Skip to content Skip to footer

Who we are

Our website address is: https://shipip.com.

What personal data we collect and why we collect it

Comments

When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection.

An anonymized string created from your email address (also called a hash) may be provided to the Gravatar service to see if you are using it. The Gravatar service privacy policy is available here: https://automattic.com/privacy/. After approval of your comment, your profile picture is visible to the public in the context of your comment.

Media

If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.

Contact forms

Cookies

If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year.

If you visit our login page, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.

When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select "Remember Me", your login will persist for two weeks. If you log out of your account, the login cookies will be removed.

If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.

Embedded content from other websites

Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.

These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website.

Analytics

Who we share your data with

How long we retain your data

If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.

For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.

What rights you have over your data

If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.

Where we send your data

Visitor comments may be checked through an automated spam detection service.

Your contact information

Additional information

How we protect your data

What data breach procedures we have in place

What third parties we receive data from

What automated decision making and/or profiling we do with user data

Industry regulatory disclosure requirements

Maritime Cyber Security Threats Jun 2020 Week Tw

Dryad Global’s cyber security partners, Red Sky Alliance, perform weekly queries of  backend databases, identifying all new data containing Motor Vessel (MV) and Motor Tanker (MT) in the subject line of malicious emails.  Email subject line Motor Vessel (MV) or Motor Tanker (MT) keyword usage is a common lure to entice users in the maritime industry to open emails containing malicious attachments.

With our cyber security partner we are providing a weekly list of Motor Vessels where it is observed that the vessel is being impersonated, with associated malicious emails.

The identified emails attempted to deliver malware or phishing links to compromise the vessels and/or parent companies.  Users should be aware of the subject lines used and the email addresses that are attempting to deliver the messages.

Tactical Cyber Intelligence Reporting

 

In the above collection, we see malicious actors attempting to use vessel names to try to spoof companies in the maritime supply chain.  This week we observed a wide variety of maritime-related subject lines.    Some of the new vessel names used this week include “MV EVIAPETROL V” and “MV XIU SHAN” among others. “Maersk Kleven” was used again this week. This vessel is currently flying under the Liberian flag and is a Hazard A (major) cargo ship.  It is currently headed from Charleston, US to Algeciras, Spain.

Analysts observed subject line “RE: MV WESTERN TOKYO 62,647DWT / LOADING CLINKER – REQUEST FOR PDA” being used in a malicious email this week.  The MV Western Tokyo is a bulk carrier currently sailing under the flag of the Philippines. The carrier is in port at WAFR – Gulf of Guinea.

This email message was sent from “shipping@san-nikolla.gr” which is likely owned by San Nikolla Shipmanagement S.A.  While the company is headquartered in Albania, the sender appears to be located in Greece, based on the .gr sending domain and the phone numbers provided in the email signature.  There is a web portal login located at “san-nikolla[.]gr” and the address and phone numbers in the email signature appear to be linked to the real San Nikolla Group.  The san-nikolla[.]gr “site is down for maintenance.”

The message body contains a request for a PDA (Profoma Disbursement Account).  As with many malicious emails, the greeting is generic “GOOD DAY DEAR SIRS” and the message contains an attached .xlsx file named “WESTERN TOKYO vessel description 201907 CoA.xlsx.”  When opened, this spreadsheet would activate Trojan:Win32/Vigorf.A malware.[1]  This malware has the ability to download, install, and communicate with other malware. It also has the ability to steal and exfiltrate sensitive information from the victim’s device.

Analysts observed another malicious email which appears to impersonate the M/V BBC Congo.  The malicious email subject line used is “M/V BCC CONGO – Port Agency Appointment.”  Although there were no results found for the “M/V BCC Congo,” there is an active general cargo ship sailing under the flag of Antigua Barbuda named “BBC Congo.”  The actual BBC Congo is currently on a voyage from China to Korea.[2]  The email states the ship will discharge between 22-25 June so it is possible the email is referencing a new vessel.

The sending email operation@inter-trans[.]co” does not appear to be registered to any legitimate company or listed on any company website.  The inter-trans[.]co domain leads to a Roundcube login port with Bulgarian text saying “Welcome” and offering a user/password field.

The sender, according to the email signature is Capt. Gultekin Ozturk, the “Managing Director,” but does not identify the name of the company.   He leaves his Skype, email, and phone contacts, as well as an address based in Turkey.

With the email written in English and the sender based in Turkey, the attached spreadsheet “vsl MV BCC CONGO.xlsx” is written in Chinese text.  One of the more unusual aspects of the email is the target email address “jameshall@compasspub.com.”  This email is owned by the International Sales and Marketing Coordinator for Compass Publishing, which is a Florida, US-based publishing company.  The target does not appear to have any relevance to the maritime industry or the BBC Congo specifically.

When the victim opens the attached spreadsheet, they are actually activating Exploit:O97M/CVE-2017-11882.L malware.[3]  This malware is one of the most common exploits seen “in the wild.”  It takes advantage of a memory corruption vulnerability in Microsoft Office products.  This allows attackers to extract sensitive and private information from the victim’s device.  If successful, an attacker could steal proprietary information from the publishing company.  They would also be able to commit impersonation attacks with insider information

Source: https://dryadglobal.com/