The largest and busiest port in Japan, the port of Nagoya has been targeted in a ransomware attack that affected the operation of container terminals.
The port accounts for around 10% of Japan’s total trade volume. It operates 21 piers and 290 berths. It handles over two million containers and cargo tonnage of 165 million every year.
The port is also used by the Toyota Motor Corporation, one of the world’s largest automakers, to export most of its cars.
The administrative authority of the Port of Nagoya has issued a notice about a malfunction in the “Nagoya Port Unified Terminal System” (NUTS) — the central system controlling all container terminals in the port. The computer system is used to operate the port’s five cargo terminals.
As per the notice, the problem was due to a ransomware attack that occurred on July 4, 2023, around 06:30 AM local time.
The port authority is working to restore the NUTS system and plans to resume operations tomorrow.
Until then, all container loading and unloading operations at the terminals using trailers have been canceled, causing massive financial losses to the port and severe disruption to the circulation of goods to and from Japan.
Though the Nagoya Port Authority has dealt with cyberattacks before, this one has the largest impact. On September 6, 2022, the website of the port was unreachable for about 40 minutes due to a massive distributed denial-of-service attack (DDoS) launched by the pro-Russian group Killnet.
As of now, the threat actor responsible for the ransomware attack on the Port of Nagoya remains unknown as no threat actor has claimed the intrusion publicly, yet.
The post Japan’s largest port suspends operations after ransomware attack first appeared on Cybersafe News.