Pirates hacked into a shipping company's computer system to get a list of robbery ships


    On such ships there is always something valuable. The

    word "pirates" is now more customary to denote those who in one way or another distribute or consume unlicensed content. But the same word also refers to those who capture and rob sea vessels for the purpose of profit. Now we will talk about the second category of pirates, who are becoming more and more advanced in terms of technology.

    For every pirate, rich booty, a ship loaded with goods, is important. But how do you know by the appearance of the ship what goods it is loaded with, and how much does this product cost? It is better not to guess, but to look at the list of ships and their cargoes in the shipping company system. This is a logical step that modern pirates have taken. They hackedsystem of the international shipping company and got all the data about cargo ships, their timetable, cost and quantity of goods.

    Now the pirates are not acting at random, but according to plan. Having captured the ship, they are looking for containers with the barcode they need for a certain product, they pick up these containers and leave the ship without further conflicts and problems. The corresponding report on the actions of pirates published by Verizon. The company became interested in the actions of the pirates after they abruptly changed the principle of their "work". Previously, they captured the ship, the hostages, and demanded a ransom. Often this ended deplorably for pirates and hostages.


    What do we take today? Drones, diamonds or cars?

    But now, as mentioned above, pirates simply seize certain goods, not threatening anyone particularly and not demanding a ransom for the ship. The team is closed in a room, and when after several hours it is released in one way or another, there is no one on the ship, and some of the containers with the most valuable cargo have been opened.

    According to Verizon experts, the pirates uploaded malware into the computer network of a shipping international company, and thus receive valuable information about the ships, their cargoes and timetables. In other words, the pirates know what to take, where to get and when to take.

    True, pirates make some mistakes during the operation of malware. So, they do not use proxies, they send commands to the software in plain text, which allows information security specialists to understand what is happening. Now, however, the shipping company in question has already understood what is happening. Servers were disconnected, passwords changed, and pirate IP addresses blocked. But are modern pirates so simple and will they give up? How to know.

    Also popular now: