Skip to content Skip to footer

Who we are

Our website address is: https://shipip.com.

What personal data we collect and why we collect it

Comments

When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection.

An anonymized string created from your email address (also called a hash) may be provided to the Gravatar service to see if you are using it. The Gravatar service privacy policy is available here: https://automattic.com/privacy/. After approval of your comment, your profile picture is visible to the public in the context of your comment.

Media

If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.

Contact forms

Cookies

If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year.

If you visit our login page, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.

When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select "Remember Me", your login will persist for two weeks. If you log out of your account, the login cookies will be removed.

If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.

Embedded content from other websites

Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.

These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website.

Analytics

Who we share your data with

How long we retain your data

If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.

For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.

What rights you have over your data

If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.

Where we send your data

Visitor comments may be checked through an automated spam detection service.

Your contact information

Additional information

How we protect your data

What data breach procedures we have in place

What third parties we receive data from

What automated decision making and/or profiling we do with user data

Industry regulatory disclosure requirements

Cyber criminals target vulnerable marine supply chains

Cyber criminals are increasingly targeting container shipping and ports as ransomware gangs step-up attacks on vulnerable supply chains, according to the latest CyberCube Global Threat Briefing.

Worldwide supply chain disruption and shortages and weak cyber security make the maritime sector an attractive target for cyber criminals, according to William Altman, principal cybersecurity consultant at CyberCube, which provides insurers with cyber threat intelligence and analytics. Other critical supply chains that have single points of failure are also vulnerable, including food and agriculture, and information technology, he said at the launch of the report.

“We should expect more attacks on the maritime sector, in particular. Covid-19, labour shortages, wars, and a myriad of other factors are putting a lot of pressure on global supply chains. In the past two years we have witnessed how crisis events, such as key shipping lane blockages and ransomware port attacks, have contributed to intense global supply chain shortages,” said Altman.

“Cyber criminals are known to take advantage of organisations that are experiencing turmoil, such as hospitals during the pandemic. Ransomware actors in particular are increasingly targeting large cargo ships and their onboard operational systems, as well as compromising connected infrastructure at critical port facilities worldwide. This is something we have seen over the past year, but it has built up over the last few months,” he said.

A number of large ports have been hit by ransomware attacks in the past, while the world’s four largest container shipping companies have been attacked in recent years. In February, India’s Jawaharlal Nehru Port, the country’s busiest container terminal, was hit by a ransomware attack, while in March a cyberattack crippled the systems of US freight forwarding company Expeditors International.

“We have seen that the number of attacks has only gone up over the past year, and over the next six months, as supply chain shortages intensify, we expect hackers to take advantage,” said Altman.

The ongoing digitalisation of logistics and the use of autonomous systems creates more vulnerabilities and loopholes, explained Altman. “There is also often a disconnect between the information technology systems and operational technology systems at ports and onboard ships. These two types of systems should be segregated but they are not, and it poses a lot of danger for machinery that moves cargo and navigates ships. The stuff you don’t want attackers to touch,” he said.

Ransomware gangs are increasingly targeting companies with critical operations, according to Altman. For example, CyberCube warned against the increased threat to space infrastructure and technology, such as satellites, ground terminals and user stations, as governments develop anti-satellite weapons and other space military capabilities.

“These are single points of failure that are critical to the functioning of society that are increasingly being targeted… It’s only a matter of time before there is an attack on a single point of failure in space, such as the global positioning system,” he said.

Following the attack on the Colonial Pipeline in the US, which attracted the attention of law enforcement agencies, ransomware gangs have switched to lower profile critical smaller and mid-sized business. For example, cyber criminals are now targeting the agricultural, food supply and healthcare sectors, which can least afford downtime, yet often lack the cyber security resources to fight off determined attacks, he said.

Ransomware attacks are also growing more sophisticated, timing attacks for maximum damage, as well as using double or triple extortion, and distributed denial-of-service (DDoS) attack to prolong business interruption, he said.

Altman also warned that the LockBit ransomware gang is poised to become the most active ransomware gang in the world. Although it targets a wide range of industries, it prefers vulnerable companies in the legal profession, as well as large manufacturing and construction companies. In May, LockBit hit a manufacturing plant owned by iPhone manufacturer Foxconn, disrupting operations.

However, there are signs that actions taken by insurers in recent years may be stemming the tide of ransomware losses, according to Altman. Ransomware-as-a-service gangs typically target companies with poor cyber hygiene, while insurers increasingly score risks and use analytics tools to identify companies that are most susceptible to losses.

“It is clear that starting in late 2019, loss ratios for P&C industry, aggregate standalone, and packaged cyber risk begin to reflect the rise in ransomware-as-a-service. These criminal actors are largely responsible for the cyber loss experience by companies over the past three years. However, beginning in 2020, and accelerating through 2021, we saw rate increases to account for the outsized frequency and severity of ransomware,” said Altman.

“Today, alongside those rate increases and reductions in coverage, we do see positive signs that cyber insurers are adopting pro-active measures to reduce cyber risk,” he said.

Source: https://www.commercialriskonline.com/cyber-criminals-target-vulnerable-marine-supply-chains/