Cadastre-se agora para um orçamento mais personalizado!

Prosecutors investigating cyberattacks affecting multiple Belgian and Dutch ports

fev, 03, 2022 Hi-network.com

Multiple ports in Belgium and the Netherlands reported issues after a cyberattack affecting IT services was announced. Terminals operated by SEA-Tank, Oiltanking, and Evos in Antwerp, Ghent, Amsterdam, and Terneuzen are all dealing with issues related to their operational systems, according toFrance24.

Recommends

  • Best VPN services
  • Best security keys
  • Best antivirus software
  • The fastest VPNs

A spokesperson from Evos toldZDNetthat they are continuing to operate their terminals but are having some delays after the attack. 

"There is a disruption of IT services at our terminals in Terneuzen, Ghent, and Malta, which is causing some delays in execution. All operations continue to take place in a safe manner," the spokesperson said. 

Prosecutors in Antwerp have opened an investigation into the cyberattacks and told the Associated Press that the Federal Computer Crime Unit is looking into the issue. 

Companies reported having difficulties unloading barges because their software had been "hijacked," making it difficult to process each one. 

The incidents come days after oil companies Oiltanking and Mabanaft, both owned by German logistics conglomerate Marquard & Bahls Group, suffered a cyberattack that crippled their loading and unloading systems. 

Oiltanking toldZDNetin a statement yesterday that its terminals are operating with limited capacity and that they "have declared force majeure." On Tuesday, Royal Dutch Shell said it was forced to reroute to different supply depots because of the issue. German newspaper Handelsblattsaid 233 gas stations across Germany now have to run some processes manually because of the attack.

Recommends

The best security key

While robust passwords help you secure your valuable online accounts, hardware-based two-factor authentication takes that security to the next level.

Read now

An internal report from the German Federal Office for Information Security (BSI) said the BlackCat ransomware group was behind the attack on Oiltanking. 

Emsisoft threat analyst Brett Callow noted that it is likely BlackCat is a rebrand of BlackMatter, which was itself a rebrand of DarkSide, the group behind the ransomware attack on Colonial Pipeline in May 2021. 

Billion-dollar German logistics firm Hellmann Worldwide Logistics was also hit with ransomware in December.

Andy Norton, cyber risk officer at Armis, said that ICS cybersecurity simply didn't exist for decades because it didn't need to. He explained that operational technology and information technology were separate domains with separate systems that didn't connect to each other, and legacy industrial devices didn't connect independently to the internet or to each other. 

"This disconnection -- the so-called 'air gap' -- was thought to be all the security that OT systems needed, aside from physical access control. Now, though, IT/OT integration is becoming the norm. Connected devices stream data, monitor equipment and processes, and support line automation and other Industry 4.0 functions, so the air gap is no longer a reliable method of OT security," Norton said. 

"As OT and IT continue to merge, cybersecurity requirements now apply to ICS just as much as to corporate networks, but many organizations struggle to find the right approach to protect their operational technology," Norton added.

"Facilities that can't operate securely are at risk of going offline at any moment. A ransomware attack on an ICS facility can halt operations and leak operational and corporate data to the dark web-or destroy that data altogether."

Security

8 habits of highly secure remote workersHow to find and remove spyware from your phoneThe best VPN services: How do the top 5 compare?How to find out if you are involved in a data breach -- and what to do next
  • 8 habits of highly secure remote workers
  • How to find and remove spyware from your phone
  • The best VPN services: How do the top 5 compare?
  • How to find out if you are involved in a data breach -- and what to do next

tag-icon Tags quentes : Tecnologia Segurança

Copyright © 2014-2024 Hi-Network.com | HAILIAN TECHNOLOGY CO., LIMITED | All Rights Reserved.