pro-7.co.jp\/en\/?post_type=disaster-prevention&#038;p=4196"},"modified":"2025-11-28T09:31:07","modified_gmt":"2025-11-28T00:31:07","slug":"why-cyber-risks-surge-during-earthquakes-the-hidden-digital-threat","status":"publish","type":"disaster-prevention","link":"https:\/\/www.pro-7.co.jp\/en\/disaster-prevention\/why-cyber-risks-surge-during-earthquakes-the-hidden-digital-threat\/","title":{"rendered":"Why Cyber Risks Surge During Earthquakes: The Hidden Digital Threat"},"content":{"rendered":"\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" width=\"1024\" height=\"341\" src=\"https:\/\/www.pro-7.co.jp\/en\/wp-content\/uploads\/2025\/11\/cyber-criminal3-1024x341.jpg\" alt=\"\" class=\"wp-image-4198\" style=\"width:366px;height:auto\" srcset=\"https:\/\/www.pro-7.co.jp\/en\/wp-content\/uploads\/2025\/11\/cyber-criminal3-1024x341.jpg 1024w, https:\/\/www.pro-7.co.jp\/en\/wp-content\/uploads\/2025\/11\/cyber-criminal3-300x100.jpg 300w, https:\/\/www.pro-7.co.jp\/en\/wp-content\/uploads\/2025\/11\/cyber-criminal3-768x256.jpg 768w, https:\/\/www.pro-7.co.jp\/en\/wp-content\/uploads\/2025\/11\/cyber-criminal3.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Earthquakes and the Digital Dimension<\/strong><\/p>\n\n\n\n<p>When an earthquake strikes, our first thoughts are about physical safety\u2014structural damage, emergency response, and survival. But in today\u2019s interconnected world, earthquakes can also trigger a <strong>second disaster in cyberspace<\/strong>. From phishing scams to infrastructure attacks, cyber risks often spike during and after seismic events. This article explores why these risks increase, real-world examples, and actionable steps to protect yourself and your organization.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Why Earthquakes Amplify Cybersecurity Risks<\/strong><\/h2>\n\n\n\n<p>Natural disasters create chaos, and chaos is fertile ground for cybercriminals. Here\u2019s why:<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<ul class=\"wp-block-list\">\n<li>1. <strong>Infrastructure Disruption<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Earthquakes can damage:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u30fb<strong>Power grids<\/strong> \u2192 leading to outages and unstable networks.<\/li>\n\n\n\n<li>\u30fb<strong>Data centers<\/strong> \u2192 causing downtime and emergency failovers.<\/li>\n\n\n\n<li>\u30fb<strong>Communication systems<\/strong> \u2192 reducing monitoring capabilities.<\/li>\n<\/ul>\n\n\n\n<p>When systems go offline, organizations often prioritize restoring operations over enforcing security protocols. This temporary relaxation creates vulnerabilities attackers can exploit.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/www.pro-7.co.jp\/en\/wp-content\/uploads\/2025\/11\/Designer-1-1024x683.jpg\" alt=\"\" class=\"wp-image-4199\" srcset=\"https:\/\/www.pro-7.co.jp\/en\/wp-content\/uploads\/2025\/11\/Designer-1-1024x683.jpg 1024w, https:\/\/www.pro-7.co.jp\/en\/wp-content\/uploads\/2025\/11\/Designer-1-300x200.jpg 300w, https:\/\/www.pro-7.co.jp\/en\/wp-content\/uploads\/2025\/11\/Designer-1-768x512.jpg 768w, https:\/\/www.pro-7.co.jp\/en\/wp-content\/uploads\/2025\/11\/Designer-1.jpg 1536w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<ul class=\"wp-block-list\">\n<li>2. <strong>Human Error Under Pressure<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Disaster response teams and IT staff work under extreme stress during emergencies. In such conditions:<\/p>\n\n\n\n<p><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u30fbPassword policies may be ignored.<\/li>\n\n\n\n<li>\u30fbMulti-factor authentication might be disabled for speed.<\/li>\n\n\n\n<li>\u30fbEmergency access credentials may be shared insecurely.<\/li>\n<\/ul>\n\n\n\n<p>Attackers know this and strike when vigilance is low.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"979\" height=\"550\" src=\"https:\/\/www.pro-7.co.jp\/en\/wp-content\/uploads\/2025\/11\/human-error.jpg\" alt=\"\" class=\"wp-image-4200\" srcset=\"https:\/\/www.pro-7.co.jp\/en\/wp-content\/uploads\/2025\/11\/human-error.jpg 979w, https:\/\/www.pro-7.co.jp\/en\/wp-content\/uploads\/2025\/11\/human-error-300x169.jpg 300w, https:\/\/www.pro-7.co.jp\/en\/wp-content\/uploads\/2025\/11\/human-error-768x431.jpg 768w\" sizes=\"(max-width: 979px) 100vw, 979px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<ul class=\"wp-block-list\">\n<li>3. <strong>Surge in Social Engineering Attacks<\/strong><\/li>\n<\/ul>\n\n\n\n<p>After major earthquakes, people rush to donate or seek help online. Cybercriminals exploit this urgency by:<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u30fbCreating <strong>fake charity websites<\/strong>.<\/li>\n\n\n\n<li>\u30fbSending <strong>phishing emails<\/strong> disguised as relief organizations.<\/li>\n\n\n\n<li>\u30fbLaunching <strong>social media scams<\/strong> asking for donations.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/www.pro-7.co.jp\/en\/wp-content\/uploads\/2025\/11\/funding-1024x1024.jpg\" alt=\"\" class=\"wp-image-4201\" style=\"width:299px;height:auto\" srcset=\"https:\/\/www.pro-7.co.jp\/en\/wp-content\/uploads\/2025\/11\/funding-1024x1024.jpg 1024w, https:\/\/www.pro-7.co.jp\/en\/wp-content\/uploads\/2025\/11\/funding-300x300.jpg 300w, https:\/\/www.pro-7.co.jp\/en\/wp-content\/uploads\/2025\/11\/funding-150x150.jpg 150w, https:\/\/www.pro-7.co.jp\/en\/wp-content\/uploads\/2025\/11\/funding-768x768.jpg 768w, https:\/\/www.pro-7.co.jp\/en\/wp-content\/uploads\/2025\/11\/funding-1536x1536.jpg 1536w, https:\/\/www.pro-7.co.jp\/en\/wp-content\/uploads\/2025\/11\/funding-2048x2048.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div><\/div>\n<\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<ul class=\"wp-block-list\">\n<li>4. <strong>Smart Infrastructure Vulnerabilities<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Modern cities rely on IoT devices for:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u30fbTraffic control<\/li>\n\n\n\n<li>\u30fbEnergy management<\/li>\n\n\n\n<li>\u30fbEmergency alerts<\/li>\n<\/ul>\n\n\n\n<p>Earthquake damage to these systems can lead to cascading failures. If hackers gain access during recovery, they can manipulate sensors or disrupt services.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" width=\"724\" height=\"1024\" src=\"https:\/\/www.pro-7.co.jp\/en\/wp-content\/uploads\/2025\/11\/IoT-724x1024.jpg\" alt=\"\" class=\"wp-image-4202\" style=\"width:246px;height:auto\" srcset=\"https:\/\/www.pro-7.co.jp\/en\/wp-content\/uploads\/2025\/11\/IoT-724x1024.jpg 724w, https:\/\/www.pro-7.co.jp\/en\/wp-content\/uploads\/2025\/11\/IoT-212x300.jpg 212w, https:\/\/www.pro-7.co.jp\/en\/wp-content\/uploads\/2025\/11\/IoT-768x1086.jpg 768w, https:\/\/www.pro-7.co.jp\/en\/wp-content\/uploads\/2025\/11\/IoT-1086x1536.jpg 1086w, https:\/\/www.pro-7.co.jp\/en\/wp-content\/uploads\/2025\/11\/IoT-1448x2048.jpg 1448w\" sizes=\"(max-width: 724px) 100vw, 724px\" \/><\/figure>\n<\/div><\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Real-World Examples of Cyber Risks After Earthquakes<\/strong><\/h2>\n\n\n\n<p><strong>2011 Japan Earthquake<\/strong><\/p>\n\n\n\n<p>Government systems were targeted by cyberattacks during recovery efforts. Reports indicated foreign actors exploited weakened defenses while IT teams focused on restoring critical infrastructure.<\/p>\n\n\n\n<p><strong>2023 Turkey-Syria Earthquake<\/strong><\/p>\n\n\n\n<p>Researchers observed spikes in phishing campaigns and DDoS attacks against relief organizations. Fraudulent donation sites proliferated within hours of the disaster.<\/p>\n\n\n\n<p><strong>2024 Noto Peninsula Earthquake (Japan)<\/strong><\/p>\n\n\n\n<p>Fake donation websites and social media scams spread rapidly, prompting government intervention and public warnings.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Emerging Digital Threats During Disasters<\/strong><\/h2>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<ul class=\"wp-block-list\">\n<li>1. <strong>AI-Generated Misinformation<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Generative AI tools can create realistic fake rescue alerts or donation campaigns, making it harder for victims to distinguish truth from fraud.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<ul class=\"wp-block-list\">\n<li>2. <strong>Ransomware Targeting Critical Systems<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Hospitals and emergency services are prime targets during disasters. Attackers know downtime can be catastrophic, so they demand quick payouts.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"783\" src=\"https:\/\/www.pro-7.co.jp\/en\/wp-content\/uploads\/2025\/11\/27048578-1024x783.jpg\" alt=\"\" class=\"wp-image-4205\" srcset=\"https:\/\/www.pro-7.co.jp\/en\/wp-content\/uploads\/2025\/11\/27048578-1024x783.jpg 1024w, https:\/\/www.pro-7.co.jp\/en\/wp-content\/uploads\/2025\/11\/27048578-300x229.jpg 300w, https:\/\/www.pro-7.co.jp\/en\/wp-content\/uploads\/2025\/11\/27048578-768x587.jpg 768w, https:\/\/www.pro-7.co.jp\/en\/wp-content\/uploads\/2025\/11\/27048578-1536x1175.jpg 1536w, https:\/\/www.pro-7.co.jp\/en\/wp-content\/uploads\/2025\/11\/27048578.jpg 1700w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<ul class=\"wp-block-list\">\n<li>3. <strong>IoT Exploitation in Smart Cities<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Earthquake damage to IoT sensors can open backdoors for attackers to manipulate traffic lights, energy grids, or emergency alerts.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>\u00a0How to Protect Against Cyber Risks During Earthquakes<\/strong><\/h2>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u30fb<strong>For Individuals<\/strong><\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p>\u2714 Verify donation links before contributing<br>\u2714 Enable multi-factor authentication on all accounts<br>\u2714 Back up critical data to secure cloud storage<br>\u2714 Follow official sources for emergency updates<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"640\" height=\"427\" src=\"https:\/\/www.pro-7.co.jp\/en\/wp-content\/uploads\/2025\/11\/22463612_s.jpg\" alt=\"\" class=\"wp-image-4206\" srcset=\"https:\/\/www.pro-7.co.jp\/en\/wp-content\/uploads\/2025\/11\/22463612_s.jpg 640w, https:\/\/www.pro-7.co.jp\/en\/wp-content\/uploads\/2025\/11\/22463612_s-300x200.jpg 300w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u30fb<strong>\u00a0For Organizations<\/strong><\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p>\u2714 Implement disaster recovery plans that include cybersecurity<br>\u2714 Train staff on phishing awareness during crises<br>\u2714 Secure IoT devices with strong authentication<br>\u2714 Maintain offline backups of critical systems<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"790\" src=\"https:\/\/www.pro-7.co.jp\/en\/wp-content\/uploads\/2025\/11\/phising-1024x790.jpg\" alt=\"\" class=\"wp-image-4207\" srcset=\"https:\/\/www.pro-7.co.jp\/en\/wp-content\/uploads\/2025\/11\/phising-1024x790.jpg 1024w, https:\/\/www.pro-7.co.jp\/en\/wp-content\/uploads\/2025\/11\/phising-300x232.jpg 300w, https:\/\/www.pro-7.co.jp\/en\/wp-content\/uploads\/2025\/11\/phising-768x593.jpg 768w, https:\/\/www.pro-7.co.jp\/en\/wp-content\/uploads\/2025\/11\/phising-1536x1185.jpg 1536w, https:\/\/www.pro-7.co.jp\/en\/wp-content\/uploads\/2025\/11\/phising-2048x1581.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-midnight-gradient-background has-background wp-element-button\" href=\"https:\/\/www.pro-7.co.jp\/en\/disaster-prevention\/earthquake-preparedness-in-business-continuity-planning-bcp\/\">Business Continuity Plan<\/a><\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Future-Proofing: Tech Solutions for Disaster Cybersecurity<\/strong><\/h2>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u30fb<strong>Blockchain for Transparent Donations<\/strong>: Prevent fraud by using immutable ledgers for charity transactions.<\/li>\n\n\n\n<li>\u30fb<strong>AI-Powered Threat Detection<\/strong>: Deploy machine learning to identify phishing patterns during disasters.<\/li>\n\n\n\n<li>\u30fb<strong>Metaverse Disaster Drills<\/strong>: Virtual reality simulations for emergency and cybersecurity training.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/www.pro-7.co.jp\/en\/wp-content\/uploads\/2025\/11\/protect-1024x1024.jpg\" alt=\"\" class=\"wp-image-4208\" style=\"width:305px;height:auto\" srcset=\"https:\/\/www.pro-7.co.jp\/en\/wp-content\/uploads\/2025\/11\/protect-1024x1024.jpg 1024w, https:\/\/www.pro-7.co.jp\/en\/wp-content\/uploads\/2025\/11\/protect-300x300.jpg 300w, https:\/\/www.pro-7.co.jp\/en\/wp-content\/uploads\/2025\/11\/protect-150x150.jpg 150w, https:\/\/www.pro-7.co.jp\/en\/wp-content\/uploads\/2025\/11\/protect-768x768.jpg 768w, https:\/\/www.pro-7.co.jp\/en\/wp-content\/uploads\/2025\/11\/protect.jpg 1080w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>","protected":false},"featured_media":4197,"parent":0,"menu_order":0,"template":"","disaster-prevention_category":[66],"class_list":["post-4196","disaster-prevention","type-disaster-prevention","status-publish","has-post-thumbnail","hentry","disaster-prevention_category-useful-tips-for-disaster-preparedness"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.pro-7.co.jp\/en\/wp-json\/wp\/v2\/disaster-prevention\/4196","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pro-7.co.jp\/en\/wp-json\/wp\/v2\/disaster-prevention"}],"about":[{"href":"https:\/\/www.pro-7.co.jp\/en\/wp-json\/wp\/v2\/types\/disaster-prevention"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pro-7.co.jp\/en\/wp-json\/wp\/v2\/media\/4197"}],"wp:attachment":[{"href":"https:\/\/www.pro-7.co.jp\/en\/wp-json\/wp\/v2\/media?parent=4196"}],"wp:term":[{"taxonomy":"disaster-prevention_category","embeddable":true,"href":"https:\/\/www.pro-7.co.jp\/en\/wp-json\/wp\/v2\/disaster-prevention_category?post=4196"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}