Asia CEO said ports have resumed releasing cargo;
will discuss settlement, liability issues with
Maersk said it was too early to predict the financial impact of
last month's global Petya cyber attack that hit the shipping
giant's computers and delayed cargoes, but added that normal
operations had resumed at its ports.
A.P. Moller-Maersk, Danish owner of the world's biggest container
shipping line, operates 76 ports via its APM Terminal division
and was one of the many firms hit by the ransomware virus along
with Russia's Rosneft and advertising agency WPP.
For the shipping sector, this was among the biggest-ever
disruptions given Maersk handles one out of seven containers
"Our first priority has not been to look at the financial
impact," Robbert van Trooijen, Maersk's Asia Pacific chief
executive told reporters on a call.
"It is too early to predict what the impact will be on the
quarter-two, or potentially the quarter-three result."
The attack did not impact Maersk's physical loading of goods, but
disrupted data-reliant processes such as creating arrival notices
and obtaining customs clearance - leading to congestion at some
of its ports, including in the United States, India, Spain and
Van Trooijen said all ports Maersk worked with were now back on
stream and releasing cargo. "Over the last 48 hours we are
basically ensuring that just about every port in the world is
able to receive and release cargo again."
He said it was unclear how many bookings had been cancelled due
to the attack which spread globally on June 28, but the firm was
now seeing a rebound in bookings as systems recovered.
He added Maersk would discuss settlement and liability issues
with individual shippers who had been affected.
The cyber virus is believed to have first taken hold in Ukraine
before spreading globally where it locked machines and demanded
victims post a ransom worth $300 in bitcoins or lose their data
Van Trooijen said the company did not believe Maersk was
deliberately targeted, given the virus' geographic reach, and
that it would continue to work with cybersecurity and software
firms to ensure it was as protected as it could be.
He, however, warned it would be difficult to guard against new,
"There was nothing in terms of patches that we missed, there was
no cyber security measures that we didn't take, so we were
already in quite a strong position," he said.
Reporting by Brenda Goh