Contents:
The Russian-based threat group LockBit targeted the Port of Nagoya in a ransomware attack. Japan’s largest port is currently unable to load and unload containers from trailers.
According to the Nagoya Port Authorities, the attack was discovered on Tuesday, July 4th. They expect to succeed in restoring the system by 6:00 p.m. today and to be able to resume the port`s operations starting Thursday, July 6th, at 8:30 a.m.
Kyodo News, Japan’s leading news agency, stated that LockBit already made a ransom demand in exchange for the system’s recovery.
The system failure occurred at around 6:30 a.m. Tuesday when an employee was unable to start a computer, according to the port authority.
A message indicating that the computer system had been infected with ransomware was somehow sent to a printer, a source familiar with the case said.
Impact of the Ransomware Attack on Nagoya Port
Until the system is restored, the port halted all container loading and unloading operations at the terminals.
Nagoya is Japan’s largest port and is responsible, among others, for a part of Toyota Motor`s exports and imports. By now, even if they cannot load or unload auto parts, Toyota claims there had been no disruption to its production. Additionally, the company stated that the attack didn’t impact the logistics of finished vehicles either, as they use a different computer system.
However, analysts expect massive financial losses and a disruption to the circulation of goods to follow, due to the ransomware attack.
The port accounts for roughly 10% of Japan’s total trade volume. It operates 21 piers and 290 berths. It handles over two million containers and cargo tonnage of 165 million every year.
Previous Cyberattacks Targeting Nagoya Port
According to BleepingComputer, this was not the first time threat actors target the Nagoya Port.
Last year, on September 6th, Killnet, another pro-Russian threat group, launched a DDoS attack on the harbor`s website. On that occasion, the website was down for roughly 40 minutes.
If you liked this article, follow us on LinkedIn, Twitter, Facebook, and Youtube, for more cybersecurity news and topics.