Toyota To Pause Packaging Line Operations After Cyberattack On Nagoya Port
Today, Toyota Motors (7203.T) revealed it intends to pause operations at a packaging line for export-bound segments on Friday after a ransomware aggression in Japan’s biggest port led to a system glitch and stalled work for more than two days.
Japan’s central port Nagoya, where Toyota exports most of its cars, suffered a cyber attack on Tuesday morning which disrupt the loading and unloading of containers from trailers.
However, the port had partly restarted cargo operations today, a half-day later than originally expected, nonetheless, it will not be fully functional until evening, the Nagoya Port Authority asserted.
Toyota declared it will resolve whether to restart operations at the packaging plant based on the port’s operational status.
At this point, Toyota foresees no immediate influence on operations at its overseas vehicle plants.
Nagoya Port Operation
Yesterday, the Port of Nagoya, the largest and busiest port in Japan, was a target of a ransomware attack that presently impacts the operation of container terminals.
Ideally, the port accounts for approximately 10% of Japan’s total trade volume. It runs 21 piers and 290 berths. It deals with over two million containers and cargo tonnage of 165 million annually.
As previously mentioned, Toyota Motor Corporation, one of the world’s largest automakers, uses the port to export most of its cars.
Container Operation halted
Today, the administrative authority of the Port of Nagoya has posted a notice about a malfunction in the Nagoya Port Unified Terminal System (NUTS).
According to the notice, the issue was prompted by a breach that transpired on July 4, 2023, around 06:30 AM local time.
The Nagoya Port Authority has reportedly dealt with cyberattacks before however, it seems that this aggression has the largest impact than those previously recorded.
On September 6, 2022, the website of the port was inaccessible for about 40 minutes due to a loaded distributed denial-of-service attack (DDoS) hurled by the pro-Russian group Killnet.