Toyota Shut Down Japanese Plants In A Supply Chain Attack

The world’s largest car-maker Toyota Motor Corp. has shut down plants across Japan and the factories of two subsidiaries Hino and Daihatsu after a cyber attack and it is unclear when production might resume.  The attack was on one of the car maker’s largest parts suppliers and this means that the company will suspend 28 lines at 14 plants. 

These events highlight the particular vulnerability of manufacturing industry to such attacks, and the substantial consequences a breach can cause.

The decision by Toyota comes as governments around the world warn companies of cyber attack risks following Russia’s invasion of Ukraine. Senior Japanese officials have said they feared leading companies were now targets for reprisals after the government joined other G7 industrial nations in applying tougher sanctions against Russia.
Toyota, which did not specify the nature of the attack nor identify Russia as a source, said it would stop production at all 14 domestic plants. Toyota employs more than 70,000 workers in Japan. 

Toyota said the shutdown followed “system failures at a domestic supplier”, which it later identified as the general component maker Kojima Press Industries. The car maker has said that this shut-down would reduce production by 13,000 vehicles. It is investigating when it can resume production operations.  Japanese media, without citing sources, reported the attack on Kojima appeared to have affected Toyota’s system for making and receiving orders for parts.

  • Kojima Press Industries’ said it had been attacked by a targeted virus from outside, adding that it was considering informing the police. Japan’s ministry of economy, trade and industry said in a statement: “Given the current situation, the potential risk of cyber attacks is increasing.”
  • Japan’s Prime Minister Fumio Kishida told reporters that the country had decided to join western nations in removing some of Russia’s banks from the Swift global payments system. Officials at the cabinet secretariat’s cyber security centre said they were aware of the reports and were gathering information with the ministry of industry, but said they could not determine where the attack originated. 

One adviser to the Japanese government on cyber security issues said concerns were rising that Russian president Vladimir Putin had unleashed hackers with orders to attack targets in countries that were prominent supporters of Ukraine. 

“Normally, you would look at an attack on Toyota or Kojima as financially motivated, but there does not seem to be evidence of that here,” said the adviser.  

Toyota has already been forced to adjust production goals because of pandemic-related supply chain issues and the global chip shortage.

Asian Nikkei:       Reuters:      FT.com:   Arab News:     DenbighshireFP:       Techmonitor

You Might Also Read: 

Honda Hit By Ransomware:

 

« Russian Cyber Crime Group Issues A Warning
The Online Battle In Ukraine »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CyberArk Software

CyberArk Software

CyberArk is an established leader in privileged access management and offers the most complete set of Identity Security capabilities.

SecureWorks

SecureWorks

SecureWorks provides intelligence-driven security solutions for organizations to prevent, detect, rapidly respond and predict cyberattacks.

Exostar

Exostar

Exostar is the cloud platform of choice for secure enterprise and supply chain collaboration solutions and identity and access management expertise.

Namogoo

Namogoo

Namogoo’s disruptive technology identifies and blocks unauthorized product ads that are injected into customer web sessions by client-side Digital Malware.

Vicarious

Vicarious

Vicarious identify the vulnerabilities in the software without involving the vendor and protect it before the hackers take advantage of it, even in compiled applications.

Cybertech

Cybertech

Cybertech Conference & Exhibition presents commercial problem solving strategies and solutions for the global cyber threat that meet the diverse challenges for a wide range of sectors.

National Cyber Summit (NCS)

National Cyber Summit (NCS)

The National Cyber Summit is the preeminent event for cyber training, education and workforce development aimed at protecting our nation's infrastructure from the ever-evolving cyber threat.

Procilon Group

Procilon Group

Procilon Group specialize in the development of cryptographic software as well as strategic advice on information security and data protection.

VerSprite

VerSprite

VerSprite is a specialist information security consulting firm. We provide organizations with detection across all their attack surfaces and deliver critical insight into all possible attack methods.

MENAInfoSecurity

MENAInfoSecurity

MENAInfoSecurity is a regional leader in information security solutions, assurance services and managed services.

Jenson Knight

Jenson Knight

Jenson Knight is a global cyber security, cloud and IT infrastructure staffing specialist.

National Center for Cyber Security Technology (NCCST) - Taiwan

National Center for Cyber Security Technology (NCCST) - Taiwan

NCCST provides cyber security protection and technical services at a national level in Taiwan.

InfoSec Conferences

InfoSec Conferences

InfoSec Conferences is an online directory of infosec conferences. We list every single Information Security conference, event and seminar within every niche in Cybersecurity.

Epiphany Systems

Epiphany Systems

Epiphany enhances your defensive security controls by providing you with an offensive perspective. We expose the most likely attack paths to your most critical IT assets and users.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Altospam

Altospam

Altospam is a full service corporate email protection, integrating multiple security levels for your emails.