Cyber Operators Course (Op) – Module 4

Harmful software and procedures to counter – Phishing scams

Probably the most likely type of attack a shipping operator will experience will be a phishing scam. Usually this will be delivered by email or other form of electronic messaging (think social media or chat forums).

Depending on the attack, it may include a link to a plausible web site, or an attachment.

Phishing varies hugely in the quality of the attack. Doubtless you may have received an email from a bank that you don’t bank with, stating that your account has been hacked and that you need to take action urgently.

Their objective is to convince you to enter your banking credentials. Using these, your bank account may then be compromised.

However, more carefully targeted attacks are being used. The scammer will spend time researching you and your organisation online. This is called ‘open source intelligence gathering’ or ‘OSINT’, using social media and other resources to build a picture of you and the people you work with.

This allows for the hacker to send you seemingly more legitimate phishing scams via email or other contact sources that will give you more of an urge to comply with the hackers request.

Cyber Operators Course (Op) – Module 4

Harmful software and procedures to counter – Example of a Scam

Consider the following attack:

Scammer notes from your online profile that you work for business ‘X’

Using business social media networks such as LinkedIn, they search for all of the employees of the business you work with. Going further, they look at how your business interacts with its suppliers, as I’m sure some of your finance department are linked to other companies finance teams.

Even looking at your suppliers websites can be revealing, particularly if one announces a large contract involving the other.

An email arrives to your accounts payable department, stating that the suppliers bank details have changed. The logo is correct, the name of the individual making the request is one you recognise. Bank details are changed for the next payment run to the supplier.

Except is was a scam and the money has now disappeared.

Transaction values in shipping are often significant. What if that was a bunkering payment? It happens all too often.

Many operators have improved finance processes to include validation of changes to bank details. Have you verified yours?

Cyber Operators Course (Op) – Module 4

Harmful software and procedures to counter – CEO fraud (Captain/Master/Operator or Owner)

Social media will often reveal the organisational structure; who reports to who. Another common trick is to find the social media profile of a CEO, CFO or senior head in finance. The scammer waits until they post that they are going on holiday or boarding a long flight.

At that point, an email arrives in someone’s inbox in the finance team, coming from the CFO or CEO.

It’s usually quite threatening, stating that someone’s job will be on the line unless an urgent payment is made.

Attempts to validate the request fail because the CEO is on a long flight. So, the finance person is intimidated into making the payment.

Only when the CEO lands does the attack become obvious.

There are many different flavours of the same attack, some involving telephone calls to ‘warm up’ the finance person. What’s known as ‘social engineering’ is also employed by some scammers to sweet talk their victims into disclosing useful information.


Naturally, you would expect them to put a little more effort into the scam than this, however the principle is solid.  If you were emailed from the Master using his/her ‘tone’ and signature block asking to send passage details, cargo plan etc….would you?  Remember it won’t always be asking for money.  Information is often worth more.

Cyber Operators Course (Op) – Module 4

Harmful software and procedures to counter – Email attachments

Sending malware to a victim through email attachments is an effective way to compromise an organisation.

Emails are constructed, often made to appear as if they are being sent internally. One easy method is for the scammer to create a similar looking email address, often exploiting subtle differences between letters such as a ‘1’, ‘l’, ‘I’ to fool the reader in to thinking it’s a legitimate email.

Sometimes the email might appear to be sent to the reader by accident: an internal mail discussing salary change or redundancies with an attachment. How many readers would be inquisitive enough to have a quick look at the attachment before deleting it?

Anti-virus software can filter out simple malware, but it’s not very effective at blocking more advanced attacks.

Caution should be taken with email attachments, particularly those received from external sources.

Cyber Operators Course (Op) – Module 4

Harmful software and procedures to counter – Pop Up Ads

Pop up Ads when browsing – You might get an advertisement in its own ‘window’. This is a pop-up ad. Mostly they are just to advertise a product but sometimes can be an infectious computer virus.

To help stop the ads from disrupting browsing, try installing an ad-blocker. Also NEVER click on a pop-up ad as the risks of it infecting your system is very high.

Passwords – Sometimes setting an easy to remember password isn’t always the best thing to do. If you see your password the list bellow, I’ts recommend that you change it to a more secure one.

As mentioned earlier, Easy to crack passwords will continue to be a big risk in 2020 and is likely that passwords will be phased out in favour of a number of different multi-factor options. Next year may well be the first year of multi-factor by default,” Digital Shadows, a cyber threat intelligence company said.

“A secure password uses upper and lower case letters, numbers and symbols and is at least 6 characters long” e.g. gW3l!O2

Cyber Operators Course (Op) – Module 4

Harmful software and procedures to counter – Water holing

A relatively advanced and new phenomenon where the predator creates a nice place for the pray to drink together.  Think of a website that seafarers visit, it appears safe, and the website (owned by the criminal) is not planning to directly target the visitors.  It is a safe place for now, but the small streams that lead from it where further data can be gathered would be of interest.

As an example think of a ‘secure’ and safe website (but fake created by the criminal) can be used to entice the drinkers, then take them away ‘downstream’.

You may be aware of your ‘safe’ websites, but do you follow their links or ‘trusted friends’ pages…..

Cyber Operators Course (Op) – Module 4

Harmful software and procedures to counter – Harmful Software

A Computer Infection is a harmful piece of software or script that gets onto your computer system. The next set of slides is a list of different infections you can get nowadays from either surfing the web or downloading the software itself. Think of a Computer infection just like a human getting an infection, you can get some worse than others and they all have different effects.

Cyber Operators Course (Op) – Module 4

Harmful software and procedures to counter – System updates

System updates

As with every system on board, Operating System software updates and security patches make the hackers work harder. Any missing update creates a potential ‘hole’ for the hacker to exploit.

Whilst it is difficult to assess whether patches are missing without running simple audit software on the computer, some simple questions may reveal poor practice:

“what operating system is running?”

If Windows XP or earlier, you should be concerned.

“how often are security patches applied?”

Once per month should be a maximum, though important security patches should be applied every time the vessel arrives at port, or potentially even more often.

Anti-virus

Anti-Virus software is one of the most basic defences, however it is relatively easy for a hacker to work around. Even so, Anti-Virus is an essential component and will prevent simple attacks.

Updates are issued several times per day by the software vendor, so keeping the Anti-Virus software up to date is important. It should be possible to check the last time your Anti-Virus software was updated by clicking the relevant icon on the desktop of your computer.

Cyber Operators Course (Op) – Module 4

Harmful software and procedures to counter – Anti-Virus Software

Unfortunately, also like a biological virus, a computer virus can evolve to counter the drugs it is given.  In the case of a computer virus, the programmer will find a way to bypass the protection ‘drugs’.  Sadly this means the Anti-Virus providers have to constantly update their software.

Cyber Operators Course (Op) – Module 4

Harmful software and procedures to counter – Endpoint protection

To deal with more advanced attacks, endpoint protection software was developed to look for unusual behaviour. Anti-virus software simply looks for signatures, endpoint protection looks for more general rogue behaviour. It is therefore far more effective. However, skilled hackers can still evade it.

Look for evidence of an endpoint protection package on the desktop.  There are many available on the Market.  The below brands you may recognise.