Winged Isis in her function as patron goddess, Egyptian painter around 1360 B.C. Source: Wikimedia Commons - CC0

Winged Isis in her function as patron goddess, Egyptian painter around 1360 B.C. Source: Wikimedia Commons - CC0

Shipping companies in the cyber sights

A cyber espionage group from China called "Mustang Panda" is said to have planted malware to take over computer systems of European shipping companies in Norway, Greece and the Netherlands.
"Mustang Panda" has already been accused of espionage against governments and organisations in Asia, Australia and Europe and has used similar malware tools in espionage campaigns in the past. The tools allow the attacker to completely take over a target system and execute their own commands.

The information comes from the Slovakian cyber security company ESET (derived from the Egyptian goddess of protection ISIS) and it warns, alongside British and US authorities, of a significant threat to cyber security from China, especially for critical infrastructures (KRITIS).

Crest of the "attacked" team during the "Locked Shields 2024" exercise. Picture: German Armed Forces

Crest of the "attacked" team during the "Locked Shields 2024" exercise. Picture: German Armed Forces

According to threat researchers at ESET, this is the first case of a cyber espionage group linked to China now focussing on merchant shipping and there is a clear interest in this sector. It remains unclear how the cyber attacks are being carried out. One possibility is the use of USB devices that are physically placed in companies or on ships.
The Chinese embassy in Washington firmly rejected the accusations and stated that China is a victim of cyber attacks and is firmly opposed to all forms of cyber attacks.

Defence in cyberspace is part of the Bundeswehr's range of tasks. This has been practised at the NATO exercise "Locked Shields" since 2010. Locked Shields is the world's largest, most complex and most advanced multinational cyber security exercise. During this "Live-Fire Cyber Defence Exercise", attacks on simulated computer networks and IT systems of critical infrastructure are practised in real time and hopefully successfully fended off.

kdk

Source: gCaptain, German Armed Forces

0 Kommentare

Einen Kommentar abschicken

Your email address will not be published. Erforderliche Felder sind mit * markiert

en_GBEnglish