<rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Cyberattack - Tag - Maritimeinfosec.org</title><link>https://maritimeinfosec.org/tags/cyberattack/</link><description>Cyberattack - Tag - Maritimeinfosec.org</description><generator>Hugo -- gohugo.io</generator><language>en-US</language><copyright>Copyright Maritimeinfosec.org 2018-2026</copyright><lastBuildDate>Thu, 20 Aug 2020 04:55:22 +0000</lastBuildDate><atom:link href="https://maritimeinfosec.org/tags/cyberattack/" rel="self" type="application/rss+xml"/><item><title>Carnival Corporation &amp; Plc hit by a ransomware attack</title><link>https://maritimeinfosec.org/carnival-corporation-plc-hit-by-a-ransomware-attack/</link><pubDate>Thu, 20 Aug 2020 04:55:22 +0000</pubDate><author>Olivier JACQ</author><guid>https://maritimeinfosec.org/carnival-corporation-plc-hit-by-a-ransomware-attack/</guid><description><![CDATA[<p>Carnival, the world’s largest cruise operator (102 vessels and roughly 50% of the global cruise market, representing around 225,000 passengers on board every day), announced that it had been the victim of a ransomware cyberattack on August 15, 2020 (<a href="https://www.carnivalcorp.com/news-releases/news-release-details/carnival-corporation-plc-identifies-ransomware-incident" target="_blank" rel="noopener noreferrer ">1</a> <a href="https://www.cruiseindustrynews.com/cruise-news/23388-carnival-corp-brand-hit-with-ransomware-attack.html" target="_blank" rel="noopener noreferrer ">2</a>). <a href="/known-incidents/" rel="">Two ships belonging to the group had already been affected by a cyberattack in May 2019</a>.</p>
<p>The attack, detected by the company, resulted in unauthorized access to part of the group’s information systems, with some systems subsequently encrypted. The intrusion also led to the download of certain data files, although the company did not specify the type of information involved.</p>]]></description></item><item><title>900% increase in cyberattacks targeting maritime operational systems</title><link>https://maritimeinfosec.org/900-increase-in-cyberattacks-targeting-maritime-operational-systems/</link><pubDate>Sat, 01 Aug 2020 07:42:00 +0000</pubDate><author>Olivier JACQ</author><guid>https://maritimeinfosec.org/900-increase-in-cyberattacks-targeting-maritime-operational-systems/</guid><description><![CDATA[<p><a href="https://www.vanguardngr.com/2020/07/maritime-cyber-attacks-increase-by-900-in-three-years/" target="_blank" rel="noopener noreferrer ">According to the English-language website Vanguard</a>, operational technology (OT) systems in the maritime sector have experienced an increase in cyberattacks of around 900% over the past three years. As a reminder, &ldquo;OT&rdquo; refers to <em>Operational Technology</em>, meaning, according to the NIST definition, the set of constrained information systems used in industrial and operational environments (industrial control systems, operational applications), as opposed to IT, which refers to more traditional information systems such as corporate networks or intranet services.</p>]]></description></item><item><title>COVID-19: 400% increase in attempted cyberattacks in the maritime sector</title><link>https://maritimeinfosec.org/covid-19-400-increase-in-attempted-cyberattacks-in-the-maritime-sector/</link><pubDate>Tue, 09 Jun 2020 06:48:49 +0000</pubDate><author>Olivier JACQ</author><guid>https://maritimeinfosec.org/covid-19-400-increase-in-attempted-cyberattacks-in-the-maritime-sector/</guid><description><![CDATA[<p>The website <a href="https://www.offshore-energy.biz/naval-dome-400-increase-in-attempted-hacks-since-february-2020/" target="_blank" rel="noopener noreferrer ">offshore-energy.biz</a> reports that the number of attempted cyberattacks in the maritime sector has increased by 400% since February 2020. This surge is reportedly linked in part to the widespread adoption of remote working tools during the COVID-19 pandemic.</p>
<p>The figure was cited by Naval Dome, an Israeli cybersecurity company previously mentioned on this site, notably <a href="/naval-dome-assure-la-cyber-defense-dun-yacht/" rel="">here</a>. Within this reported 400% increase, Naval Dome notes a rise in various forms of malware, including ransomware, as well as phishing attempts. These developments occur in a context where social distancing measures, travel restrictions, and economic difficulties have limited the ability of maritime companies to maintain their usual cybersecurity posture.</p>]]></description></item><item><title>Possible cyberattack targeting Iranian ports in the Strait of Hormuz</title><link>https://maritimeinfosec.org/possible-cyberattack-targeting-iranian-ports-in-the-strait-of-hormuz/</link><pubDate>Wed, 13 May 2020 09:00:08 +0000</pubDate><author>Olivier JACQ</author><guid>https://maritimeinfosec.org/possible-cyberattack-targeting-iranian-ports-in-the-strait-of-hormuz/</guid><description><![CDATA[<p>According to <a href="https://www.zdnet.com/article/iran-reports-failed-cyber-attack-on-strait-of-hormuz-port/" target="_blank" rel="noopener noreferrer ">ZDNet</a> and <a href="https://www.ilna.news/Section-politics-3/912249-iran-official-explained-the-details-of-the-recent-cyber-attack" target="_blank" rel="noopener noreferrer ">Ilna News</a>, Iranian officials acknowledged last Sunday that a limited number of computers were affected following a cyberattack targeting the port of Bandar Abbas in the Strait of Hormuz. ZDNet even reported that port operations were temporarily halted on Friday.</p>
<p>Beyond these official statements, very few details about the incident have been disclosed.</p>]]></description></item><item><title>Rising US–Iran tensions in the Persian Gulf raise concerns about GPS spoofing and jamming</title><link>https://maritimeinfosec.org/rising-us-iran-tensions-in-the-persian-gulf-raise-concerns-about-gps-spoofing-and-jamming/</link><pubDate>Mon, 11 May 2020 10:43:31 +0000</pubDate><author>Olivier JACQ</author><guid>https://maritimeinfosec.org/rising-us-iran-tensions-in-the-persian-gulf-raise-concerns-about-gps-spoofing-and-jamming/</guid><description><![CDATA[<p>The U.S. administration has issued <a href="https://www.maritime.dot.gov/content/2019-012-persian-gulf-strait-hormuz-gulf-oman-arabian-sea-red-sea-threats-commercial-vessels" target="_blank" rel="noopener noreferrer ">a maritime advisory</a> for vessels transiting the Persian Gulf and surrounding waters. Among the risks identified are GPS interference (jamming or spoofing), as well as intrusion, jamming, and impersonation in VHF communications with ships. In some cases, vessels have reportedly impersonated U.S. or coalition ships over the radio.</p>
<p>Since May 2019, the U.S. authorities have recorded numerous unlawful activities in the region. In two of those cases, GPS interference occurred at the same time as other suspicious events.</p>]]></description></item><item><title>Launch of an insurance product dedicated to maritime cyber risks</title><link>https://maritimeinfosec.org/launch-of-an-insurance-product-dedicated-to-maritime-cyber-risks/</link><pubDate>Mon, 04 May 2020 11:17:07 +0000</pubDate><author>Olivier JACQ</author><guid>https://maritimeinfosec.org/launch-of-an-insurance-product-dedicated-to-maritime-cyber-risks/</guid><description><![CDATA[<p>In <a href="https://www.willistowerswatson.com/en-US/News/2020/04/willis-towers-watson-launches-customised-cyber-cover-for-shipowners" target="_blank" rel="noopener noreferrer ">a press release</a>, the insurer Willis Towers Watson announced the launch of a new insurance product specifically designed to cover cybersecurity risks in the maritime sector. The objective of this product is to address the incomplete coverage of cyber risks in most traditional insurance policies and to respond to the growing number of cyber incidents affecting the maritime industry.</p>
<p>The policy reportedly covers several situations, including: crisis management in the event of ransomware attacks, data theft, incidents involving third parties, loss of connectivity following attacks on satellite communication links, as well as cases related to GDPR and the NIS Directive.</p>]]></description></item><item><title>According to Lloyd’s, a cyberattack on Asian ports could cost $110 billion</title><link>https://maritimeinfosec.org/according-to-lloyds-a-cyberattack-on-asian-ports-could-cost-110-billion/</link><pubDate>Mon, 20 Apr 2020 16:44:26 +0000</pubDate><author>Olivier JACQ</author><guid>https://maritimeinfosec.org/according-to-lloyds-a-cyberattack-on-asian-ports-could-cost-110-billion/</guid><description><![CDATA[<figure>
</figure>

<p>According to a report published by Lloyd’s of London in collaboration with <a href="https://irfrc.ntu.edu.sg/Research/cyrim/Pages/Home.aspx" target="_blank" rel="noopener noreferrer ">CyRiM</a> (see <a href="https://vimeo.com/369775013" target="_blank" rel="noopener noreferrer ">the video here</a> and <a href="https://www.lloyds.com/~/media/files/news-and-insight/risk-insight/2019/shen-attack/cyrim_shenattack_finalreport.pdf" target="_blank" rel="noopener noreferrer ">the full PDF report here</a>), and relayed by the news agency <a href="https://www.reuters.com/article/us-lloyds-of-london-cyber-ports/cyber-attack-on-asia-ports-could-cost-110-billion-lloyds-idUSKBN1X900G" target="_blank" rel="noopener noreferrer ">Reuters</a>, a cyberattack targeting Asian ports could result in losses of up to 110 billion dollars. This amount is roughly equivalent to half of the total economic losses caused by natural disasters in 2018.</p>
<p>It is worth recalling that Lloyd’s specializes in commercial risk insurance. Such risks are generally less insured in Europe and Asia than in the United States.</p>]]></description></item><item><title>Cyberattack on MSC confirmed by the shipping company</title><link>https://maritimeinfosec.org/cyberattack-on-msc-confirmed-by-the-shipping-company/</link><pubDate>Fri, 17 Apr 2020 11:31:22 +0000</pubDate><author>Olivier JACQ</author><guid>https://maritimeinfosec.org/cyberattack-on-msc-confirmed-by-the-shipping-company/</guid><description><![CDATA[<div class="featured-image">
                <img src="/images/wp-content/uploads/2020/04/msc.png" referrerpolicy="no-referrer">
            </div><p>As mentioned in <a href="/shipping-company-msc-reportedly-hit-by-a-cyberattack" rel="">a recent article</a>, the shipping company MSC was the victim of a cyberattack about a week ago. The incident disrupted the operation of its online booking systems for four days.</p>
<p>In <a href="https://www.msc.com/fra/news/2020-april/network-outage-resolved" target="_blank" rel="noopener noreferrer ">a recent statement</a>, the company confirmed the cyber origin of the incident, which affected several servers located in Geneva: “we have determined that it was a virus attack exploiting a targeted vulnerability.”</p>
<p>It is worth noting that the company shared information about the attack with its partners in order to reduce the risk of similar incidents occurring elsewhere.</p>]]></description></item><item><title>Shipping company MSC reportedly hit by a cyberattack</title><link>https://maritimeinfosec.org/shipping-company-msc-reportedly-hit-by-a-cyberattack/</link><pubDate>Fri, 17 Apr 2020 10:52:58 +0000</pubDate><author>Olivier JACQ</author><guid>https://maritimeinfosec.org/shipping-company-msc-reportedly-hit-by-a-cyberattack/</guid><description><![CDATA[<div class="featured-image">
                <img src="/images/wp-content/uploads/2020/04/msc.png" referrerpolicy="no-referrer">
            </div><p>According to <a href="https://lemarin.ouest-france.fr/secteurs-activites/shipping/36403-victime-dune-probable-cyberattaque-msc-suspend-ses-e-bookings" target="_blank" rel="noopener noreferrer ">Le Marin</a> and <a href="https://www.offshore-energy.biz/msc-hit-by-suspected-cyber-attack/" target="_blank" rel="noopener noreferrer ">other online sources</a>, the shipping company MSC (Mediterranean Shipping Company), the world’s second-largest container shipping line, was reportedly affected by a cyber incident that disrupted its electronic booking system known as “MyMSC.” The incident occurred at a particularly difficult time, as the global shipping industry was already dealing with the effects of the COVID-19 pandemic.</p>
<p>Email services appeared to remain operational, but the company initially released little information beyond indicating that the disruption was likely related to a network outage in one of its data centers.</p>]]></description></item><item><title>The Ryuk ransomware causes more than 30 hours of operational disruption for a maritime operator</title><link>https://maritimeinfosec.org/ryuk-ransomware-causes-more-than-30-hours-of-operational-disruption-for-a-maritime-operator/</link><pubDate>Thu, 09 Jan 2020 00:49:38 +0000</pubDate><author>Olivier JACQ</author><guid>https://maritimeinfosec.org/ryuk-ransomware-causes-more-than-30-hours-of-operational-disruption-for-a-maritime-operator/</guid><description><![CDATA[<div class="featured-image">
                <img src="/images/wp-content/uploads/2019/12/dock-1277744_640.jpg" referrerpolicy="no-referrer">
            </div><p>The website of the U.S. Coast Guard (which is involved in cyberspace issues, as mentioned in this article) <a href="https://www.dco.uscg.mil/Portals/9/DCO%20Documents/5p/MSIB/2019/MSIB_10_19.pdf?ver=2019-12-23-134957-667" target="_blank" rel="noopener noreferrer ">reports</a> that a U.S. maritime operator was impacted by the &ldquo;Ryuk&rdquo; ransomware.</p>
<p>This malicious code is not new. It first appeared <a href="https://research.checkpoint.com/2018/ryuk-ransomware-targeted-campaign-break/" target="_blank" rel="noopener noreferrer ">in the summer of 2018</a> and has already affected numerous companies, such as <a href="https://www.letelegramme.fr/france/donnees-de-sante-les-zones-d-ombre-de-la-cyberattaque-contre-eurofins-02-08-2019-12352408.php" target="_blank" rel="noopener noreferrer ">Eurofins in the summer of 2019</a> or <a href="https://www.lemagit.fr/actualites/252474790/Prosegur-un-specialiste-de-la-securite-physique-frappe-par-une-attaque-logique" target="_blank" rel="noopener noreferrer ">Prosegur more recently</a>. As noted by CheckPoint, the malware is not particularly sophisticated from a technical perspective, but it specifically targets large companies and organizations with significant financial resources that may prefer to pay a ransom (which is not recommended and does not always work, particularly in the case of Ryuk) rather than lose several days of operations. As early as January 2019, it had already generated €3 million for its operators (source: Le Monde). In March 2019, the French cybersecurity agency ANSSI published both <a href="https://cert.ssi.gouv.fr/alerte/CERTFR-2019-ALE-003/" target="_blank" rel="noopener noreferrer ">an alert bulletin</a> and <a href="https://www.cert.ssi.gouv.fr/uploads/CERTFR-2019-ACT-005.pdf" target="_blank" rel="noopener noreferrer ">a news bulletin</a> about this malware.</p>]]></description></item></channel></rss>