Cyber Attacks On Port of Los Angeles Have Doubled

Every year, seaports move billions of dollars in products, making them an attractive target for cyber criminals. They confront regular ransomware, malware, spear phishing, and credential harvesting attacks designed to cause as much damage as possible and decelerate economies.

Los Angeles is the busiest port in the western hemisphere, handling more than $250bn (£210bn) of cargo annually and the number of monthly cyber attacks hitting the Port of Los Angeles is currently about 40 million, according to the port's executive director Gene Seroka.

Cyber attacks have doubled since the start of the Covid pandemic and the port is now working with the FBI’s cyber-crime team to prevent attacks and improve cyber security.  

Maritime ports move billions of dollars in goods every year, making them a unique target for cyber criminals and the threats are believed to come mainly from Europe and Russia, with the aim to disrupt the US economy "Our intelligence shows the threats are coming from Russia and parts of Europe. We have to stay steps ahead of those who want to hurt international commerce," Seroka told the BBC. 

They face daily ransomware, malware, spear phishing and credential harvesting attacks, with the aim of causing as much disruption as possible and slowing down economies. 

The port has invested millions of dollars in cyber protection, developing one of the world's first Cyber Resilience Centres, in partnership with the FBI. The Cyber Resilience Centre provides enhanced intelligence gathering and heightened protection against cyber threats within the maritime supply chain. 

It is a hub for the port to receive, analyse and share information with those who operate on the dock, such as cargo handlers and shipping lines. 

During the Covid pandemic global supply chains slowed down as lockdown closed factories and workers were forced to stay at home. In January 2022 there were 109 container ships queuing for more than two days to get into the Port of Los Angeles. Currently there are around 20 waiting to dock and Seroka believes the blockages won't clear completely until 2023. “We must take every precaution against potential cyber-incidents, especially those that threaten or hinder the movement of cargo.” he said.

“The past two years have demonstrated the importance of ports to the nation’s crucial infrastructure, supply lines, and economy. We must maintain the highest level of system security feasible,” Seroka said,

Port of Los Angeles:     @portofla:    Beamstart:      BBC:     Allsides:     BusinessFast:     Flipboard

You Might Also Read:

Outdated Strategies In Maritime Cyber Security:

 

« Mercenary Cyber Spies For Hire
Cambridge Is Britain's Most AI-Ready City »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Celestix Networks

Celestix Networks

Celestix is a global provider of secure network solutions that enable the simple deployment of secure remote access connectivity.

Cloud Security Alliance (CSA)

Cloud Security Alliance (CSA)

The CSA is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing

FinalCode

FinalCode

FinalCode offers a file encryption and file-based enterprise digital rights management (eDRM) platform.

Cyberlitica

Cyberlitica

Cyberlitica (formerly iPhish) provides a Workforce Threat Intelligence application that significantly augments companies’ cyber threat prevention efforts.

CopSonic

CopSonic

Copsonic provide a technology solution based on ultrasonic waves to send secure and encrypted data between two devices in order to achieve authentication.

Women in CyberSecurity (WiCyS)

Women in CyberSecurity (WiCyS)

Women in CyberSecurity (WiCyS) is a non-profit organization dedicated to the recruitment, retention and advancement of women in the cybersecurity field.

Veritas Technologies

Veritas Technologies

Veritas provide industry-leading solutions that cover all platforms with backup and recovery, business continuity, software-defined storage and information governance.

Eco Recycling (Ecoreco)

Eco Recycling (Ecoreco)

Eco Recycling is India's first and leading professional E-waste Management Company that has set industry benchmarks with its innovative & environment friendly disposal practices.

YesWeHack

YesWeHack

YesWeHack offers companies an innovative approach to cybersecurity with Bug Bounty (pay-per-vulnerability discovered) to identify and report vulnerabilities in their systems.

e5 Lab

e5 Lab

e5 Lab seeks to develop solutions to challenges faced by the shipping industry including digital transformation, autonomous technologies and big data in order to promote safe and efficient operations.

Astrix Security

Astrix Security

Astrix enables security teams to instantly see through the fog of connects and detect redundant, misconfigured and malicious third-party exposure to their critical systems.

Protelion

Protelion

The Protelion Security Platform is uniquely architected to deliver security solutions that combine greater protection, flexibility, and performance.

Kubus Hitam

Kubus Hitam

Kubus Hitam are a research-based company focused on cyber security. we strongly believe that innovation and safety are the two keywords for the future business market.

FTx Identity

FTx Identity

FTx Identity is the world's most advanced age verification technology (AVT) and identity management system.

Silent Circle

Silent Circle

Silent Circle is the leader in end-to-end enterprise solutions for secure mobile communications.

SalvageData Recovery Services

SalvageData Recovery Services

Since 2003, SalvageData has been providing high-quality data recovery with the certifications needed to work with any storage media manufacturer.