LockBit ransomware attackers target Japan’s biggest port: but who’s next?
A Russian ransomware group brought Japan’s biggest port to a crushing halt on Tuesday morning. Nagoya Port Authority was just the latest to be hit by LockBit 3.0, raising concerns over what happens next.
The first sign of an attack was at 6.30am on Tuesday morning, when a port employee discovered his computer wasn’t working. Shortly afterwards, a printout appeared on a nearby printer declaring “LockBit” as the culprit.
Nagoya is Japan’s largest port, handling over 10,000 pieces of cargo every day. Toyota is one of its key customers, although a spokesperson said that “shipment of new cars has not been affected”.
The port claims it did not pay the ransom, but it took a team of 60 technicians until late on Thursday evening to work through the affected files. The port is now back up and running.
Who LockBit is targeting — and how to stop it
This attack highlights two consistent themes for LockBit. First, it focuses on G7 nations — which have united to freeze Russian assets since its invasion of Ukraine — and second it targets key parts of the Western economy.
This is the second time LockBit has attacked ports. The first came on Christmas day 2022, when it stole data from the Port of Lisbon.
Read how the world’s largest ports are using AI to keep the global supply chain humming
But it isn’t just port authorities who need to worry. “Industrial systems are attractive targets because the IT infrastructure is usually focussed on high availability rather than security,” said Simon Edwards, CEO and founder of SE Labs (and a board member of AMTSO).
“Many of these systems were built without an intention to connect to the internet. And then they were connected without sophisticated security plans in place.”
So how can organisations protect themselves? “Sometimes security measures in such SCADA [Supervisory Control and Data Acquisition] systems are available but not enabled by default,” Edwards explained.
“Industrial installations should review their equipment thoroughly and consider compartmentalising to allow only necessary internet access.”
Who will LockBit target next?
Although almost all the coverage of this latest LockBit attack points the finger at Russia, Edwards points out that “it’s actually impossible to accurately attribute cyber attacks”. Before adding: “At least through legal means.”
In LockBit’s case, the evidence appears compelling, with four years of attacks to draw upon. We are now dealing with LockBit 3.0 (or LockBit Black), as opposed to LockBit 2.0, which disbanded in 2022, and the original LockBit.
“The group, which has over 1,500 victim announcement records on the SOCRadar platform, broke the record in the first quarter of 2023 as the most active ransomware group by far, with over 300 announced victims,” stated SOCRadar.
It has crunched through the numbers and found that no industry is safe. Manufacturing is LockBit 3.0’s top target, but it has also hit education, legal services and health care sectors.
Nor are you protected if yours is a small business. The ransomware group attacks all sizes indiscriminately, so make sure you understand how ransomware attacks work. And put protective measures in place.
NEXT UP
Why Rotterdam is a tech haven: a love letter from a startup
We reached out to Kees Wolters asking for a comment on Rotterdam as one of the best cities in Europe for tech workers – he sent us what amounted to a love letter to the city, which we decided to publish in full (with his consent), below.
Verizon and Skylo launch direct-to-device messaging using satellites
Verizon and Skylo partnered to launch a direct-to-device messaging service for customers and Internet of Things (IoT) enthusiasts.
IBM pushes for EU to make AI open and collaborative
If the EU wants to remain a global digital leader then it needs to make AI open and trusted. So says IBM in its new digital policy agenda for Europe.