Pirates are turning to offshore hacking

Offshore Hacking? Usually when we mention the term in technological ones we mean the illegal distribution of software, movies, music and other digital content. But Verizon revealed a different piracy case, with real pirates raiding ships.Pirates hacking

A πειρατών κατάφερε να παραβιάσει το σύστημα διαχείρισης περιεχομένου μιας ναυτιλιακής s extracting confidential information related to itineraries, cargo and type of ships.

The Verizon publication explains:

Instead of spending days waiting on boats, pirates began attacking boats with a highly targeted method.

Specifically, they board a boat, force the crew to be locked in the cabins for a short period of time. When the crew finally gets out of the cabins they find that the pirates hit just a few containers.

Of course, the situation is very worrying for shipping companies , αλλά υπάρχει και ένα ενθαρρυντικό γεγονός. Η δημοσίευση καταλήγει στο συμπέρασμα ότι ενώ η ομάδα ήταν αρκετά δημιουργική, δεν ήταν εξειδικευμένοι .

They failed to enable SSL on the web shell and so their commands were transported in plain text, which allowed the shipping company to write a protection code relatively easily. The publication also reports that the technicians have discovered numerous misleading commands.

The hackers also don't seem to have used a proxy or VPN during the of these attempts, but carried out the attacks with the IP they use at home.

But worrying is that although pirates are pioneers, the attack shows that their techniques are changing as they started using hacking.

With a little training they will also acquire the skills….

iGuRu.gr The Best Technology Site in Greecefgns

Subscribe to Blog by Email

Subscribe to this blog and receive notifications of new posts by email.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).