The requested article has expired, and is no longer available. Any related articles, and user comments are shown below.
© KYODOPro-Russian hackers target Port of Nagoya; demand ransom
NAGOYA©2023 GPlusMedia Inc.
The requested article has expired, and is no longer available. Any related articles, and user comments are shown below.
© KYODO
24 Comments
Login to comment
nosuke
It’s Russia tell Japan to back off and go brown someone else other than NATo
TaiwanIsNotChina
Then it is up to Japan to tell Russia to have some basic gd civility.
Zoroto
Maybe it's time to upgrade from running your business on Windows 95.
Roy Sophveason
The article's hyperfocus on Toyota is a bit weird. This is a whole port shut down, and (from very, very close second-hand experience) its operation is anything but exclusive to Toyota. It's almost as if it was a convenient occasion for Toyota to get out some preemptive PR.
TokyoLiving
LOL !!..
Dango bong
Russia continues its "spreading joy to the world" campaign. Thanks Russia!
ifd66
In other words they are going to roll over and pay the ransom... so encouraging hacker groups to continue their 'work'.
Uchujin
Yes, Toyota is big but there are not the only one using the port.
kurisupisu
The reporting in this article is exceptionally lazy and misleading
Firstly, the name of the ransomware is
LockBit 3.0 -this is not the name of the group
Secondly, this ransomware is now widely available as a template to develop hacking software, the attack could be from any country
To equate being pro-Russian with a hacking attack is just pure speculation and misleading even if the group were Russian
AlternativeOpinion
Having dealt with that kind of ransom ware attack I can tell you, your cyber security is only as strong as your weakest link. It is really well made and will delay infection until once they believe they have had time to infect your backups. Rolling backups with a number of alternating backup drives was the only thing that saved us. Better to lose a couple of days work than lose potentially everything.
Sven Asai
DX over the zenith. lol Look, if you can’t handle it, then don’t use it. I guess, someone opened an email attachment. Click here for the accompanying freight documents… No, of course they have to separate the internal system from external communication influence and access. That’s even possible with fax and floppy and then even works better, uninterrupted.
Desert Tortoise
The Port of Los Angeles claims they receive some 40 million cyber attacks per month. The ports cyber security has to be 100% effective as it only requires one of these 40 million to get past their security for the cyber crooks to infect their system with ransomware. The probability of eventual success by the bad guys is almost 100% no matter how good their security features are.
https://safety4sea.com/port-of-la-cyber-attacks-have-doubled-since-pandemic/
Mark
As always Criminal evolve just as fast technology, if there is away to improve a system, simultaneously there is away to hack it
Redemption
Japanese companies, and I am sure the same around the world, have a huge vulnerability refusing to update software as mottainai.
rainyday
Well, given that NATO isn't launching cyber attacks against Japan while Russia is, they are doing a very good job of making NATO look good in comparison.
Zoroto
And this is from Kyodo, the propaganda arm of the LDAP, and not some cheap outfit like SoraNews24.
It just shows how much trust you can put into a Kyodo article.
Eastman
no evidence need.
its enough if its antirussian so narrative line will be kept...
Legrande
The reporting in this article is exceptionally lazy and misleading
Firstly, the name of the ransomware is
LockBit 3.0 -this is not the name of the group
Secondly, this ransomware is now widely available as a template to develop hacking software, the attack could be from any country
To equate being pro-Russian with a hacking attack is just pure speculation and misleading even if the group were Russian
Wouldn't be the first time the media has stirred things up.
EFD
Because when one cannot get a job providing honest goods and services in a free market, one becomes a cyber criminal (or a day trader).
It's the Russian way.
Zaphod
How do they know that "LockBit" is based in Russia? I doubt they publish a mail address.
Mr Kipling
The ransom note read " Send one billion (with a B) dollars to Mr. V Putin, The Kremlin, Russia."
So obviously Russian!
Eastman
Mr Kipling
Exactly no doubt/irony off/.
CruisinJapan
Having done cybersecurity/IT consulting work in Japan, this is frustrating but not surprising.
Japan is lagging behind in a big way. Most domestic organizations are unwilling to spend enough money to reduce risks and modernize systems. "It's been okay so far, why pay more?"
The industry consensus is, you spend some money to reduce risk because you end up paying more when threats like this are realized.
And here we are caught on our heels, tying up drivers, products spoiling inside containers, and the effects will be felt for months.
Zaphod
Mr Kipling
LOL yeah, that is apparently what a "Russian" hacker would say. Is the whole article a spoof?