Skip to content
Search AI Powered

Latest Stories

CYBER SECURITY

Supply chain looks to cyber self-defense

Hackers are targeting transportation firms as the industry embraces digitalization, the IoT, and smartphone apps. But there are protective steps these firms can take, experts say.

Padlock in cyberspace

Computer hackers loom large in newspaper headlines and Hollywood movies, but transportation and supply chain workers haven’t traditionally seen them as a real threat. After all, driving a truck or a forklift meant you were seldom even near a computer keyboard, and there’s nothing digital about booking freight loads using a clipboard and a phone.

However, in the past five years, the logistics industry has been awash in cybertrends like supply chain digitalization, the Internet of Things (IoT), and the expanded use of electronic logging devices (ELDs), not to mention the smartphones that most Americans carry in their pockets or purses these days.


Hackers have taken notice, and in recent months, they’ve rung up a string of successful attacks on supply chain stalwarts such as the digital freight broker truckstop.com, ocean carrier Mediterranean Shipping Co. (MSC), freight brokerage Total Quality Logistics (TQL), Australian third-party logistics services provider Toll Group, and transportation provider Roadrunner Transportation Systems Inc.

Most of those attacks used “ransomware” to lock down the victims’ computer networks, hobbling their logistics operations until they cracked the code or paid a ransom to the data-kidnappers. As a rule, the targets of these cybercriminals do not disclose the details of the extortion to avoid encouraging future attacks.

The financial damage aside, the mere act of freezing a company’s operations for a few days can damage the victim’s reputation. Even the names of the bugs and viruses deployed by hackers sound frightening, including malware like Azorult, Hawkeye, Kwampirs, Locky, Lokibot, Nanocore, Netwired, Remcos, and Shamoon.

Despite the growing danger posed by cyberthreats, logistics firms can follow some basic rules to greatly reduce their exposure, such as educating employees, putting proper network controls in place, and creating disaster recovery plans.

PROTECT THE WEAKEST LINK

One way companies can protect themselves is by defining a single set of best practices for all employees, regardless of their role in the organization, says Chris Sandberg, vice president of information security for supply chain technology company Trimble Transportation.

Trimble, a provider of fleet management and transportation management software, says many of its clients rely on a compex IT (information technology) infrastructure in their daily operations, noting that a typical logistics service provider might have servers in its back office, telematics hardware on its trucks, and cloud-based networks used to manage maintenance and other critical tasks. “It’s important to have that standard so the same … controls are in place across all the different [types] of technology a customer might be using, because a chain is only as strong as its weakest link,” Sandberg says.

Another critical step in cyber self-defense is to establish a recovery plan before a problem ever develops. “The best time to develop your disaster plan is not during the disaster,” Sandberg says. “If you’re a trucking company and you get stuck with a crypto-lock virus, how do you continue operations? If you’ve identified certain elements as critical resources, you can come up with mitigation strategies.”

As logical as that might sound, smaller carriers often lack the resources to prepare disaster recovery plans ahead of time, Sandberg says. On top of that, they frequently lack the IT capabilities to distinguish between “white hat” hackers—who are basically using their skills to help companies identify their digital vulnerabilities—and “black hat” hackers who are plotting serious crimes, Sandberg says. A cybercriminal looking for a big payout might threaten a company by freezing its data and demanding a ransom, by stealing and selling a company’s data, or by collecting demographic information on its employees in an attempt to hire them away.

In many cases, an employee won’t even realize that they’ve become the victim of a hack until it’s too late, he says. “If someone sends out an email with malware links, they’re not targeting someone; it’s indiscriminate. They’re just trying to get someone to click on the link so they can freeze the account and get them to pay a ransom,” he says.

In another approach, a hacker might target truck drivers by offering them a free smartphone app that provides discounts on food and fuel, for example. That sounds harmless at first, but all data has value, Sandberg says. “Most people don’t read the disclaimers before they download an app,” he says. “Then, the hacker can scrape demographic information from them [and share it with] competing carriers. With the driver shortage, those carriers could use that information to target their advertising to a specific population of drivers and hire away those employees.”

For operations facing such threats, the best defense is education, says Jane Jazrawy, CEO of CarriersEdge, a provider of online driver-training platforms. And that’s become particularly important since the onset of the Covid-19 pandemic, which has made supply chain firms even more vulnerable to cyberthreats, she says.

What’s made them more vulnerable is the widespread adoption of work-from-home policies designed to curb the spread of the virus, Jazrawy explains. In the past few months, thousands of logistics professionals have migrated from the traditional office to the home office, leaving the safety of the corporate IT infrastructure and logging onto personal laptops using home data networks that are seldom up to date.

“Networks at home don’t have the same firewalls and protection” as at work, Jazrawy says. “You may not have a password on your router. Or you may be using your neighbor’s Wi-Fi, or you haven’t updated Norton Antivirus for three years. So as everybody goes home to work, the hackers are coming. They’re just itching to go; it’s like Christmas for hackers.”

“WE’RE ALL TECH WORKERS NOW”

The supply chain sector has also become more vulnerable to security breaches because fleets today share their data with more partners than ever before in order to provide real-time shipment visibility. “When a customer sends data to a trucking company, a whole chain of data then moves between the dispatcher, planner, loadboards, truck stops, drivers, and more,” Jazrawy says.

As supply chain companies enter the computer age, they need to be aware they are now moving data as well as freight, and criminals see both as valuable targets. “People in the transportation industry don’t think of themselves as technology workers; they don’t think they’re important enough that anyone would want their data,” she says. “But hackers are usually just trying to get their data so they can use it to get even more data and then commit a larger, more profitable crime.”

In order to protect themselves, companies must guard against two types of risk: technological and human. “Most hackers are not so much trying to use technology, but to use social engineering,” Jazrawy says. “If you can get someone to cough up their password, that’s way easier than trying random passwords forever until you get into their system.”

Computer users can defend themselves against those threats by studying the risks and staying vigilant, she says. Most social engineering—or “phishing” attacks—use psychological tactics, preying on fear, greed, or some other human emotion. “So now we’re seeing all these Covid-19 email messages that are playing on fear,” Jazrawy says. “But it’s usually phishing; saying ‘Click here and we’ll solve all your problems.’”

If a transportation worker does click on one of those links by mistake, they should follow two simple steps, she says: First, don’t panic, and second, disconnect from the network—whether it’s a cord or Wi-Fi—and run a virus scan to identify any malware that might have been installed.

Cybercrime in the supply chain sector is definitely on the rise. But across the industry, IT experts agree that there are steps logistics company leaders can take to protect their operations from hackers, including educating employees and putting proper network controls in place. “The more you know and are aware and are vigilant,” Jazrawy says, “[the better your chances of avoiding] the threat.”

The Latest

More Stories

person using AI at a laptop

Gartner: GenAI set to impact procurement processes

Progress in generative AI (GenAI) is poised to impact business procurement processes through advancements in three areas—agentic reasoning, multimodality, and AI agents—according to Gartner Inc.

Those functions will redefine how procurement operates and significantly impact the agendas of chief procurement officers (CPOs). And 72% of procurement leaders are already prioritizing the integration of GenAI into their strategies, thus highlighting the recognition of its potential to drive significant improvements in efficiency and effectiveness, Gartner found in a survey conducted in July, 2024, with 258 global respondents.

Keep ReadingShow less

Featured

Report: SMEs hopeful ahead of holiday peak

Report: SMEs hopeful ahead of holiday peak

Businesses are cautiously optimistic as peak holiday shipping season draws near, with many anticipating year-over-year sales increases as they continue to battle challenging supply chain conditions.

That’s according to the DHL 2024 Peak Season Shipping Survey, released today by express shipping service provider DHL Express U.S. The company surveyed small and medium-sized enterprises (SMEs) to gauge their holiday business outlook compared to last year and found that a mix of optimism and “strategic caution” prevail ahead of this year’s peak.

Keep ReadingShow less
retail store tech AI zebra

Retailers plan tech investments to stop theft and loss

Eight in 10 retail associates are concerned about the lack of technology deployed to spot safety threats or criminal activity on the job, according to a report from Zebra Technologies Corp.

That challenge is one of the reasons that fewer shoppers overall are satisfied with their shopping experiences lately, Lincolnshire, Illinois-based Zebra said in its “17th Annual Global Shopper Study.”th Annual Global Shopper Study.” While 85% of shoppers last year were satisfied with both the in-store and online experiences, only 81% in 2024 are satisfied with the in-store experience and just 79% with online shopping.

Keep ReadingShow less
warehouse automation systems

Cimcorp's new CEO sees growth in grocery and tire segments

Logistics automation systems integrator Cimcorp today named company insider Veli-Matti Hakala as its new CEO, saying he will cultivate growth in both the company and its clientele, specifically in the grocery retail and tire plant logistics sectors.

An eight-year veteran of the Georgia company, Hakala will begin his new role on January 1, when the current CEO, Tero Peltomäki, will retire after a long and noteworthy career, continuing as a member of the board of directors, Cimcorp said.

Keep ReadingShow less
image of board and prevedere software

Board acquires Prevedere to build business prediction platform

The Boston-based enterprise software vendor Board has acquired the California company Prevedere, a provider of predictive planning technology, saying the move will integrate internal performance metrics with external economic intelligence.

According to Board, the combined technologies will integrate millions of external data points—ranging from macroeconomic indicators to AI-driven predictive models—to help companies build predictive models for critical planning needs, cutting costs by reducing inventory excess and optimizing logistics in response to global trade dynamics.

Keep ReadingShow less