Maritime Shipping Is An Ideal Target For Ransom

The maritime industry is often dependent on just-in-time supply chains, and often old technology and this is making shipping a very attractive target for cyber criminals. 

Ransomware attacks against the shipping industry have tripled in the past year, as cyber criminals to make money from ransom payments. Analysis by cyber security company BlueVoyant has found that ransomware attacks are increasingly targeting shipping firms at a time when the global COVID-19 pandemic means that their services are required more than ever before.

Ransomware attacks have become a serious issue for all organisations in every type of industry, but a successful attack against a company could potentially mean chaos and an extremely lucrative payday for attackers. It is undisputed that the largest cyber security threat facing supply chain and logistics companies today is neither nation-state attacks nor data breach information for sale on the dark web; it is ransomware.

The Blue Voyant Report shows that from 2019 to 2020, ransomware attacks on shipping and logistics firms tripled, with almost all attacks resulting from phishing or exploitation of open remote desktop ports, making the sector especially vulnerable during the critical global vaccine rollout.

Key Report Findings:

  • Ransomware is the No. 1 cyber threat to logistics companies today, suggesting a situation of imminent and extreme risk.
  • Malicious actors are keenly interested in logistics companies. 100% of the companies assessed saw some evidence of threat targeting against their network.
  • Despite the risks of ransomware attacks, 90% of the organizations studied were found to have open remote desktop or administration ports and insufficient email security, the primary vulnerabilities to ransomware gangs.

Shipping companies are often very sizable businesses that are easily effected by any disruption and this makes them targets for cyber ransomware gangs.

2017's NotPetya cyber-attack demonstrated the amount of disruption that can occur in these scenarios, and Maersk got globally cyber attacked in an incident that cost hundreds of millions in losses. But despite this high profile cyber event demonstrating the need for good cybersecurity strategy, according to BlueVoyant's report, shipping and logistics companies need to "dramatically" improve IT hygiene and email security to make networks more resilient against ransomware and other cyber attacks.

That includes fixing vulnerabilities in remote desktops or ports, something that 90% of the organisations studied in the research were found to have. Problems like unpatched software or using default or common login credentials can provider cyber attackers with relatively simple access to networks.

In some cases, it isn't ransomware groups that are breaching logistics and shipping companies, but merely opportunistic cyber criminals who know they'll be able to sell the credentials on for others to use to commit attacks. 

High-profile cargo like the COVID-19 vaccine, and the data that goes with it, make shipping and logistics companies high-value targets to cyber criminal and national state actors aiming to disrupt government efforts and steal sought-after vaccine data.

Shipping companies have vast networks, but there are cyber security procedures that can improve their defences against cyber-attacks. These include securing port and network configuration so that default or easy-to-guess credentials aren't used and to, where possible, secure the accounts with two-factor authentication.

Organisations should also update and patch software in a timely manner so cyber criminals can't take advantage of known vulnerabilities to gain access to networks. Using open-source data and proprietary research, BlueVoyant assessed 20 of the top global shipping and logistics companies to understand their vulnerability to ransomware and other disruptive attacks.

The results indicate the growing threats facing the sector, specifically the disproportionate impact of rising ransomware attacks, capable of bringing businesses that operate technology-driven and highly automated ‘just-in-time’ delivery schedules to a standstill.

BlueVoyant:          ZDNet:       Yahoo:      Waysudin:        Image: Unsplash

You Might Also Read: 

Maritime Cyber Security Is Equally Important On Land:

 

 

« Google Plans To Eradicate Cookies
Can Ethical AI Become A Reality? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

AusCERT

AusCERT

AusCERT is the premier Computer Emergency Response Team (CERT) in Australia and a leading CERT in the Asia/Pacific region

IOActive

IOActive

IOActive serves as a trusted security advisor to the Global 500 and other progressive enterprises, helping to safeguard their most important assets and improve their overall security posture.

NCX Group

NCX Group

NCX Group is an Information Risk Management Firm, specializing in Information Security, Business Continuity, Incident Response & Security as a Service

Cyber Security Challenge UK

Cyber Security Challenge UK

Cyber Security Challenge UK is a series of national competitions, learning programmes, and networking initiatives designed to identify, inspire and enable more people to become cybersec professionals.

Coalition

Coalition

Coalition combines comprehensive insurance and proprietary security tools to help businesses manage and mitigate cyber risk.

GulfTalent

GulfTalent

GulfTalent is the leading job site for professionals in the Middle East and Gulf region covering all sectors and job categories, including cybersecurity.

Lifespan Technology

Lifespan Technology

Lifespan Technology provides the full range of IT Asset Disposition services. This includes hardware recycling and disposal, data destruction, and hardware resale.

Fudo Security

Fudo Security

Fudo Security is a leading provider of privileged access management and privileged session monitoring solutions.

Patriot Cyber Defense

Patriot Cyber Defense

Patriot Cyber Defense is a Cyber Security and Management Consulting professional services firm.

Red River

Red River

Red River is a technology transformation company, bringing 25 years of experience and mission-critical expertise in analytics, cloud, collaboration, mobility, networking and security solutions.

Turnkey Consulting

Turnkey Consulting

Turnkey Consulting is a leading provider of Integrated Risk Management (IRM), Identity Access Management (IAM), and Cyber and Application Security.

HENSOLDT Cyber

HENSOLDT Cyber

HENSOLDT Cyber introduces a paradigm shift to cyber security. Our products have been designed to ensure the integrity of embedded systems at the core: the operating system and the processor.

BCyber

BCyber

BCyber is a Swiss Cyber Security company that provides security products, training, and managed services to protect diverse IT and OT environments against cyber, physical, and cyber-physical threats.

Siren

Siren

Siren provides the leading Investigative Intelligence Platform to some of the world’s leading Law Enforcement, National Security and Cyber threat investigators.

Vertek

Vertek

Vertek is a leading provider of operations consulting, end-to-end business process outsourcing, business intelligence, software applications and managed cybersecurity solutions.

Mobb

Mobb

Mobb's AI-powered technology automates vulnerability remediations to significantly reduce security backlogs and free developers to focus on innovation.