The container freighter will be anchored off the coast of the Long Beach / Los Angeles Port Complex in Long Beach, California, on Wednesday, October 6, 2021.
Jeff Gritchen | Media News Group | Getty Images
Hackers armed with computers alone Increasingly set their line of sight About some of the biggest things humans can build.
Vast container ships and chunky cargo planes (essential to today’s global economy) can be stopped by a new generation of code warriors.
“In reality, like any other digital system, planes and ships can be hacked,” David Emm, chief security researcher at cyber company Kaspersky, told CNBC.
However, it is often easier to hack a company operating in a port or airport than to access a real aircraft or ship.
In December, the German company Hellmann Worldwide Logistics said its business was affected by a phishing attack. Phishing attacks include sending spoofed messages designed to trick people into passing sensitive information or downloading malicious software.
The company, which provides air and sea freight, road and rail, and contract logistics services, had to stop accepting new bookings for several days. As a result, you don’t know exactly how much revenue you’ve lost.
Hellmann’s chief information officer, Sami Awad-Hartmann, told CNBC that the company immediately “tried to stop the spread” when it realized it was the victim of a cyberattack.
“You need to stop it to make sure it doesn’t go any further in you [computing] Infrastructure “.
Hellmann, a global company, has disconnected data centers around the world and shut down some systems to limit spread.
“One of the drastic decisions we made when we saw some systems infected was that we were disconnected from the Internet,” said Awad-Hartmann. “I’m going to stop as soon as I perform this step. I’m not working anymore.”
Everything had to be done manually, and the business continuity plan was initiated, Awad-Hartmann said, adding that some of the businesses were able to handle this better than others.
Awad-Hartmann said that hackers have two main goals. The first is to encrypt Hermann and the second is to steal data.
“Then they blackmail you,” he said. “Then the ransom begins.”
Hermann moved quickly and was shut down from the Internet, so it wasn’t encrypted, Awad Hartmann said.
“Of course, as soon as you encrypt, you may need to decrypt, so the reboot procedure will take a long time,” he explained. “You may have to pay the ransom to get a master key, etc.”
Hermann is working with legal authorities to identify the person behind the cyberattack. There are some speculations, but no definitive answer, Awad-Hartmann said.
First Maersk publication In late June of that year, he was hit by NotPetya, a ransomware attack that makes people inaccessible to data unless they pay $ 300 in Bitcoin.
“In the last week of [second] The quarter was hit by cyberattacks, primarily affecting Maersk Line, APM Terminals and Damco, “said Maersk CEO Soren Skow. statement August 2020.
“The weeks of July will have a negative impact on trading volumes, which will impact third-quarter earnings,” he added. “Cyber attacks are expected to have a negative impact of $ 200 million to $ 300 million.”
The ransomware attack exploited a specific security vulnerability in the Windows software platform that Microsoft updated after the leak.
“This cyberattack was a type of malware never seen before, and updates and patches applied to both Windows systems and antivirus were not effective protections in this case,” Maersk said. ..
“AP Moller Maersk has taken various protective measures in response to this new type of malware and is continuing to review the system to protect itself from attacks.”
In a follow-up article, Maersk’s IT security expert at the time, Gavin Ashton, wrote that it was “unavoidable” to be attacked.
“One day, people are inevitable to go through,” Ashton continued. “And obviously, you need to have a solid emergency response plan in case of the worst, but that doesn’t mean that you won’t fight terrible battles to thwart these attacks in the first case. No. Just because a villain is coming in doesn’t mean that you keep the front door open and drink a cup of tea when you come in. All you have to do is lock the door. “
On the other hand, in February 2020, the Toll Group, a forwarder of Japan Post, Forced to shut down certain IT systems After receiving a cyber attack. Toll Group did not immediately respond to CNBC’s request for comment.
Hackers are not always looking for a ransom.
2013, criminal Hacked system at the port of Antwerp To be able to manipulate the movement of the container to hide or move the transportation of medicines.
Once the hacker entered the proper system, he changed the location and delivery time of the container containing the drug.
The smugglers then sent their drivers to pick up the drug-laden shipping containers before the legitimate carriers collected them.
Hackers used spear phishing and malware attacks (directed at port authorities workers and shipping companies) to gain access to the system.
The entire plan was revealed by police after the shipping company detected something was wrong.
Awad-Hartmann said hackers are aware of how important the global supply chain is and know what happens when it gets confused.
“It affects the global economy,” he said. “You can see that the goods aren’t flowing. There’s a gap in the supermarket. Of course, I think hackers are aware of this dependence on the supply chain. And, of course, logistics companies are targeted.”
He added that the current focus is on logistics. The global supply chain is in the news.
“But I think it’s a common threat,” he said.
“And this never goes away. It increases. You always have to check. Are you still ready? This makes us very busy and costs us a lot. It costs. “