Toyota to restart Japan production after halt caused by cyberattack on supplier

In This Article:

By Satoshi Sugiyama, Maki Shiraki and Tim Kelly

TOKYO (Reuters) -Toyota Motor Corp will restart domestic production from Wednesday after a cyberattack on a supplier ground the automaking giant's factories to a one-day halt, sparking concerns about vulnerability in Japan Inc's supply chain.

No information was available about who was behind the attack, or the motive. It came just after Japan joined Western allies in clamping down on Russia in response to the invasion of Ukraine, although it was not known whether the attack was related.

Cybersecurity has emerged as a key area of concern in Japan, where government critics say responses to hacking threats have been hampered by a fractured approach, with an attack on a hitherto obscure supplier enough to bring one of the world's mightiest manufacturers to a domestic standstill.

Toyota's production lines will be switched back on at its 14 factories across the country on Wednesday, it said in a statement. Tuesday's suspension hit output of around 13,000 vehicles.

Kojima Industries Corp, which provides plastic parts and electronic components to the automaker, said it had discovered an error at one of its file servers on Saturday night. After rebooting the server, it confirmed it had been infected with a virus, and found a threatening message, it said in a separate statement.

The message was written in English, a Kojima spokesperson told Reuters, but declined to give further details.

A system failure hampered communication with Toyota over parts orders and led to a suspension of production at the automaker, Kojima said.

TOP TIER

Government ministers said they were following the incident closely. While big companies have cybersecurity measures in place, the government is worried about small or mid-level subcontractors, the industry minister, Koichi Hagiuda, told reporters on Tuesday.

Underscoring those fears, a lower-tier maker of water pumps and other automotive parts, GMB Corp, said its server was also a target of unauthorised access suspected to be ransomware at the weekend. It was not clear when all operations would fully return to normal, it said.

Reports of the powerful malware Emotet being used have increased since the first week of February 2022, according to the Japan Computer Emergency Response Team/Coordination Center, which provides information on cybersecurity.

Emotet is used to gain access to a victim's computer before then downloading additional malicious software, such as those designed to steal banking passwords, or ransomware which can lock a computer until an extortion fee is paid.