crime

Pro-Russian hackers target Port of Nagoya; demand ransom

24 Comments

The requested article has expired, and is no longer available. Any related articles, and user comments are shown below.

© KYODO

©2023 GPlusMedia Inc.

24 Comments
Login to comment

It’s Russia tell Japan to back off and go brown someone else other than NATo

-10 ( +8 / -18 )

nosukeToday  07:07 am JST

It’s Russia tell Japan to back off and go brown someone else other than NATo

Then it is up to Japan to tell Russia to have some basic gd civility.

7 ( +15 / -8 )

Maybe it's time to upgrade from running your business on Windows 95.

-2 ( +10 / -12 )

The article's hyperfocus on Toyota is a bit weird. This is a whole port shut down, and (from very, very close second-hand experience) its operation is anything but exclusive to Toyota. It's almost as if it was a convenient occasion for Toyota to get out some preemptive PR.

-4 ( +6 / -10 )

LOL !!..

-13 ( +3 / -16 )

Russia continues its "spreading joy to the world" campaign. Thanks Russia!

-4 ( +9 / -13 )

it intends to resume operations Thursday morning.

In other words they are going to roll over and pay the ransom... so encouraging hacker groups to continue their 'work'.

-2 ( +4 / -6 )

The article's hyperfocus on Toyota is a bit weird. This is a whole port shut down, and (from very, very close second-hand experience) its operation is anything but exclusive to Toyota. It's almost as if it was a convenient occasion for Toyota to get out some preemptive PR.

Yes, Toyota is big but there are not the only one using the port.

4 ( +4 / -0 )

The reporting in this article is exceptionally lazy and misleading

Firstly, the name of the ransomware is

LockBit 3.0 -this is not the name of the group

Secondly, this ransomware is now widely available as a template to develop hacking software, the attack could be from any country

To equate being pro-Russian with a hacking attack is just pure speculation and misleading even if the group were Russian

11 ( +15 / -4 )

Having dealt with that kind of ransom ware attack I can tell you, your cyber security is only as strong as your weakest link. It is really well made and will delay infection until once they believe they have had time to infect your backups. Rolling backups with a number of alternating backup drives was the only thing that saved us. Better to lose a couple of days work than lose potentially everything.

6 ( +7 / -1 )

DX over the zenith. lol Look, if you can’t handle it, then don’t use it. I guess, someone opened an email attachment. Click here for the accompanying freight documents… No, of course they have to separate the internal system from external communication influence and access. That’s even possible with fax and floppy and then even works better, uninterrupted.

-3 ( +0 / -3 )

The Port of Los Angeles claims they receive some 40 million cyber attacks per month. The ports cyber security has to be 100% effective as it only requires one of these 40 million to get past their security for the cyber crooks to infect their system with ransomware. The probability of eventual success by the bad guys is almost 100% no matter how good their security features are.

https://safety4sea.com/port-of-la-cyber-attacks-have-doubled-since-pandemic/

4 ( +4 / -0 )

As always Criminal evolve just as fast technology, if there is away to improve a system, simultaneously there is away to hack it

0 ( +0 / -0 )

Japanese companies, and I am sure the same around the world, have a huge vulnerability refusing to update software as mottainai.

-2 ( +2 / -4 )

It’s Russia tell Japan to back off and go brown someone else other than NATo

Well, given that NATO isn't launching cyber attacks against Japan while Russia is, they are doing a very good job of making NATO look good in comparison.

2 ( +5 / -3 )

Firstly, the name of the ransomware is

LockBit 3.0 -this is not the name of the group

Secondly, this ransomware is now widely available as a template to develop hacking software, the attack could be from any country

To equate being pro-Russian with a hacking attack is just pure speculation and misleading even if the group were Russian

And this is from Kyodo, the propaganda arm of the LDAP, and not some cheap outfit like SoraNews24.

It just shows how much trust you can put into a Kyodo article.

0 ( +3 / -3 )

no evidence need.

its enough if its antirussian so narrative line will be kept...

-2 ( +4 / -6 )

The reporting in this article is exceptionally lazy and misleading

Firstly, the name of the ransomware is

LockBit 3.0 -this is not the name of the group

Secondly, this ransomware is now widely available as a template to develop hacking software, the attack could be from any country

To equate being pro-Russian with a hacking attack is just pure speculation and misleading even if the group were Russian

Wouldn't be the first time the media has stirred things up.

-3 ( +3 / -6 )

Because when one cannot get a job providing honest goods and services in a free market, one becomes a cyber criminal (or a day trader).

It's the Russian way.

-1 ( +3 / -4 )

How do they know that "LockBit" is based in Russia? I doubt they publish a mail address.

-6 ( +1 / -7 )

The ransom note read " Send one billion (with a B) dollars to Mr. V Putin, The Kremlin, Russia."

So obviously Russian!

-4 ( +2 / -6 )

Mr Kipling

Exactly no doubt/irony off/.

-2 ( +0 / -2 )

Having done cybersecurity/IT consulting work in Japan, this is frustrating but not surprising.

Japan is lagging behind in a big way. Most domestic organizations are unwilling to spend enough money to reduce risks and modernize systems. "It's been okay so far, why pay more?"

The industry consensus is, you spend some money to reduce risk because you end up paying more when threats like this are realized.

And here we are caught on our heels, tying up drivers, products spoiling inside containers, and the effects will be felt for months.

1 ( +1 / -0 )

Mr Kipling

The ransom note read " Send one billion (with a B) dollars to Mr. V Putin, The Kremlin, Russia."

So obviously Russian!

LOL yeah, that is apparently what a "Russian" hacker would say. Is the whole article a spoof?

-1 ( +1 / -2 )

Login to leave a comment

Facebook users

Use your Facebook account to login or register with JapanToday. By doing so, you will also receive an email inviting you to receive our news alerts.

Facebook Connect

Login with your JapanToday account

User registration

Articles, Offers & Useful Resources

A mix of what's trending on our other sites