Maritime Shipping Line Under Attack

The shipping industry continues to be the target of cyber criminals, with South Korea’s HMM becoming the latest major carrier to report an attack on its systems.  This cyber attack that has continued to affect its email systems outside of the US and Europe but has not inhibited its ability to manage sales and bookings. 

“An unidentified security breach was detected, which led to limited access to the email Outlook system in certain areas,” said HMM.

HMM report that  four days after the virus was discovered that the email system is gradually resuming., claiming that no information or data has been lost and that “most of the confirmed damage” had been restored. However, while no data leakage has been detected, HMM admit that its email servers in all areas except the America and Europe “remain impacted”.

HMM recommended shipping organisations in the regions still affected to contact their local HMM agency offices via telephone for bookings and other inquiries.

 “Except for email, systems and functions are fully operational, attributed to the independent cloud-based system.... “The email system is gradually resuming and our IT planning team is continuing the investigation to prevent further security accidents.according to HMM. 

HMM joins other major carriers in becoming the target of cyber criminals. Last year, CMA CGM was struck by an invasive ransomware attack that took the company’s systems down, disrupting bookings and other systems. It took the French carrier more than a week to recover, with some parts of its systems remaining down for additional days. At the same time, the International Maritime Organisation (IMO) also suffered an attack that took some of its meeting capabilities offline.

HMM:     Spash24:    The Loadstar:     Maritime Executive:   JOC.com       Image: Unsplash

You Might Also Read: 

Maritime Cyber Security Is Equally Important On Land:

 

« Mobile Users Are A Security Weakspot
Social Media’s Effects On Mental Health »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ACIS Professional Center

ACIS Professional Center

ACIS provides training and consulting services in the area of information technology, cybersecurity, IT Governance, IT Service management, information security and business continuity management.

Netskope

Netskope

Netskope, a global cybersecurity leader, is redefining cloud, data, and network security to help organizations apply Zero Trust principles to protect data.

Fraunhofer Institute for Secure Information Technology (SIT)

Fraunhofer Institute for Secure Information Technology (SIT)

Fraunhofer SIT is a research centre specialising in all areas of IT security.

NetNordic Group

NetNordic Group

NetNordic is a Nordic system integrator focusing on solutions and services in the area of networking, smart data centers, cybersecurity, and unified communication.

North American International Cyber Summit

North American International Cyber Summit

The North American International Cyber Summit brings together experts from around the globe to provide timely content and address a variety of cybersecurity issues impacting the world.

SuperCom

SuperCom

SuperCom are a global secure solutions integrator and technology provider for governments and other consumers facing organizations around the world.

xMatters

xMatters

xMatters is a digital service availability platform that helps enterprises prevent, manage, and resolve IT incidents before they can become business problems.

SecureTech360

SecureTech360

SecureTech360 is a cybersecurity and IT consulting firm whose principals have extensive experience in Cybersecurity and Information Technology.

Plante Moran

Plante Moran

Plante Moran is a leading audit, tax, consulting, and wealth management firm. Areas of consulting expertise include cybersecurity.

Sitehop

Sitehop

Sitehop is a cybersecurity technology company developing and supplying FPGA hardware-enforced cyber security solutions for networks.

Security Awareness Special Interest Group (SASIG)

Security Awareness Special Interest Group (SASIG)

The Security Awareness Special Interest Group (SASIG) addresses the human aspects of security and fraud prevention in an initiative to improve trust and confidence in the online environment.

Astreya

Astreya

Astreya is the leading IT solutions provider for some of the world's most recognizable and innovative organizations.

Pvotal Technologies

Pvotal Technologies

Pvotal Technologies engineer complex, automated processes aligned with best AIOps, BizDevOps, DevSecOps, CloudOps, and ITOps practices.

Network Coverage

Network Coverage

Network Coverage align, maintain, and integrate technology and cloud solutions with business operations to improve productivity and security with as few issues and disruptions as possible.

Advanced IT

Advanced IT

Reliable managed IT Security & support services that will help you take your business operations to the next level without breaking the bank!

Assurestor

Assurestor

Assurestor's singular focus is delivering leading cloud-based backup and disaster recovery designed to increase levels of IT resilience.