Information
Warning Regarding Spam Emails Impersonating Our Company’s Representative Director and Affiliated Company Personnel
We have confirmed the presence of phishing spam emails impersonating our company name, the name of our representative director, or the names of personnel at affiliated companies.
These emails were not sent by our company and are in no way related to us.
If you receive a suspicious email pretending to be from our company, please note the following points:
Do not reply or take any action; delete the email immediately.
1. Verify the email sender
Emails from our company are sent from our company domain.
The domains of our affiliated companies are different, so you will need to verify them separately.
Be cautious of emails from any other domains.
2. Do not open links or attachments
Suspicious emails may contain links or attachments.
Opening these carries the risk of malware infection or personal information leakage.
3. Avoid providing information
Avoid providing important information such as personal or financial details via email or other means.
__________________________
Examples of Phishing Emails
From:
Email addresses not belonging to our company or affiliated company domains (e.g., names of our company's CEO or personnel from affiliated companies)
Subject:
Company name, notices regarding business coordination, etc.
Body:
Claims to be the “President” or “Executive Officer,” emphasizing urgency
Cases where recipients are directed to external services, such as creating a LINE group
__________________________
We take great care to prevent unauthorized access and ensure information security.
We will continue to strengthen our measures, and we appreciate your understanding and cooperation.
These emails were not sent by our company and are in no way related to us.
If you receive a suspicious email pretending to be from our company, please note the following points:
Do not reply or take any action; delete the email immediately.
1. Verify the email sender
Emails from our company are sent from our company domain.
The domains of our affiliated companies are different, so you will need to verify them separately.
Be cautious of emails from any other domains.
2. Do not open links or attachments
Suspicious emails may contain links or attachments.
Opening these carries the risk of malware infection or personal information leakage.
3. Avoid providing information
Avoid providing important information such as personal or financial details via email or other means.
__________________________
Examples of Phishing Emails
From:
Email addresses not belonging to our company or affiliated company domains (e.g., names of our company's CEO or personnel from affiliated companies)
Subject:
Company name, notices regarding business coordination, etc.
Body:
Claims to be the “President” or “Executive Officer,” emphasizing urgency
Cases where recipients are directed to external services, such as creating a LINE group
__________________________
We take great care to prevent unauthorized access and ensure information security.
We will continue to strengthen our measures, and we appreciate your understanding and cooperation.
Information
Warning Regarding Spam Emails Impersonating Our Company’s Representative Director and Affiliated Company Personnel
We have confirmed the presence of phishing spam emails impersonating our company name, the name of our representative director, or the names of personnel at affiliated companies.
These emails were not sent by our company and are in no way related to us.
If you receive a suspicious email pretending to be from our company, please note the following points:
Do not reply or take any action; delete the email immediately.
1. Verify the email sender
Emails from our company are sent from our company domain.
The domains of our affiliated companies are different, so you will need to verify them separately.
Be cautious of emails from any other domains.
2. Do not open links or attachments
Suspicious emails may contain links or attachments.
Opening these carries the risk of malware infection or personal information leakage.
3. Avoid providing information
Avoid providing important information such as personal or financial details via email or other means.
__________________________
Examples of Phishing Emails
From:
Email addresses not belonging to our company or affiliated company domains (e.g., names of our company's CEO or personnel from affiliated companies)
Subject:
Company name, notices regarding business coordination, etc.
Body:
Claims to be the “President” or “Executive Officer,” emphasizing urgency
Cases where recipients are directed to external services, such as creating a LINE group
__________________________
We take great care to prevent unauthorized access and ensure information security.
We will continue to strengthen our measures, and we appreciate your understanding and cooperation.
These emails were not sent by our company and are in no way related to us.
If you receive a suspicious email pretending to be from our company, please note the following points:
Do not reply or take any action; delete the email immediately.
1. Verify the email sender
Emails from our company are sent from our company domain.
The domains of our affiliated companies are different, so you will need to verify them separately.
Be cautious of emails from any other domains.
2. Do not open links or attachments
Suspicious emails may contain links or attachments.
Opening these carries the risk of malware infection or personal information leakage.
3. Avoid providing information
Avoid providing important information such as personal or financial details via email or other means.
__________________________
Examples of Phishing Emails
From:
Email addresses not belonging to our company or affiliated company domains (e.g., names of our company's CEO or personnel from affiliated companies)
Subject:
Company name, notices regarding business coordination, etc.
Body:
Claims to be the “President” or “Executive Officer,” emphasizing urgency
Cases where recipients are directed to external services, such as creating a LINE group
__________________________
We take great care to prevent unauthorized access and ensure information security.
We will continue to strengthen our measures, and we appreciate your understanding and cooperation.
LINKS