Japan’s most essential and busiest port – the Port of Nagoya, has just disclosed a ransomware attack on it’s Unified Terminal System, affecting it’s operations.
The port’s administration said an attack occurred in the early hours of Tuesday, forcing it to cancel all the operations at most of it’s terminals. As it investigates the incident, the port promises to resume operations by tomorrow morning. The threat actor behind this attack still remains unknown.
Ransomware Attack on Port of Nagoya
Being an island nation, Japan relies heavily on ports to export/import products and the port of Nagoya is the country’s largest and busiest station, roughly handling 10% of Japan’s total trade volume. With 21 piers and 290 berths, the Nagoya port can handle two million containers of 165 million tons of cargo annually.
One of the prominent customers of Nagoya port is Toyota, which uses it’s network to export most of it’s cars to the world. Unfortunately, this will be impacted due to a ransomware attack at the port – as noted by it’s administration today.
The Port of Nagoya has issued a notice about a malfunction in the “Nagoya Port Unified Terminal System” (NUTS) today, affecting it’s entire operations. The NUTS software is an essential element in the process, which controls all container terminals in the port.
Reading it’s report, the port said the ransomware attack occurred on July 4, 2023, around 06:30 AM local time. It is now working with the Aichi Prefectural Police Headquarters to investigate the issue and plans to restore the NUTS system by 6 PM today and port operations by 08:30 AM tomorrow.
Until then, all the container operations, like loading and unloading goods at the terminals, stand cancelled, resulting in massive financial losses to the port and the customers using it. This could also disrupt the supply of imported goods in Japan.
The port hasn’t disclosed the name of any threat actor behind this incident and no ransomware group has claimed this attack yet.
Other Trending News:- News