Major Cyber Attack, Sweep Globe India Effected, JNU port in Mumbai


A major cyber attack wiped out through many countries all across the world also affected India and  operations of global companies across  India.  Due to the ransomware attack operations at one of the terminals of the Jawaharlal Nehru Port Trust in Mumbai had to be shut down.

On Tuesday, a global cyber attack  disrupted computers of oil company in Russia. Last month a virus similar to the ransomware infected more than 300,000 computers of Ukrainian banks and multinational firms.

This time India is also among the countries that affected by the ransomware as this cause to shut down  the operations at one of its three terminals of country’s largest port at Jawaharlal Nehru Port Trust in Mumbai  .

News agency PTI reported, the operations at one of the three terminals of the country’s largest port were affected as the global ransomware attack immobilize some of central banks and many big corporations in Europe.

The fastly growing cyber extraction campaign  emphasize many growing concerns that businesses have failed to secure their networks from aggressive hackers, who have shown that they are capable of shutting down even large infrastructure and disrupt corporate and government networks.

The code known as “Eternal Blue” was included in it which cyber security experts believe was stolen from the US National Security Agency, and was used in last month’s ransomware attack.

Kevin Johnson, the chief executive of cybersecurity firm Secure Ideas said, ” The Cyber attacks can simply destroy us and the Companies are not doing what they are supposed to do to solve  the problem.”

The ransomware virus  has disrupted computers running in Microsoft Corporation “Windows” by encrypting hard drives and overwriting files and then demanded $300 to restore access. According to a public ledger of transactions listed on “” more than 30 victims has paid the bitcoin account associated with the attack.

Microsoft said the virus could spread through a fault that was on repair in a security update in March.

A spokesman for the company said,” We are investigating and will take appropriate action to protect customers,” adding that Microsoft antivirus software is capable of detecting  removing that virus from the system.


According to security software maker Kaspersky Lab, Russia and Ukraine were most affected countries by the attack of thousands of virus, many other victims also spread across countries including France, Germany, Britain, Italy, United States and Poland. There are unknown  number of  virus attacks in these countries.

Security experts said they were expecting the smaller impacts than Wanna Cry, since many computers had been updated with Windows updates in the wake of Wanna Cry to protect them against attacks using “Eternal Blue code” , last month.

After analyzing this attack, Juniper Networks said in a blog post that  this attack could be more dangerous than traditional ransomware because it makes computers totally unresponsive and unable to reboot.

Researchers said the attack  borrowed malware code which is used in earlier ransomware campaigns and is known as “GoldenEye” and “Petya”.

After last month’s attack, government’s  security firms and industrial groups advised consumers and businesses to make sure that all their computers were updated with Microsoft patches to defend against the virus.

The US Department of Security said that it was analysing and coordinating with other countries and advised victims not to pay the extortion and said that doing so does not guarantee the access will be restored.

The White House National Security Council said in a statement,” Currently there was no risk to public safety. It said, the United States was investigating the attack and determined to hold those responsible accountable.

The National Security Agency didn’t  respond to a request for comment. The spy agency has not  said whether it built “Eternal Blue” and other hacking tools leaked online by an entity known as Shadow Brokers.

Several security experts have said,” They believe that the Shadow Broker’s is tied to the Russian government and the North Korean government was behind “Wanna Cry” and Both countries governments deny that  they are involved in hacking.

The Makers of Nivea skin care products, and Reckitt Benckiser, an India based employees at Beiersdorf, which owns Enfamil and Lysol, told Reuters the ransomware attack had impacted some of their systems.

Moller Maersk said, one of the affected entities globally, operates the Gateway Terminals of India at JNPT that has a capacity to handle 1.8 million standard container units.

Tonight, A senior JNPT official told PTI ,” We have been informed that the operations at GTI have come to a standstill because their systems are affected due to the malware attack and manually they are trying to work .

Last  month’s fast spreading “Wanna Cry” and “ransomware” attack was disabled, after a 22 year old , British security researcher Marcus Hutchins created a  kill switch that experts hailed as the decisive step in slowing  down the attack.

Security experts said that they did not believe that the ransomware released yesterday had a kill switch which means it might be harder to stop.


Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.