Sponsored message
Logged in as
Audience-funded nonprofit news
radio tower icon laist logo
Next Up:
0:00
0:00
Subscribe
  • Listen Now Playing Listen
  • Listen Now Playing Listen

This archival content was originally written for and published on KPCC.org. Keep in mind that links and images may no longer work — and references may be outdated.

KPCC Archive

Port of LA terminal closed by European ransomware attack

Cargo ships are loaded at the Ports of Los Angeles and Long Beach on Friday, Feb. 19, 2016.
Cargo ships are loaded at the Ports of Los Angeles and Long Beach on Friday, Feb. 19, 2016.
(
Maya Sugarman/KPCC
)

This story is free to read because readers choose to support LAist. If you find value in independent local reporting, make a donation to power our newsroom today.

Listen 0:56
Port of LA terminal closed by European ransomware attack

A container terminal at the Port of Los Angeles remains shuttered for a second day after a cyberattack infected computers in Europe.

Officials from Danish company A.P. Moller-Maersk shut down operations at their terminal Tuesday and it remained out of commission Wednesday.

“The issue remains contained and we continue to work towards a technical recovery,” Maersk said in a statement released Wednesday afternoon. “The aggregate impact on our business is being assessed.” 

The port's seven other terminals are operating normally.

Port of L.A. spokesperson Phillip Sanfield says the ransomware attack had little impact here, in part because no ships were scheduled to come into the APMT terminal on either day.

"It's not unusual for a terminal to have one or two days, particularly mid-week, to not have ships at their terminal," Sanfield tells KPCC.

But trucks filled with cargo still aren't able to come into or out of the APMY terminal.

Sponsored message

“It was really very, very minimal impact on the port – if any," he said.

Sanfield points out the infected software was only used by Maersk and that the port has robust cybersecurity defenses to protect its own systems.

Earlier this week, a new strain of ransomware hit several European companies including pharmaceutical giant Merck. The attack eventually spread to the United States.

These types of attacks have become increasingly common over the past year as hackers can easily get their hands on the malicious code, copy it – and demand payment, according to Clifford Neuman, Director of USC's Center for Computer Systems Security. He says the hackers appear to have infected Maersk’s software through a routine update.

“This highlights some of the problems associated with automatically accepting updates, although that is something we security professionals tell people they should be doing,” Neuman said.

In general, Neuman says people should trust updates from big companies like Microsoft and Apple but they should be wary of updates from smaller software companies that may not have as strong cyber defenses.

You come to LAist because you want independent reporting and trustworthy local information. Our newsroom doesn’t answer to shareholders looking to turn a profit. Instead, we answer to you and our connected community. We are free to tell the full truth, to hold power to account without fear or favor, and to follow facts wherever they lead. Our only loyalty is to our audiences and our mission: to inform, engage, and strengthen our community.

Right now, LAist has lost $1.7M in annual funding due to Congress clawing back money already approved. The support we receive from readers like you will determine how fully our newsroom can continue informing, serving, and strengthening Southern California.

If this story helped you today, please become a monthly member today to help sustain this mission. It just takes 1 minute to donate below.

Your tax-deductible donation keeps LAist independent and accessible to everyone.
Senior Vice President News, Editor in Chief

Make your tax-deductible donation today