Ransomware

Japan’s Nagoya Port Suspends Cargo Operations Following Ransomware Attack

Japan’s Port of Nagoya this week suspended cargo loading and unloading operations following a ransomware attack.

Japan’s Port of Nagoya this week suspended cargo loading and unloading operations following a ransomware attack.

The Port of Nagoya, Japan’s largest port in terms of cargo capacity, has suspended loading and unloading following a ransomware attack.

Located in central Japan, the port accounts for 10% of Japan’s total trade value, handling Toyota’s exports and imports, as well as cargo containing foods and household appliances.

On Wednesday morning, the Nagoya Harbor Transportation Authority announced that cargo operations had been suspended after an incident impacted the Nagoya United Terminal System (NUTS), the computer system used to operate the port’s five cargo terminals.

All cargo operations, including the loading and unloading of containers onto trailers, have been suspended as of July 4 and work started on restoring the impacted systems. The attack resulted in a temporary congestion of trailers at the port.

The Nagoya port authority estimates that systems will be back online today and cargo operations will resume by the morning of July 6.

The port authority reportedly received a ransom demand – printed on one of its office printers. The LockBit 3.0 ransomware gang appears to be responsible for the attack.

In addition to deploying file-encrypting ransomware, LockBit 3.0 and other cybergangs typically exfiltrate victim data and use it to extort the victims into paying a ransom. It is unclear whether any data was stolen from the Port of Nagoya’s systems.

SecurityWeek has emailed the Nagoya Harbor Authority for additional information on the incident and will update this article as soon as a reply arrives.

Advertisement. Scroll to continue reading.

Related: Ransomware Will Likely Target OT Systems in EU Transport Sector: ENISA

Related: TSMC Says Supplier Hacked After Ransomware Group Claims Attack on Chip Giant

Related: Dozens of Businesses Hit Recently by ‘8Base’ Ransomware Gang

Related Content

Data Breaches

The Ohio Lottery cyberattack conducted by the DragonForce ransomware group has impacted more than 500,000 individuals.

Data Breaches

Tech giant notifies millions of customers that full names and physical mailing addresses were stolen during a security incident.

Ransomware

The LockBit cybercrime group has taken credit for the recent ransomware attack that disrupted City of Wichita systems.

Ransomware

Organizations need to look beyond preventive measures when it comes to dealing with today’s ransomware threats and invest in ransomware response.

Ransomware

Philadelphia-based real estate company Brandywine Realty Trust shuts down systems following a ransomware attack.

Ransomware

Charges and sanctions announced against Dimitry Yuryevich Khoroshev, the alleged developer and operator of LockBit ransomware.

Ransomware

The City of Wichita, Kansas, has shut down its network after falling victim to a file-encrypting ransomware attack.

Cybercrime

Yaroslav Vasinskyi was sentenced to 13 years and seven months in prison for his alleged role in the REvil ransomware operation.

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version