Pirates are turning to offshore hacking

Offshore Hacking? Usually when we mention the term piracy in technological we mean the illegal distribution of software, movies, music and other digital content. But Verizon revealed a different piracy case, with real pirates raiding ships.Pirates hacking

A group of hackers managed to breach the system of the content of a shipping company by extracting confidential information related to routes, cargo and type of ships.

The Verizon publication explains:

Instead of spending days waiting on boats, pirates began attacking boats with a highly targeted method.

Specifically, they board a boat, force the crew to be locked in the cabins for a short period of time. When the crew finally gets out of the cabins they find that the pirates hit just a few containers.

Of course, the situation is very worrying for shipping companies , but there is also an encouraging fact. The publication concludes that while the group was quite creative, they were not expert hackers.

They failed to enable SSL on the web shell and so their commands were transported in plain text, which allowed the shipping company to write a protection code relatively easily. The publication also reports that the technicians have discovered numerous misleading commands.

Pirates also do not appear to have used a proxy or a VPN during these attempts, but they did the IP attacks they use at home.

But worrying is that although pirates are pioneers, the attack shows that their techniques are changing as they started using hacking.

With a little training they will also acquire the skills….

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.100 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).