Maritime Shipping Is An Ideal Target For Ransom

The maritime industry is often dependent on just-in-time supply chains, and often old technology and this is making shipping a very attractive target for cyber criminals. 

Ransomware attacks against the shipping industry have tripled in the past year, as cyber criminals to make money from ransom payments. Analysis by cyber security company BlueVoyant has found that ransomware attacks are increasingly targeting shipping firms at a time when the global COVID-19 pandemic means that their services are required more than ever before.

Ransomware attacks have become a serious issue for all organisations in every type of industry, but a successful attack against a company could potentially mean chaos and an extremely lucrative payday for attackers. It is undisputed that the largest cyber security threat facing supply chain and logistics companies today is neither nation-state attacks nor data breach information for sale on the dark web; it is ransomware.

The Blue Voyant Report shows that from 2019 to 2020, ransomware attacks on shipping and logistics firms tripled, with almost all attacks resulting from phishing or exploitation of open remote desktop ports, making the sector especially vulnerable during the critical global vaccine rollout.

Key Report Findings:

  • Ransomware is the No. 1 cyber threat to logistics companies today, suggesting a situation of imminent and extreme risk.
  • Malicious actors are keenly interested in logistics companies. 100% of the companies assessed saw some evidence of threat targeting against their network.
  • Despite the risks of ransomware attacks, 90% of the organizations studied were found to have open remote desktop or administration ports and insufficient email security, the primary vulnerabilities to ransomware gangs.

Shipping companies are often very sizable businesses that are easily effected by any disruption and this makes them targets for cyber ransomware gangs.

2017's NotPetya cyber-attack demonstrated the amount of disruption that can occur in these scenarios, and Maersk got globally cyber attacked in an incident that cost hundreds of millions in losses. But despite this high profile cyber event demonstrating the need for good cybersecurity strategy, according to BlueVoyant's report, shipping and logistics companies need to "dramatically" improve IT hygiene and email security to make networks more resilient against ransomware and other cyber attacks.

That includes fixing vulnerabilities in remote desktops or ports, something that 90% of the organisations studied in the research were found to have. Problems like unpatched software or using default or common login credentials can provider cyber attackers with relatively simple access to networks.

In some cases, it isn't ransomware groups that are breaching logistics and shipping companies, but merely opportunistic cyber criminals who know they'll be able to sell the credentials on for others to use to commit attacks. 

High-profile cargo like the COVID-19 vaccine, and the data that goes with it, make shipping and logistics companies high-value targets to cyber criminal and national state actors aiming to disrupt government efforts and steal sought-after vaccine data.

Shipping companies have vast networks, but there are cyber security procedures that can improve their defences against cyber-attacks. These include securing port and network configuration so that default or easy-to-guess credentials aren't used and to, where possible, secure the accounts with two-factor authentication.

Organisations should also update and patch software in a timely manner so cyber criminals can't take advantage of known vulnerabilities to gain access to networks. Using open-source data and proprietary research, BlueVoyant assessed 20 of the top global shipping and logistics companies to understand their vulnerability to ransomware and other disruptive attacks.

The results indicate the growing threats facing the sector, specifically the disproportionate impact of rising ransomware attacks, capable of bringing businesses that operate technology-driven and highly automated ‘just-in-time’ delivery schedules to a standstill.

BlueVoyant:          ZDNet:       Yahoo:      Waysudin:        Image: Unsplash

You Might Also Read: 

Maritime Cyber Security Is Equally Important On Land:

 

 

« Google Plans To Eradicate Cookies
Can Ethical AI Become A Reality? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Cyber Security For Critical Assets (CS4CA)

Cyber Security For Critical Assets (CS4CA)

Cyber Security For Critical Assets is a global series of summits focusing on cyber security for critical infrastructure.

Digital Infrastructure Association (DINL)

Digital Infrastructure Association (DINL)

DINL is the leading representative for companies and organisations which are active within the Dutch digital infrastructure sector.

Futurex

Futurex

Futurex is a globally recognized provider of enterprise-class data encryption solutions.

Netwrix

Netwrix

Netwrix empowers information security and governance professionals to identify and protect sensitive data to reduce the risk of a breach.

Jeffer Mangels Butler & Mitchell LLP (JMBM)

Jeffer Mangels Butler & Mitchell LLP (JMBM)

JMBM is a full service law firm providing counseling and litigation services in a wide range of areas including cyber security.

Altron

Altron

Altron provides locally relevant innovative and integrated ICT solutions to business, government and consumers.

Excelerate Systems

Excelerate Systems

Excelerate Systems is a leading provider of IT services with a focus on Big Data, Cloud Services and Security.

IAR Systems

IAR Systems

IAR Systems are a frontrunner in a changing industry, and a future-proof software supplier enabling the IoT.

Ukrainian Academy of Cyber Security (UACS)

Ukrainian Academy of Cyber Security (UACS)

UACS is a professional non-profit public organization established to promote the development of an extensive network and ecosystem of education and training in the field of cyber security.

Pelta Cyber Security

Pelta Cyber Security

Pelta Cyber Security is the cyber security consulting and solutions division of Softworld Inc. We provide staffing and recruitment services as well as consulting and solutions for outsourced projects.

Everything Blockchain

Everything Blockchain

Everything Blockchain offer solutions that transform enterprise data-management capabilities. Increased efficiency, super-charged performance and all with government grade security.

OnSecurity

OnSecurity

OnSecurity replaces the overhead of traditional penetration testing firms with a simple online interface, making it easy to book tests as and when needed.

Debevoise & Plimpton

Debevoise & Plimpton

Debevoise & Plimpton LLP is a premier law firm with market-leading practices in areas including Data Strategy & Security.

SecurityBridge

SecurityBridge

SecurityBridge provide a cybersecurity connection between our customers’ IT departments, the forward-facing business services, and their SAP applications.

StrongDM

StrongDM

StrongDM is the leader in Zero Trust Privileged Access Management (PAM).

SUCCESS Computer Consulting

SUCCESS Computer Consulting

SUCCESS Computer Consulting is a leader in managed IT and security services for small and medium-sized businesses in Minneapolis, St. Paul, and the surrounding Twin Cities Metro area.