Maritime Shipping Is An Ideal Target For Ransom

The maritime industry is often dependent on just-in-time supply chains, and often old technology and this is making shipping a very attractive target for cyber criminals. 

Ransomware attacks against the shipping industry have tripled in the past year, as cyber criminals to make money from ransom payments. Analysis by cyber security company BlueVoyant has found that ransomware attacks are increasingly targeting shipping firms at a time when the global COVID-19 pandemic means that their services are required more than ever before.

Ransomware attacks have become a serious issue for all organisations in every type of industry, but a successful attack against a company could potentially mean chaos and an extremely lucrative payday for attackers. It is undisputed that the largest cyber security threat facing supply chain and logistics companies today is neither nation-state attacks nor data breach information for sale on the dark web; it is ransomware.

The Blue Voyant Report shows that from 2019 to 2020, ransomware attacks on shipping and logistics firms tripled, with almost all attacks resulting from phishing or exploitation of open remote desktop ports, making the sector especially vulnerable during the critical global vaccine rollout.

Key Report Findings:

  • Ransomware is the No. 1 cyber threat to logistics companies today, suggesting a situation of imminent and extreme risk.
  • Malicious actors are keenly interested in logistics companies. 100% of the companies assessed saw some evidence of threat targeting against their network.
  • Despite the risks of ransomware attacks, 90% of the organizations studied were found to have open remote desktop or administration ports and insufficient email security, the primary vulnerabilities to ransomware gangs.

Shipping companies are often very sizable businesses that are easily effected by any disruption and this makes them targets for cyber ransomware gangs.

2017's NotPetya cyber-attack demonstrated the amount of disruption that can occur in these scenarios, and Maersk got globally cyber attacked in an incident that cost hundreds of millions in losses. But despite this high profile cyber event demonstrating the need for good cybersecurity strategy, according to BlueVoyant's report, shipping and logistics companies need to "dramatically" improve IT hygiene and email security to make networks more resilient against ransomware and other cyber attacks.

That includes fixing vulnerabilities in remote desktops or ports, something that 90% of the organisations studied in the research were found to have. Problems like unpatched software or using default or common login credentials can provider cyber attackers with relatively simple access to networks.

In some cases, it isn't ransomware groups that are breaching logistics and shipping companies, but merely opportunistic cyber criminals who know they'll be able to sell the credentials on for others to use to commit attacks. 

High-profile cargo like the COVID-19 vaccine, and the data that goes with it, make shipping and logistics companies high-value targets to cyber criminal and national state actors aiming to disrupt government efforts and steal sought-after vaccine data.

Shipping companies have vast networks, but there are cyber security procedures that can improve their defences against cyber-attacks. These include securing port and network configuration so that default or easy-to-guess credentials aren't used and to, where possible, secure the accounts with two-factor authentication.

Organisations should also update and patch software in a timely manner so cyber criminals can't take advantage of known vulnerabilities to gain access to networks. Using open-source data and proprietary research, BlueVoyant assessed 20 of the top global shipping and logistics companies to understand their vulnerability to ransomware and other disruptive attacks.

The results indicate the growing threats facing the sector, specifically the disproportionate impact of rising ransomware attacks, capable of bringing businesses that operate technology-driven and highly automated ‘just-in-time’ delivery schedules to a standstill.

BlueVoyant:          ZDNet:       Yahoo:      Waysudin:        Image: Unsplash

You Might Also Read: 

Maritime Cyber Security Is Equally Important On Land:

 

 

« Google Plans To Eradicate Cookies
Can Ethical AI Become A Reality? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

Watch this webinar and get a comprehensive roadmap for securely adopting generative AI using Amazon Bedrock, a fully managed service that offers a choice of high-performing foundation models (FMs).

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CipherPoint Software

CipherPoint Software

CipherPoint Software provides data-centric auditing and protection solutions for securing unstructured information

Redicom

Redicom

Redicom is an independent consulting agency focusing on identity management, strong authentication and single-sign-on.

Data Shepherd

Data Shepherd

Data Shepherds primary focus is to protect your business. We achieve this by offering extensive and unique expertise in innovative IT and Cyber security solutions.

NuData Security

NuData Security

NuData Security, A Mastercard Company, is an award winning behavioral biometrics company.

Dark Cubed

Dark Cubed

Dark Cubed is an easy-to-use cyber security software as a service (SaaS) platform that deploys instantly and delivers enterprise-grade threat identification and protection at a fraction of the cost.

Tempest

Tempest

TEMPEST is a leading provider of IT products and services including solutions for network and application security.

NextVision

NextVision

NextVision is a Cybersecurity and Technology company offering a range of solutions and services for Security, Compliance and IT Infrastructure Management.

Data443 Risk Mitigation

Data443 Risk Mitigation

Data443 Risk Mitigation provides next-generation cybersecurity products and services in the area of data security and compliance.

Verafin

Verafin

Verafin is one of the North American leaders in fraud detection and AML software.

Salt Security

Salt Security

Salt Security protects the APIs that are the core of every SaaS, web, mobile, microservices and IoT application.

LSoft Technologies

LSoft Technologies

LSoft Technologies is a leader in data recovery software technologies.

Guidehouse

Guidehouse

Guidehouse is a leading global provider of consulting services to the public and commercial markets with broad capabilities in management, technology, and risk consulting.

Dynamic Quest

Dynamic Quest

Dynamic Quest is a managed IT, cloud and security services companies, providing a comprehensive range of technology services including cybersecurity, backup and disaster recovery.

Digitale Gründerinitiative Oberpfalz (DGO)

Digitale Gründerinitiative Oberpfalz (DGO)

Digital Founder Initiative Oberpfalz's goal is to build a sustainable start-up culture in the field of digitization throughout the Upper Palatinate district of Bavaria.

BalkanID

BalkanID

BalkanID is an Identity governance solution that leverages data science to provide visibility into your SaaS & public cloud entitlement sprawl.

National Coordinator for Security and Counterterrorism (NCTV) - Netherlands

National Coordinator for Security and Counterterrorism (NCTV) - Netherlands

The NCTV serves the Netherlands’ national security. We protect national interests, identify threats and strengthen resilience.