Cyberattack on Russian port operator aimed to disrupt coal, fertilizer shipments

Russian port operator Port Alliance said it was in its third day of disruptions due to a cyberattack “from abroad” that targeted key parts of its digital infrastructure — the latest in a series of incidents affecting critical facilities amid the war between Russia and Ukraine.

In a statement on Thursday, the company said the attackers launched a distributed denial-of-service (DDoS) assault and attempted to breach its networks. The goal, Port Alliance claimed, was to “destabilize operations and disrupt business processes” tied to exports of coal and mineral fertilizers through its seaports in the Baltic, Azov–Black Sea, Far Eastern and Arctic regions.

Despite the scale and intensity of the attack, the company said its terminals and related facilities continued to operate normally. “All key systems remain operational, and port and terminal business processes have not been affected,” it said.

According to Port Alliance, the hackers used a botnet of more than 15,000 unique IP addresses from around the world — including some within Russia — and continuously changed tactics to evade security defenses.

Port Alliance operates six maritime terminals along key transport routes, with an annual cargo turnover of coal and mineral fertilizers exceeding 50 million tonnes.

The company did not attribute the attack to a specific hacker group.

Cyberattacks on transport and logistics networks have intensified since Russia’s invasion of Ukraine in 2022, with both Russian and Ukrainian hackers frequently using DDoS attacks to disrupt infrastructure on either side.

On Thursday, Ukraine’s WOG gas station chain reported a large-scale cyberattack that temporarily disrupted its online services. Access was restored later that evening, though the company did not provide further details.

Allied nations have also faced digital threats. Earlier this week, websites belonging to the Danish government and several defense companies were briefly taken offline in a DDoS attack that Danish authorities said likely originated in Russia. The pro-Russian group NoName057 claimed responsibility for the attacks, though the authenticity of those claims is difficult to verify.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

Next Post

Multiple US citizens plead guilty to helping North Korean IT workers earn $2 million

Related Posts

Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike

A suspected cyber espionage activity cluster that was previously found targeting global government and private sector organizations spanning Africa, Asia, North America, South America, and Oceania has been assessed to be a Chinese state-sponsored threat actor. Recorded Future, which was tracking the activity under the moniker TAG-100, has now graduated it to a hacking group dubbed RedNovember.
Read More

Application Containment: How to Use Ringfencing to Prevent the Weaponization of Trusted Software

The challenge facing security leaders is monumental: Securing environments where failure is not an option. Reliance on traditional security postures, such as Endpoint Detection and Response (EDR) to chase threats after they have already entered the network, is fundamentally risky and contributes significantly to the half-trillion-dollar annual cost of cybercrime. Zero Trust fundamentally shifts
Read More

SaaS Breaches Start with Tokens – What Security Teams Must Watch

Token theft is a leading cause of SaaS breaches. Discover why OAuth and API tokens are often overlooked and how security teams can strengthen token hygiene to prevent attacks. Most companies in 2025 rely on a whole range of software-as-a-service (SaaS) applications to run their operations. However, the security of these applications depends on small pieces of data called tokens. Tokens, like
Read More