At a glance.
- LockBit 3.0 claims responsibility for Nagoya ransomware attack.
- BlackCat and SEO poisoning.
- LockBit seeks to extort semiconductor manufacturer.
- Professionals in the cyber underworld.
- Microsoft debunks claims of data theft by Anonymous Sudan.
- Russia-Ukraine hybrid war update.
- Courts and torts.
- Policies, procurements, and agency equities.
- Labor markets.
- Mergers and acquisitions.
- Investments and exits.
LockBit 3.0 claims responsibility for Nagoya ransomware attack.
The Port of Nagoya resumed some container operations Thursday as it restored normal services in the course of recovering from Tuesday's ransomware attack. Bloomberg reports that five terminals are returning to operation. The Japan Times quotes the Nagoya Harbor Transportation Association as saying that LockBit 3.0, the well-known Russian ransomware gang, has issued a ransom demand, thereby claiming responsibility for the disruption. Tech Monitor notes that LockBit 3.0, a ransomware-as-a-service (RaaS) gang, has been unusually active over the past week. Its other victims include Taiwanese chip maker TSCM as well as a range of organizations in the Netherlands, Spain, Canada, and the US. The amount LockBit 3.0 has demanded remains unknown. For more on the incident, including industry reaction, see CyberWire Pro.