Cyberattack on Russian port operator aimed to disrupt coal, fertilizer shipments

Russian port operator Port Alliance said it was in its third day of disruptions due to a cyberattack “from abroad” that targeted key parts of its digital infrastructure — the latest in a series of incidents affecting critical facilities amid the war between Russia and Ukraine.

In a statement on Thursday, the company said the attackers launched a distributed denial-of-service (DDoS) assault and attempted to breach its networks. The goal, Port Alliance claimed, was to “destabilize operations and disrupt business processes” tied to exports of coal and mineral fertilizers through its seaports in the Baltic, Azov–Black Sea, Far Eastern and Arctic regions.

Despite the scale and intensity of the attack, the company said its terminals and related facilities continued to operate normally. “All key systems remain operational, and port and terminal business processes have not been affected,” it said.

According to Port Alliance, the hackers used a botnet of more than 15,000 unique IP addresses from around the world — including some within Russia — and continuously changed tactics to evade security defenses.

Port Alliance operates six maritime terminals along key transport routes, with an annual cargo turnover of coal and mineral fertilizers exceeding 50 million tonnes.

The company did not attribute the attack to a specific hacker group.

Cyberattacks on transport and logistics networks have intensified since Russia’s invasion of Ukraine in 2022, with both Russian and Ukrainian hackers frequently using DDoS attacks to disrupt infrastructure on either side.

On Thursday, Ukraine’s WOG gas station chain reported a large-scale cyberattack that temporarily disrupted its online services. Access was restored later that evening, though the company did not provide further details.

Allied nations have also faced digital threats. Earlier this week, websites belonging to the Danish government and several defense companies were briefly taken offline in a DDoS attack that Danish authorities said likely originated in Russia. The pro-Russian group NoName057 claimed responsibility for the attacks, though the authenticity of those claims is difficult to verify.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

Next Post

Multiple US citizens plead guilty to helping North Korean IT workers earn $2 million

Related Posts

ServiceNow Patches Critical AI Platform Flaw Allowing Unauthenticated User Impersonation

ServiceNow has disclosed details of a now-patched critical security flaw impacting its ServiceNow AI Platform that could enable an unauthenticated user to impersonate another user and perform arbitrary actions as that user. The vulnerability, tracked as CVE-2025-12420, carries a CVSS score of 9.3 out of 10.0 "This issue [...] could enable an unauthenticated user to impersonate another user and
Read More

Microsoft Fixes 114 Windows Flaws in January 2026 Patch, One Actively Exploited

Microsoft on Tuesday rolled out its first security update for 2026, addressing 114 security flaws, including one vulnerability that it said has been actively exploited in the wild. Of the 114 flaws, eight are rated Critical, and 106 are rated Important in severity. As many as 58 vulnerabilities have been classified as privilege escalation, followed by 22 information disclosure, 21 remote code
Read More