Russian Hacker Group Attacked Japan’s Largest Port


Japan’s Largest Port, NAGOYA, was attacked by pro-Russian hackers, disrupting the loading of Toyota parts.

Nagoya is the largest cargo throughput and has been responsible since 2002 for Toyota exports and imports; the suppliers included Denso Corp. and Aisin Corp.

CSN

As of 2021, the port has handled a total of 177.79 million tons of cargo, contributing to 10% of Japan’s overall trade value.

Targeted Ransomware Attack

The Russians made a ransomware attack that encrypts the data and demanded payment to restore it. This remains that the port is unable to load and unload containers from trailers, as reported by Japan Times.

A ransomware attack is a malware attack in which an attacker locks and encrypts the user’s data, files, or systems and demands payment to unlock and decrypt them.

This indicates that the system had been infected with ransomware; the carmaker of TOYOTA said that it cannot load or unload auto parts due to a problem.

The organization said that their no problem with the production and logistics of finished vehicles because different computers manage it.

“We will closely monitor any impact on production while carefully examining the parts inventory,” Toyota said.

The LockBit 3.0 gang made to demand in exchange for the system recovery, but Nagoya said that police have started the investigation.

Russian Hacker Group Attacked Japan’s Largest Port
LockBit 3.0 default ransom note

LockBit 3.0 is a Ransomware-as-a-Service (RaaS) group that continues the legacy of LockBit and LockBit 2.0. From January 2020, LockBit adopted an affiliate-based ransomware approach, where its affiliates use various tactics to target a wide range of businesses and critical infrastructure organizations.

According to the attack, till now blockage of trailers was observed because if the operation starts all at once, it would be very congested even after the system recovered.

“AI-based email security measures Protect your business From Email Threats!” – Request a Free Demo.



Source link