Nagoya Re-Opens After Ransom Attack

Container movements at Japan's busiest cargo port fully restarted overningh on6th July eveningfollowing an attack by Russia-based hackers on its computer system caused disruptions for two and a half days. This is the latest in a series of costly attacks on part facilties this year, which have affected a US Navy dockyard and the Port of Lisbon.

Japan’s largest and busiest Port of Nagoya, was shut down after a cyber attack by the Russian LockBit ransomware gang. This disrupted cargo as operators rushed to prevent a wider delay in shipments - as it handles 10% of Japan’s total import and export trade, the two-day closure is likely to have significant knock-on effects.

The port, which accounts for roughly 10% of Japan's total trade volume, operates 21 piers and 290 berths. 
It handles over two million containers and cargo tonnage of 165 million every year and now has been closed after the problem hack was discovered, operator Nagoya Harbour Transportation Authority (NHTA) said, and the police have launched an investigation. 

One of the major idustrial  Japanese firms, Toyota, itself a recent victim of hackers, has been significantly disrupted by the breach.

The attack was uncovered around 6.30am on Tuesday 4th July, when an employee at the NHTA was unable to access the Nagoya United Terminal System (NUTS), which is the computer system used to operate the port’s five cargo terminals. 

A ransom note has confirmed that the port had fallen victim to LockBit attack by the notorious hacking gang. The ransom demand amount has not been disclosed.

Repair work on the computer system infected with the virus took longer than scheduled, the Nagoya Harbor Transportation Association said that all container loading and unloading operations at the terminals using trailers were cancelled, causing large-scale financial losses to the port and severe disruption to the transport of goods to and from Japan.

As more Asian ports automate and move away from paper documentation, hackers pose a growing problem to the region’s shipping networks. 

The Port of Nagoya has been hacked before in September 2022 when the harbour was hit by a large DDoS attack where NUTS was down for almost an hour. Another Russian gang Killnet claimed it was the attacker in that incident, which affected Japanese government websites nd other services nationwide.  

Japan Today:    Bloomberg:     Kyodo News:    Techmonitor:     Bleeping Computer:      Japan Times:   

You Might Also Read:  

Ransomware Trends In The Aviation & Maritime Industries:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Financial Services Cyber Compliance Is About To Get Harder
The Netherlands To Restrict Computer Chip Equipment Exports To China »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Sonatype

Sonatype

Sonatype protects the world's enterprise software from security, compliance, licensing risks, while reducing application development and deployment time.

Forcepoint

Forcepoint

Forcepoint provide a unified, cloud-centric platform that safeguards users, networks and data while eliminating the inefficiencies of managing multiple point security products.

Astra

Astra

Astra's website security solution provides real-time protection against malware, hackers, SQLi, XSS, DDoS, LFI and RFI.

Security Onion Solutions

Security Onion Solutions

Security Onion Solutions is the creator and maintainer of Security Onion, a free and open platform for threat hunting, network security monitoring, and log management.

Apomatix

Apomatix

Apomatix is a platform that simplifies the complexity of cyber risk audit and management.

SKOUT Secure Intelligence

SKOUT Secure Intelligence

SkOUT Secure Intelligence (formerly Oxford Solutions) provides cyber security monitoring services to organizations around the globe.

Egyptian Supreme Cybersecurity Council (ESCC)

Egyptian Supreme Cybersecurity Council (ESCC)

ESCC is responsible for developing a national strategy to face and respond to the cyber threats and attacks and to oversee its implementation and update.

Jumio

Jumio

Jumio’s end-to-end identity verification and authentication solutions fight fraud, maintain compliance and onboard good customers faster.

Andreessen Horowitz (a16z)

Andreessen Horowitz (a16z)

Andreessen Horowitz (known as "a16z") is a venture capital firm in Silicon Valley, California that backs bold entrepreneurs building the future through technology.

Birch Cline Cybersecurity

Birch Cline Cybersecurity

Birch Cline specializes in helping Local Government and Education agencies, as well as mid-market organizations, build and maintain successful cybersecurity programs.

LogicMonitor

LogicMonitor

LogicMonitor provides SaaS-based IT infrastructure monitoring services for on-premises and multi-cloud environments.

PolySwarm

PolySwarm

PolySwarm is a crowdsourced threat intelligence marketplace that provides a more effective way to detect, analyze and respond to the latest threats.

Cyber Unicorns

Cyber Unicorns

Cyber Unicorns is a cyber security consultancy created to help drive cyber security outcomes in the small to medium-sized business space.

Alpha Echo

Alpha Echo

Specialising in security advice and enterprise-wide Cyberworthiness, Alpha Echo helps Australia deliver on cyber outcomes at a military grade level.

RST Cloud

RST Cloud

RST Cloud is a cutting-edge technology company that specialises in threat intelligence solutions for businesses of all sizes.

CHERI Alliance

CHERI Alliance

CHERI Alliance is an industry initiative spearheading the global adoption of the Capability Hardware Enhanced RISC Instructions (CHERI) security technology across the computing industry.