Pirates are turning to offshore hacking

Offshore Hacking? Usually when we mention the term piracy on technology websites we mean the illegal distribution of software, movies, and other digital content. But Verizon revealed a different piracy case, with real pirates raiding ships.Pirates hacking

A πειρατών κατάφερε να παραβιάσει το σύστημα διαχείρισης περιεχομένου μιας ναυτιλιακής εταιρείας αποσπώντας εμπιστευτικές πληροφορίες σχετικές με τα δρομολόγια, το φορτίο και το είδος των πλοίων.

The Verizon publication explains:

Instead of spending days waiting on boats, pirates began attacking boats with a highly targeted method.

Specifically, they board a boat, force the crew to be locked in the cabins for a short period of time. When the crew finally gets out of the cabins they find that the pirates hit just a few containers.

Of course, the situation is very worrying for shipping companies, but there is also an encouraging event. The publication concludes that while the team was creative enough, they were not hackers.

They failed to enable SSL in the web shell, so their commands were passed in plain text, which allowed the shipping company to write a code relatively easily. The publication also says that technicians discovered numerous incorrect commands.

Pirates also do not appear to have used a proxy or a VPN during these attempts, but they did the IP attacks they use at home.

But worrying is that although pirates are pioneers, the attack shows that their techniques are changing as they started using hacking.

With a little they will also acquire the skills….

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.093 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).