Cyber-Attacks On Maritime Oil Tankers

Four tankers have been attacked outside the strategically important Strait of Hormuz between the Persian Gulf and the Gulf of Oman. The vital waterway  provides the only sea passage from the Persian Gulf to the open ocean and is one of the world's most strategically important choke points. 

Local reports suggest the attackers jammed GPS to prevent the ships from evading attack. The oil tankers were all operating near the bunkering port of Fujairah located in the United Arab Emirates and the attacks took place over the weekend of 11th and 12th of May.

In a separete incident, two pump stations on Saudi Arabia’s most strategically important pipeline “were attacked by armed drones” causing a fire that was soon extinguished. Saudi Arabia’s energy minister, Khalid al-Falih, in a statement, called it “terrorism and sabotage"

Indications are that these incidents could develop to include cyber-attacks on vessels operating in the region.

Itai Sela, a former senior officer in the Israeli military and CEO of maritime cybersecurity firm Naval Dome commented:

“It is highly likely that vessels operating in high-risk areas could be targeted, systems hacked and GPS spoofed in order to render vessels immobile or re-directed as part of wider actions. There has been increased activity in the cyber domain over the last few months, which is very worrying.

"Shipowners with operations in the area must be vigilant and carry out inspections of all their PC-based navigation and machinery control systems. Ship operators should not allow crew members or technicians to plug-in USBs or external devices onboard or download maps and charts for specific areas, unless they absolutely need to do so. We also advised that operators check their insurance policies to ensure that OT systems are covered in the event of any cyber damage.”

A Saudi government statement blamed the Iranian-backed Houthis engaged in the civil war with the Saudi-backed government in Yemen. Iranian proxies are also fingered for the recent barrage of rockets and cyber attacks on Israel from Hamas-run Gaza..

US national security advisor John Bolton warned of “troubling and escalatory indications and warnings” regarding Iran.

Forbes:     Naval Dome:

You Might Also Read: 

Has President Trump Lost The Cyber Plot?

The Maritime Shipping Industry Should Be On Red Alert:

 

« Britain To Initiate Online “Porn Ban’
G7 To Simulate Cross-Border Cyber Attack »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Paraben

Paraben

Paraben provides digital forensics solutions for mobile devices, smartphones, email, hard drives, and gaming system.

JumpCloud

JumpCloud

JumpCloud's Directory-as-a-Service (DaaS) is the single point of authority to authenticate, authorize, and manage the identities of a business’s employees and the systems and IT resources they need.

Cloud Foundry Foundation (CFF)

Cloud Foundry Foundation (CFF)

Cloud Foundry supports the full application development lifecycle, from inception, through all testing stages, to deployment.

IoTium

IoTium

Secure Cloud Managed Software Defined IoT Networks. IoTium simplifies establishing and managing secure network infrastructure for Industrial IoT.

Visa

Visa

Visa is a global payments technology company that connects consumers, businesses and banks in more than 200 countries and territories worldwide.

ComTrue Technologies

ComTrue Technologies

ComTrue Technologies provides artificial intelligence solutions and information security solutions.

Cybercrowd

Cybercrowd

Cybercrowd is a cyber security specialist offering technical services, cyber security assessments, guidance and security thought leadership.

Cybersecurity Advisors Network (CyAN)

Cybersecurity Advisors Network (CyAN)

CyAN provides a not-for-profit platform that helps private and public organisations as well as governments to identify trusted advisors in the area of Cyber Security and Cyber Crime.

4Stop

4Stop

4Stop is a global KYC, compliance and anti-fraud risk management company.

ShiftLeft

ShiftLeft

ShiftLeft is a continuous application security platform, purpose-built for the modern software development life cycle.

Cord3

Cord3

Cord3 delivers data protection, even from trusted administrators – or hackers posing as administrators – with high privilege.

Wisetek

Wisetek

Wisetek is a global provider of end-to-end IT Asset Disposition (ITAD), reuse and secure data destruction management services to the world’s leading IT Corporations, data centres and manufacturers.

OpenAVN (DefenseArk)

OpenAVN (DefenseArk)

Defending your life online, keeping your data safe and private. We detect digital threats magnitudes faster than the leading antivirus software.

IntegraONE

IntegraONE

IntegraONE is a IT solutions provider offering a full range of networking and technology solutions.

Vircom

Vircom

With a large majority of cyber attacks starting with email, Vircom provides protection against the worst email security threats to your business.

GoPlus Security

GoPlus Security

GoPlus is working as the "security infrastructure" for web3, by providing open, permissionless, user-driven Security Services.