The confusion attending the COVID-19 pandemic has created new opportunities for cybercrime, particularly cyberattacks targeting the human element. Fraudulent “phishing” attempts and similar deceptive tactics are an omnipresent cyber threat, and they can be even more potent in times of heightened uncertainty and stress. According to Lloyds Register’s cybersecurity outfit, Nettitude, about 80 percent of current email-based threats attempt to exploit COVID-19-related communication.
To find out more about how hackers are exploiting the outbreak to deceive employees and gain access to corporate IT systems, we spoke with an expert – Chris Oakley, Nettitude’s VP of Technical Services for the Americas. In addition to an update on the facts on the ground, Oakley provided an extensive list of actions that maritime employers and staffmembers can take to minimize risk – and maximize the success of their response in the event of a cyberattack.
MarEx: Themed phishing attacks (like the new COVID-19-related activity) take advantage of unsuspecting staffmembers. What should employees be trained to watch out for in their own browsing/email activity to reduce risk?
• Be aware that threat actors will use current affairs as means to target people with increased success. We see this every time there’s a natural disaster, national security incident or similar event. Awareness is the first step.
• Are you expecting the suspicious communication? If not, proceed with caution.
• If it purports to come from a known source, e.g. your own organization, be aware that this can be forged.
• Are you being prompted to download and open or run a file, visit a third-party website, or submit information of any kind? If so, proceed with caution and speak to your line manager or other internal authority to verify the legitimacy of the communication. Don’t be afraid to report.
• Only use your work laptop for work purposes.
Above, an example of a malicious coronavirus-themed email thread (Nettitude)
MarEx: What kind of technical measures (for example, ProofPoint) can companies implement to reduce the risk of having their own employees accidentally let in a hacker? And how can Nettitude help?
• Technology is an important part of a robust security posture, although not the only part. You can’t rely solely on technology. People, process and technology are all relevant.
• There should be strategy behind any technology deployment. Aligning to a framework such as NIST CSF is useful.
• We recommend, at a minimum, technologies that facilitate asset identification, protection, detection, response and recovery. (To reiterate, these things require more than just technology.)
• Quick technology wins include email gateway technology that is designed to detect and block phishing emails; endpoint detection and response technology to help prevent malicious software from gaining a foothold; and well-configured firewalls that focus on restricting what traffic can leave the network, not just enter.
• In addition to phishing, a common method of entry for an attacker is attacking software vulnerabilities, especially in internet-facing infrastructure. Robust first- and third-party patch management technology should be in place, as well as following principles such as least privilege, so that attackers need to work harder to move through your estate.
MarEx: If a company should experience a significant cybersecurity breach – like a malware attack – are there immediate response steps that they should take for containment and damage control?
• Be proactive: plan what you will do in the event of a breach before it happens. This way, you don’t have to work it out in the heat of the moment when time is short and a robust response is critical.
• Run through a number of scenarios as part of this – e.g. ransomware, data theft, phishing, denial of service, etc. Where do roles and responsibilities lie? What process will be followed?
• In the event of breach detection, the immediate concerns will include determining the scope and scale of the compromise, as well as if the threat is still active.
• Containment may involve isolating assets – e.g. if a laptop or other lower importance asset is suspected or known to be compromised, an appropriate immediate action is to remove its network connection to prevent further impact.
• Gather as much information as possible. This will likely include interviewing end users. It is very important to foster a culture of education and not fear. An end user fearing the repercussions of revealing what they did that could have accidentally facilitated the breach is not likely to help.
• It is not usually a good idea reboot or shut down compromised machines. Important evidence of the breach may exist in memory only, which gets wiped on reboot and shutdown.
• If the breach is in any way beyond your own organization’s capabilities, then call third-party experts in to avoid uncontrolled impact (and cost). Again, it is better to have an arrangement ahead of time as part of preparation: going through third-party selection during a live incident is suboptimal.
• There is often a focus on detection and response. Consider recovery as well. Once the threat has been contained and removed, it may be required to rebuild virtual machines, restore from backups, etc. Do you have a robust and regularly tested backup system?
• Nettitude can help with all of the cybersecurity elements of people, process and technology. We can provide professional consultancy services around risk management, penetration testing and threat intelligence. We can also provide managed services that offload much of the burden to us on a 24/7 basis.
A massive fire broke out at the Port of Beirut on Thursday, incinerating a warehouse full of tires and oil within the port’s free zone. The same area was heavily damaged in the ammonium nitrate explosion that leveled the central port area and the adjacent waterfront on August 4. According to Lebanon’s civil defense agency, […]
Over the course of the past five days, the Australian Maritime Safety Authority arranged a medical intervention for an injured aboard a freighter in the Indian Ocean. On Saturday evening, the Spliethoff tweendecker Dolfijngracht called for assistance while under way about 1,000 nauical miles off the coast of Western Australia. A crewmember had sustained serious […]
The naval forces of the US and Bahrain recently staged a joint force training exercise which showcased the interoperability between coalition warships operating I the Arabian Gulf. Coalition Task Force Sentinel executed combined exercise Sentinel Shield supporting Sentry and Sentinel patrols in the coalition’s area of operations. The guided-missile destroyer USS John Paul Jones and […]
With close to 100 daily cargo flights operated to a destination network spanning more than 65 cities across six continents, Emirates SkyCargo is delivering essential supplies and commodities to people around the world. The air cargo carrier is currently operating 11 Boeing 777 freighter aircraft, each with a capacity to transport about 100 tonnes of […]
The National Transportation Safety Board (NTSB) has released a Marine Accident Brief about an accident that occurred on April 15, 2019, involving the towing vessel DeJeanne Maria which struck the end of a submerged dredge pipeline while pushing two spud barges to the Gulf of Mexico. The incident occurred on the Mississippi River in Pass […]
DSV Belgium has solid experience in the transport of pharmaceutical products for different customers. With a pharma hub based at Brussels Airport a lot of experience and know-how has been built up over the years. Last weekend, the forwarder handled one hundred million mouth masks, an important milestone for its Belgian organisation that has put […]
Best known as a leading passenger airport serving Germany’s most populated federal state North Rhine-Westphalia, Düsseldorf has become transformed into a vital distribution point, during the COVID 19 pandemic, for medical equipment and other life-saving goods, mostly from China. Gerton Hulsman, managing director of cargo operations, reports that the handling teams are working hard to […]
Astral Aviation has increased its intra-African network with cargo freighters during the pandemic. While there has been a reduction in capacity to, from, and within Africa, which has been caused by a stoppage of passenger flights and limited frequencies on freighter aircraft, Astral Aviation continues to operate cargo freighters from its Nairobi hub to 13 destinations […]
The UK government’s new post-Brexit tariff regime will result in both winners and losers. The new regime is set to replace the European Union’s Common External Tariff from the end of the Brexit Transition Period on December 31, 2020. The UK’s commitment to the ongoing Brexit process and ending the UK’s transition from EU membership […]
The U-Freight Group (UFL), with its considerable involvement in eCommerce logistics, says that the latest statistics showing that global e-commerce sales hit $25.6 trillion in 2018 are a further vindication of its decision to enter this sector of the international freight market several years ago. The latest available estimates, up 8% from 2017, were recently […]
Emirates SkyCargo has expanded its weekly scheduled cargo flight operations to cover 75 destinations across six continents. Through its wider reach, Emirates SkyCargo is able to transport essential commodities and other urgently needed cargo more rapidly across the world, allowing exporters and importers across markets to benefit from direct access to widebody cargo capacity. Some […]
Global commercial aviation charter company Albion Aviation Group is reporting that it is seeing a considerable uptake in its professional cargo broker training courses from the current global pandemic crisis and surge in charter demand. “We have completed a number webinar courses for a whole of host of companies, looking to manage their own cargo […]
Operators can continue to use pilots and other crew members who have unable to comply with certain training, recent experience, testing, and checking requirements due to the COVID-19 outbreak in support of essential operations. Additionally, this Special Federal Aviation Regulation (SFAR) provides regulatory relief to certain persons and pilot schools unable to meet duration and […]
Callan Marine is serving as the prime contractor to the Texas Department of Transportation for a maintenance dredging project located at the Bolivar Ferry Terminal, in Galveston, Texas. Work began in May and is estimated to be complete in late July 2020. The project consists of the removal of 600,000 cubic yards of material and […]
Network Airline Management and TAAG Angola Airlines are pleased to announce the renewal of their long-term freighter aircraft contract by an additional 12 months, sealing an ongoing partnership for the foreseeable future. Operating a regular weekly scheduled service from Liege, Belgium, to the capital of Angola, Luanda, Network Airline Management provides a Boeing 747-400F aircraft […]
Qatar Airways Cargo transported 56 SkyCell containers with vaccines from one of the largest vaccine manufacturers worldwide on its scheduled freighter and belly-hold cargo flights for its customer, CEVA Logistics. The 54-tonne shipment consisting of pneumococcal and varicella vaccines were flown from Brussels to Mumbai via the carrier’s hub in Doha on two separate flights. […]