Maritime Computer Emergency Response Team ADMIRAL dataset ADMIRAL dataset

Publicly disclosed information for this event

Index Number:
Title:
2023_095
A port is victim of a ransomware attack.
Day Month Year Country Activity Incident Type
4 July 2023 Japan Port Virus/Ransomware

Summary

The victim port is Japan's largest since 2002 in terms of cargo throughput, and is responsible for handling significant car exports and imports. It processes over 200 million tons of cargo annually, plays a pivotal role in the region's economic activities.

According to sources, around July 4, the victim's operations faced disruptions due to an alleged ransomware attack. Several anomalies were observed in their automated systems, including the inability to identify trucks at one of its primary docks. The Tactics, Techniques, and Procedures (TTPs) of the attack seem to correspond with activities reputed of LockBit 3.0, which claimed the attack.

The incident might have affected an estimated 15,000 containers and influenced related businesses, including major car manufacturers in the region. Operations linked to a renowned automobile corporation faced potential challenges, primarily in their packaging plant for exported car parts. Additionally, sensors at the port's entrance were non-operational, causing significant delays and disruptions in cargo loading and unloading. This widespread disturbance led to a temporary congestion of trailers at the port.

Victim

Port of Nagoya

Claimed/Reported Threat Actor

Lockbit 3.0

Origin

Cybercrime

Main impact

Availability

References

Recommendations to Port to reduce Virus/Ransomware risks:

  • Map, understand, patch and secure your exposed assets on the Internet.
  • Implement email filtering systems to detect and block phishing emails.
  • Train your organisation, personnel regularly against these threats.
  • Install efficient Endpoint Detection and Response (EDR) tools.
  • Work with your CSIRT organization to better understand the Tactics, Techniques and Procedures used by threat actors.
  • Monitor your IT and OT systems to quickly detect potential pre-ransomware activity.
  • Implement an efficient offline backup policy.
  • Encrypt all sensitive data to avoid further data leaks.
Previous Next
Disclaimer: the data are provided as is. France Cyber Maritime and the M-CERT take no responsibility for the soundness, quality, precision, nor the eventual attribution made by the referenced URLs. We give a lot of respect and support to the victims of attacks.
Files generated on Thursday, 10th October 2024.
ADMIRAL is licensed under the Creative Commons CC-BY-NC license. Copyright © France Cyber Maritime 2024.