The requested article has expired, and is no longer available. Any related articles, and user comments are shown below.
© KYODOPro-Russian hackers target Port of Nagoya; demand ransom
NAGOYA©2025 GPlusMedia Inc.
The requested article has expired, and is no longer available. Any related articles, and user comments are shown below.
© KYODO
24 Comments
Login to comment
nosuke
It’s Russia tell Japan to back off and go brown someone else other than NATo
TaiwanIsNotChina
Then it is up to Japan to tell Russia to have some basic gd civility.
TokyoLiving
LOL !!..
Dango bong
Russia continues its "spreading joy to the world" campaign. Thanks Russia!
ifd66
In other words they are going to roll over and pay the ransom... so encouraging hacker groups to continue their 'work'.
Uchujin
Yes, Toyota is big but there are not the only one using the port.
kurisupisu
The reporting in this article is exceptionally lazy and misleading
Firstly, the name of the ransomware is
LockBit 3.0 -this is not the name of the group
Secondly, this ransomware is now widely available as a template to develop hacking software, the attack could be from any country
To equate being pro-Russian with a hacking attack is just pure speculation and misleading even if the group were Russian
Sven Asai
DX over the zenith. lol Look, if you can’t handle it, then don’t use it. I guess, someone opened an email attachment. Click here for the accompanying freight documents… No, of course they have to separate the internal system from external communication influence and access. That’s even possible with fax and floppy and then even works better, uninterrupted.
Desert Tortoise
The Port of Los Angeles claims they receive some 40 million cyber attacks per month. The ports cyber security has to be 100% effective as it only requires one of these 40 million to get past their security for the cyber crooks to infect their system with ransomware. The probability of eventual success by the bad guys is almost 100% no matter how good their security features are.
https://safety4sea.com/port-of-la-cyber-attacks-have-doubled-since-pandemic/
Mark
As always Criminal evolve just as fast technology, if there is away to improve a system, simultaneously there is away to hack it
Redemption
Japanese companies, and I am sure the same around the world, have a huge vulnerability refusing to update software as mottainai.
rainyday
Well, given that NATO isn't launching cyber attacks against Japan while Russia is, they are doing a very good job of making NATO look good in comparison.
Legrande
The reporting in this article is exceptionally lazy and misleading
Firstly, the name of the ransomware is
LockBit 3.0 -this is not the name of the group
Secondly, this ransomware is now widely available as a template to develop hacking software, the attack could be from any country
To equate being pro-Russian with a hacking attack is just pure speculation and misleading even if the group were Russian
Wouldn't be the first time the media has stirred things up.
EFD
Because when one cannot get a job providing honest goods and services in a free market, one becomes a cyber criminal (or a day trader).
It's the Russian way.
Zaphod
How do they know that "LockBit" is based in Russia? I doubt they publish a mail address.
Mr Kipling
The ransom note read " Send one billion (with a B) dollars to Mr. V Putin, The Kremlin, Russia."
So obviously Russian!
CruisinJapan
Having done cybersecurity/IT consulting work in Japan, this is frustrating but not surprising.
Japan is lagging behind in a big way. Most domestic organizations are unwilling to spend enough money to reduce risks and modernize systems. "It's been okay so far, why pay more?"
The industry consensus is, you spend some money to reduce risk because you end up paying more when threats like this are realized.
And here we are caught on our heels, tying up drivers, products spoiling inside containers, and the effects will be felt for months.
Zaphod
Mr Kipling
LOL yeah, that is apparently what a "Russian" hacker would say. Is the whole article a spoof?