Modena360 Blog

blog image

What the March 10 2025 NTT Data Breach Teaches Us About Third-Party Risk and Smart Cyber Defence

On March 10, 2025, Japanese telecom leader NTT Communications Corporation publicly confirmed a cybersecurity breach affecting almost 18,000 corporate customers through its “Order Information Distribution System.” Though the company acted quickly to block access and contain the threat once discovered, the incident still highlights a persistent challenge: third-party and supplier cyber risk. Many organisations today rely on external partners for core business functions, which expands the potential attack surface and creates new security blind spots.

Understanding the Attack and Its Impact

According to reports, attackers gained unauthorised access to NTT’s order system beginning in early February 2025 and were detected mid-month. While NTT prevented further unauthorised user access and mitigated lateral spread, the breach exposed sensitive customer information such as names, contact details, contract numbers, and service usage data. Although not financial data like payment information, the exposure still presents serious privacy risks and potential follow-on threats like phishing campaigns against affected customers.

This incident illustrates a recurring pattern in cyberattacks: perimeter security alone is not enough. Modern attackers frequently leverage weaknesses in business partners or third-party software systems to get a foothold. Once inside, they can pivot to critical internal systems or exfiltrate data without triggering traditional perimeter defences.

Root Causes: Supply Chain and Third-Party Vulnerabilities

In many cases like NTT’s, the attack vector involves:

  • Weak authentication or access controls for partner systems
  • Insufficient monitoring and anomaly detection across third-party integrations
  • Lack of real-time visibility into external system behaviour

These gaps can allow attackers to roam undetected until a secondary compromise or behavioural alert brings them to light, underscoring a critical lesson: your security is only as strong as your weakest external connection.


Practical Prevention & MSP-Led Security Measures

Here’s how organisations can strengthen their defences against similar breaches:

1. Comprehensive Third-Party Risk Assessments

Regularly assess the security posture of suppliers and partners. MSSPs like Modena360 can conduct continuous risk evaluations, enforce security baselines, and help organisations ensure that external parties meet minimum security standards.

2. Zero Trust Access Controls

Implement least-privilege access and multi-factor authentication (MFA) for all users—including third parties. Zero Trust frameworks reduce the blast radius of compromised credentials by limiting what attackers can do after initial access.

3. Real-Time Monitoring and Threat Detection

Modern security operations require continuous visibility. With a 24/7 SOC (Security Operations Centre), an MSSP can detect unusual traffic patterns earlier and trigger rapid response actions before attackers move laterally.

4. Incident Response Planning

No defence is perfect. Having a tested Incident Response Plan ensures that when a breach occurs, your organisation can contain it quickly, reduce downtime, and communicate transparently with affected stakeholders.


How Modena360 Can Help

At Modena360, we specialise in protecting organisations from evolving threats by offering managed detection, response services, threat intelligence, and proactive security posture management. Whether you’re looking to reduce third-party risk, implement Zero Trust strategies, or shore up your incident response capabilities, our expertise helps ensure breaches like the NTT incident are less likely—and less damaging when they do occur.


Contact Modena360 today to assess your third-party risk and build a cybersecurity strategy that defends your business from tomorrow’s threats.