Cyber-Attacks On Maritime Oil Tankers

Four tankers have been attacked outside the strategically important Strait of Hormuz between the Persian Gulf and the Gulf of Oman. The vital waterway  provides the only sea passage from the Persian Gulf to the open ocean and is one of the world's most strategically important choke points. 

Local reports suggest the attackers jammed GPS to prevent the ships from evading attack. The oil tankers were all operating near the bunkering port of Fujairah located in the United Arab Emirates and the attacks took place over the weekend of 11th and 12th of May.

In a separete incident, two pump stations on Saudi Arabia’s most strategically important pipeline “were attacked by armed drones” causing a fire that was soon extinguished. Saudi Arabia’s energy minister, Khalid al-Falih, in a statement, called it “terrorism and sabotage"

Indications are that these incidents could develop to include cyber-attacks on vessels operating in the region.

Itai Sela, a former senior officer in the Israeli military and CEO of maritime cybersecurity firm Naval Dome commented:

“It is highly likely that vessels operating in high-risk areas could be targeted, systems hacked and GPS spoofed in order to render vessels immobile or re-directed as part of wider actions. There has been increased activity in the cyber domain over the last few months, which is very worrying.

"Shipowners with operations in the area must be vigilant and carry out inspections of all their PC-based navigation and machinery control systems. Ship operators should not allow crew members or technicians to plug-in USBs or external devices onboard or download maps and charts for specific areas, unless they absolutely need to do so. We also advised that operators check their insurance policies to ensure that OT systems are covered in the event of any cyber damage.”

A Saudi government statement blamed the Iranian-backed Houthis engaged in the civil war with the Saudi-backed government in Yemen. Iranian proxies are also fingered for the recent barrage of rockets and cyber attacks on Israel from Hamas-run Gaza..

US national security advisor John Bolton warned of “troubling and escalatory indications and warnings” regarding Iran.

Forbes:     Naval Dome:

You Might Also Read: 

Has President Trump Lost The Cyber Plot?

The Maritime Shipping Industry Should Be On Red Alert:

 

« Britain To Initiate Online “Porn Ban’
G7 To Simulate Cross-Border Cyber Attack »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CIO

CIO

CIO provides technology and business leaders with insight and analysis on information technology trends

CERT-FR

CERT-FR

CERT-FR is the French national government computer security incident response team.

CyberSource

CyberSource

CyberSource provides online payment and fraud management services for medium and large-sized merchants.

ContentKeeper

ContentKeeper

ContentKeeper provides Web Threat Protection solutions to secure today’s Web 2.0 and mobile centric business environments.

Protiviti

Protiviti

Protiviti consulting solutions span critical business problems in technology, business process, analytics, risk, compliance, transactions and internal audit.

Ledger

Ledger

Ledger is a leader in security and infrastructure solutions for cryptocurrencies and blockchain applications using its proprietary technology.

Ntirety

Ntirety

Ntirety Managed Security Services offer enterprise businesses the advanced tools, processes, and support to ensure your infrastructure, networks, and mission-critical applications are secure.

Cybersecure Policy Exchange (CPX)

Cybersecure Policy Exchange (CPX)

Cybersecure Policy Exchange is a new initiative dedicated to advancing effective and innovative public policy in cybersecurity and digital privacy.

Delfigo Security

Delfigo Security

Delfigo Security, a pioneer in intelligent authentication, provides a strong, multi-factor authentication solution to prevent identity theft and reduce fraud.

Meterian

Meterian

The Meterian Platform is a fuss-free solution to protect you against vulnerabilities in your app’s software supply chain.

Avalanchio Technologies

Avalanchio Technologies

The Avalanchio platform gives you a complete solution to collect, process, and analyze security data to detect threats in real-time and analyze historical data using security DSL or SQL.

Rimstorm

Rimstorm

Rimstorm’s mission is to significantly improve the security of your data using award-winning, state-of-the-art technology combined with cyber managed security services.

Tenet3

Tenet3

Tenet3's vision is to make optimal cyber strategy development tractable, data driven, with concrete success metrics. The result is cost effective cyber resilience for our customers.

Intelligent CloudCare

Intelligent CloudCare

Intelligent CloudCare, a division of IPS, is a full IT Services provider serving the needs of SMBs in the metropolitan New York City region.

Cyviation

Cyviation

Cyviation's mission is to mitigate ever-growing and menacing Cyber Security threats, focusing on aircraft, airlines and airports.

Securily

Securily

Securily offers the ultimate solution for small to medium-sized businesses, blending cutting-edge AI with expert human insight to deliver the world’s easiest and most effective pentesting experience.