• Home
  • Lifestyle
  • Tech
  • Second wave of ransomware attack hits India’s largest container port JNPT

Second wave of ransomware attack hits India’s largest container port JNPT

This comes just weeks after the WannaCry ransomware attack hitting countless major organisations globally

On Wednesday, June 28, one of the three terminals at JNPT, India’s largest container port, located at the outskirts of Mumbai, was the victim of the global malware attack, causing operations to be interrupted. The confirmation of the attack was announced by the shipping ministry, which stated that it was a result of the attack at the Hague office of Danish shipping giant AP Moller-Maersk, which operates the terminal.

Maersk also stated later that the global ransomware attack had resulted in outages in several of its computer systems all over the world. The latest global cyberattack to follow after last month’s WannaCry ransomware attack, which had hit over 300,000 computers all over the world, this uses an all new ransomware virus known as Petya, and has already affected 17 APM terminals, out of which, two are in Rotterdam and the remaining, in other parts of the world. It has also infected computers at Russia’s biggest oil company, Rosneft, global advertising giant WPP Group, several Ukranian firms, including its central bank and an international airport, as well as other multinational firms.

In light of the attack, the port has been clearing the containers manually for the time being. However, according to the Chairman of JNPT, Anil Diggikar, operational capacities have been severely impacted, falling to one third of what it was.

Petya reportedly also has its origins in the exploit developed by the NSA which was previously leaked online and used to develop the Wannacry ransomware virus. One of the victims of the attack, a Ukrainian media company, reported that the hackers have made a demand for USD 300 in Bitcoins, as ransom for decrypting the files, in similar fashion to last month’s attacks.


Categories:   Lifestyle, Tech


Time limit is exhausted. Please reload CAPTCHA.