Cyber-Attacks On Maritime Oil Tankers

Four tankers have been attacked outside the strategically important Strait of Hormuz between the Persian Gulf and the Gulf of Oman. The vital waterway  provides the only sea passage from the Persian Gulf to the open ocean and is one of the world's most strategically important choke points. 

Local reports suggest the attackers jammed GPS to prevent the ships from evading attack. The oil tankers were all operating near the bunkering port of Fujairah located in the United Arab Emirates and the attacks took place over the weekend of 11th and 12th of May.

In a separete incident, two pump stations on Saudi Arabia’s most strategically important pipeline “were attacked by armed drones” causing a fire that was soon extinguished. Saudi Arabia’s energy minister, Khalid al-Falih, in a statement, called it “terrorism and sabotage"

Indications are that these incidents could develop to include cyber-attacks on vessels operating in the region.

Itai Sela, a former senior officer in the Israeli military and CEO of maritime cybersecurity firm Naval Dome commented:

“It is highly likely that vessels operating in high-risk areas could be targeted, systems hacked and GPS spoofed in order to render vessels immobile or re-directed as part of wider actions. There has been increased activity in the cyber domain over the last few months, which is very worrying.

"Shipowners with operations in the area must be vigilant and carry out inspections of all their PC-based navigation and machinery control systems. Ship operators should not allow crew members or technicians to plug-in USBs or external devices onboard or download maps and charts for specific areas, unless they absolutely need to do so. We also advised that operators check their insurance policies to ensure that OT systems are covered in the event of any cyber damage.”

A Saudi government statement blamed the Iranian-backed Houthis engaged in the civil war with the Saudi-backed government in Yemen. Iranian proxies are also fingered for the recent barrage of rockets and cyber attacks on Israel from Hamas-run Gaza..

US national security advisor John Bolton warned of “troubling and escalatory indications and warnings” regarding Iran.

Forbes:     Naval Dome:

You Might Also Read: 

Has President Trump Lost The Cyber Plot?

The Maritime Shipping Industry Should Be On Red Alert:

 

« Britain To Initiate Online “Porn Ban’
G7 To Simulate Cross-Border Cyber Attack »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

DG Technology

DG Technology

DG Technology is a customer-centric technology expert and business consultant that delivers services and products to minimize your information security, compliance, and business risks.

ICS2

ICS2

ICS² is the first cyber security company focusing on protecting the control system of power, oil, gas, and petrochemicals plants.

Idaho National Laboratory (INL)

Idaho National Laboratory (INL)

INL is an applied engineering laboratory dedicated to supporting the US Dept of Energy's missions in energy research, nuclear science and national defense including critical infrastructure protection.

SOCOTEC Certification International

SOCOTEC Certification International

SOCOTEC Certification International has been providing management systems assessment and accredited ISO certification services to organisations around the world since 1995.

Navixia

Navixia

As a leading Swiss IT security specialist, Navixia offers a global and pragmatic approach to information security.

Dasera

Dasera

Dasera’s Radar and Interceptor products deliver visibility, governance, and protection solutions for data-agile companies.

MorganFranklin Consulting

MorganFranklin Consulting

MorganFranklin Consulting is a management advisory firm that works with businesses and government to address complex and transformational technology and business objectives including cybersecurity.

Gridware

Gridware

Gridware is a specialised cybersecurity consultancy firm and an emerging global player in the cybersecurity intelligence and advisory field.

BlueSteel Cybersecurity

BlueSteel Cybersecurity

BlueSteel is a compliance consulting firm that leverages deep system, data and application expertise to build sustainable cybersecurity solutions.

Silent Circle

Silent Circle

Silent Circle is the leader in end-to-end enterprise solutions for secure mobile communications.

The Cyber Scheme

The Cyber Scheme

The Cyber Scheme provides NCSC certified and assured assessments, training and career support for security testers & technical cyber professionals.

Mediatech

Mediatech

Mediatech, specialized in managed Cybersecurity and Cloud services, a single point of contact for your company's IT and infrastructure.

Venticento

Venticento

Venticento is an IT company specialized in consulting and network support and assistance for companies that need to make their business processes more effective.

Realm.Security

Realm.Security

Realm.Security is pioneering the creation of an easy-to-implement, simple-to-use security fabric solution that is purpose-built for cybersecurity.

Infosec Ventures

Infosec Ventures

Infosec Ventures incubates and scales cyber security innovators that solve inefficiencies in cyber security.

RKON

RKON

RKON Technologies provides managed IT and cybersecurity services to organizations across various industries, helping businesses mitigate risks and secure their digital infrastructures.