Ransomware Hits Port of Vigo, Forcing Manual Cargo Procedures After IT Systems Are Isolated
The Port Authority of Vigo in Spain was hit by a ransomware attack around March 25, 2026, forcing the organization to isolate parts of its IT environment and temporarily suspend digital cargo-management services while recovery work continues. Port officials said the attack was contained, but the return to normal digital operations has been slowed by preventive security measures designed to ensure the network is safe before reconnection.
The incident was detected early on Tuesday and affected computer systems used to manage cargo traffic and other digital services at the port, according to reporting by The Record and Spanish media. Local coverage said the attack altered the management of freight flows and cut access to digital services, even though the port’s physical operations and exploitation services remained active.
Port president Carlos Botana said the authority would not reconnect systems until there were full guarantees that another attack could not occur. That decision has left some users relying on manual procedures and paper documentation in place of the usual digital workflows, a familiar but disruptive fallback for critical infrastructure operators hit by ransomware.
Spanish-language reports said the port authority’s technology team neutralized the threat and isolated internal systems from external connections as a containment measure. Officials emphasized that ship movements and day-to-day port activity were still functioning, but the digital layer that normally supports logistics coordination was partially unavailable, slowing routine processes tied to cargo administration.
The attack has widely been described as ransomware. The Record reported that some equipment was locked and that the incident involved a ransom demand, while local coverage in Galicia likewise identified the malware as ransomware intended to encrypt systems and block access until payment was made. No cybercrime group had publicly claimed responsibility at the time of reporting.
The Port of Vigo is one of Spain’s most important fishing and maritime logistics hubs, which makes the disruption especially notable even if cranes, ships, and cargo handling remained operational. In ports and shipping environments, even short-term outages affecting digital documentation, scheduling, or traffic coordination can ripple into delays, manual workarounds, and downstream inefficiencies for carriers, freight forwarders, and customers.
Officials said a forensic investigation is now underway to determine how the attackers gained access and whether any sensitive data was compromised. That inquiry will also shape attribution efforts, though for now the public picture remains limited to a financially motivated attack against the port’s digital infrastructure.
The Vigo incident adds to a long list of cyberattacks against maritime and port organizations, a sector that remains attractive to ransomware actors because it combines operational urgency, complex vendor ecosystems, and critical dependence on digital coordination. Even when physical port activity continues, the loss of trusted systems often forces organizations back to paper-heavy emergency workflows that are slower, harder to scale, and more prone to bottlenecks.
Reference Links and Sources
- The Record: Ransomware attack disrupts operation at major Spanish fishing port
- Cadena SER: El Puerto de Vigo aísla sus sistemas informáticos tras neutralizar un ciberataque
- Diario del Puerto: El Puerto de Vigo aísla sus sistemas tras un ciberataque sin impacto en su operativa
- La Voz de Galicia: El Puerto de Vigo sufre un ciberataque y ve afectado el tráfico de mercancías