Connect with us

Hi, what are you looking for?



Japan’s Nagoya Port Suspends Cargo Operations Following Ransomware Attack

Japan’s Port of Nagoya this week suspended cargo loading and unloading operations following a ransomware attack.

The Port of Nagoya, Japan’s largest port in terms of cargo capacity, has suspended loading and unloading following a ransomware attack.

Located in central Japan, the port accounts for 10% of Japan’s total trade value, handling Toyota’s exports and imports, as well as cargo containing foods and household appliances.

On Wednesday morning, the Nagoya Harbor Transportation Authority announced that cargo operations had been suspended after an incident impacted the Nagoya United Terminal System (NUTS), the computer system used to operate the port’s five cargo terminals.

All cargo operations, including the loading and unloading of containers onto trailers, have been suspended as of July 4 and work started on restoring the impacted systems. The attack resulted in a temporary congestion of trailers at the port.

The Nagoya port authority estimates that systems will be back online today and cargo operations will resume by the morning of July 6.

The port authority reportedly received a ransom demand – printed on one of its office printers. The LockBit 3.0 ransomware gang appears to be responsible for the attack.

In addition to deploying file-encrypting ransomware, LockBit 3.0 and other cybergangs typically exfiltrate victim data and use it to extort the victims into paying a ransom. It is unclear whether any data was stolen from the Port of Nagoya’s systems.

Advertisement. Scroll to continue reading.

SecurityWeek has emailed the Nagoya Harbor Authority for additional information on the incident and will update this article as soon as a reply arrives.

Related: Ransomware Will Likely Target OT Systems in EU Transport Sector: ENISA

Related: TSMC Says Supplier Hacked After Ransomware Group Claims Attack on Chip Giant

Related: Dozens of Businesses Hit Recently by ‘8Base’ Ransomware Gang

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join security experts as they discuss ZTNA’s untapped potential to both reduce cyber risk and empower the business.


Join Microsoft and Finite State for a webinar that will introduce a new strategy for securing the software supply chain.


Expert Insights

Related Content


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.


Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.


A SaaS ransomware attack against a company’s Sharepoint Online was done without using a compromised endpoint.


Several major organizations are confirming impact from the latest zero-day exploits hitting Fortra's GoAnywhere software.

Management & Strategy

Industry professionals comment on the recent disruption of the Hive ransomware operation and its hacking by law enforcement.

Data Breaches

KFC and Taco Bell parent company Yum Brands says personal information was compromised in a January 2023 ransomware attack.


US payments giant NCR has confirmed being targeted in a ransomware attack for which the BlackCat/Alphv group has taken credit.

Malware & Threats

Unpatched and unprotected VMware ESXi servers worldwide have been targeted in a ransomware attack exploiting a vulnerability patched in 2021.