Skip to content
Search AI Powered

Latest Stories

Press releases are provided by companies as is and have not been edited or checked for accuracy. Any queries should be directed to the company issuing the release.

Resilience360: How Hackers Leverage COVID-19 to Disrupt Supply Chain Operations

As the COVID-19 pandemic shows little sign of wavering, commercial IT vulnerabilities that were created, exposed, or accentuated by new global health circumstances have also crystallized rather than subsided.

Resilience360: How Hackers Leverage COVID-19 to Disrupt  Supply Chain Operations

Over the past month, Resilience360 has recorded cyberattacks on major manufacturers in the automotive, aerospace, and health & life sciences industries, among others. As the COVID-19 pandemic shows little sign of wavering, commercial IT vulnerabilities that were created, exposed, or accentuated by new global health circumstances have also crystallized rather than subsided.

“The COVID-19 working environment has created new IT vulnerabilities and has accentuated known vulnerabilities for commercial enterprises,” said Daniel Boccio, Risk Intelligence Analyst, Resilience360. “Attacks on maritime and offshore energy enterprises have increased four-fold, compounding damage to businesses that were already confronting market shocks. This has spared no industry; even critical life sciences and healthcare facilities and institutions have found themselves the victims of attacks, despite pacts by some ransomware groups to spare them from targeting.”


“Once a commercial IT network has been compromised, hackers may be able to steal sensitive information in a data breach or shut down systems operations until a ransom is paid,” continued Boccio. “One can expect exploitation of the pandemic in cyberspace to include, but not be limited to, phishing, exploits with refined lures to either exploit information or install malware, or to exploit vulnerabilities in minimally populated and/or remote workplaces.”

Below, Resilience360 details the two methods of exploitation that are most commonly being employed to disrupt commercial IT networks during the COVID-19 pandemic.

Phishing:
The most common method utilized by hackers to compromise IT networks, phishing. Phishing involves the impersonation of legitimate governmental, business, or personal entities in order to “fish” for a victim that will enable access to a network. This is often facilitated by tricking the victim into clicking a dubious link with malicious software — malware — embedded. Hackers often include information of public or personal interest to increase open and click rates. With the emergence of the COVID-19 pandemic, hackers have seized the opportunity to develop “phishing lures” designed to exploit strong public demand for updates on the constantly evolving global health situation, accentuating the risk of attack by this method.

Remote and office workstation security exploits:
The rapid transition to remote, digital workstation solutions and the corresponding decrease in activity at office workstations have generated new vulnerabilities for commercial enterprises. In a physical sense, below-average volumes of workers on-site create new opportunities for security breaches. Absences from stationary workstations or server rooms, or even the open display of PII, FI, and credentials around an office, can create an untold number of opportunities for an intruder or unauthorized visitor to compromise business systems.

To combat these tactics, Resilience360 recommends that customers work with their suppliers on the following measures:

● Maintain data backups: Supply chain managers can work with suppliers to verify or stipulate that they are maintaining system backups. Regular and thorough backups are the best mitigation against ransomware, regardless of inclination to pay. As a best practice, companies which maintain ongoing, comprehensive backup programs create an effective “mirror” of current operations, enabling them to quickly jump to a parallel system in the event of an attack.
● Know your defenses: Mindful that customers will be challenged to assess cybersecurity across the entirety of an organization, firewall and vulnerability mitigation should be prioritized for those with not only the greatest access to the customer’s host network, but also for those with the greatest exposure to threats. This measure of exposure includes factors such as industrial control systems known to be vulnerable, or location or in an industry known to be a frequent target for attacks. Keeping abreast of the latest threats that target backups can further enhance an organization’s defense posture.
● Enhance physical security: Verify that suppliers have adequate measures in place to protect office environments from compromise. While offices remain below normal occupancy, customers should ensure that supplier facilities have secured any physical documents with potentially compromising PII, FI, and credentials to reduce exposure.
● Synchronize threat preparation and response: Ensure that suppliers have business continuity in place should a cyberattack occur. Such preparation to enhance coordination and minimize confusion in the event that a crisis strikes can allow all parties involved to save time and act in unison to maintain supply chain agility.
● Know the systems of your suppliers: Awareness of technological tools, hardware, equipment, and operational systems of suppliers can empower those responsible for information security on your team to anticipate potential disruptions and take a proactive role in helping supply chain managers to mitigate threats amongst suppliers.
● Ensure social engineering awareness: Collaborate with IT partners to conduct realistic, frequent, and varied phishing testing at the supplier level and across the supplier network in order to identify vulnerabilities and reduce to the greatest extent possible the threat field that a potential hacker can exploit. Maintain information-sharing relationships with appropriate law-enforcement bodies to further enhance awareness and protection and encourage suppliers to do the same. Supply chain managers must also collaborate with IT teams to determine impact to a disrupted business, obligations to maintain cybersecurity, and standards to maintain, such as ISO/IEC 20071/2.

For a complete list of all of Resilience360’s COVID-19 supply chain research, please visit https://www.resilience360.dhl.com/coronavirus-supply-chain-resources/.

https://www.resilience360.dhl.com/wp-content/uploads/2020/08/20200806_COVID-19-Pandemic-creates-opportunity-for-innovative-cyber-threat-campaigns.pdf

The Latest

More Stories

Mitsubishi Logisnext Americas Group Announces UniCarriers® Forklifts’ Premier Club Winners for 2024

MARENGO, Ill. (Feb. 19, 2025)Mitsubishi Logisnext Americas, the exclusive manufacturer and provider of UniCarriers® Forklifts across North, Central and South America, proudly announces the winners of its Premier Club Awards for2024. This prestigious program honors the top nine UniCarriers Forklifts dealers throughout the Americas who exemplify the brand’s commitment to excellence, performance and customer satisfaction.

Each year, Premier Club winners set the highest standards in dealership professionalism, consistently exceeding expectations in market performance, aftermarket parts sales, new equipment sales, and overall service quality. Their dedication to innovation and reliability continues to elevate the UniCarriers brand and inspire the entire dealer network.

Keep ReadingShow less

Featured

photo of exotec as/rs

Exotec Launches Next Generation of Skypod System, an All-in-One Robot-Based AS/RS

Atlanta, GA, Feb 6, 2025 - Today Exotec®︎, a global warehouse robotics provider, announced the commercial launch of the Next Generation of Skypod®︎ system with higher performance, improved storage density, and advanced software features.

The Next Generation of Skypod comes with a number of design improvements including a new and more compact Skypod robot, a workstation for robot-to-robot picking, high-throughput Exchanger, and denser storage. These redesigns combined with new software features improve the throughput at a single workstation by 50% while also enhancing storage density up to 30% compared to the previous generation.

Keep ReadingShow less

Vanderlande to Showcase How to Automate Your Warehouse Success at ProMat 2025

ATLANTA– February 5, 2025Vanderlande, the global partner for future-proof warehouse solutions, today invited ProMat 2025 attendees to visit booth #S1503 to learn more about the fully integrated technologies, best-of-breed solutions and comprehensive services available to warehousing operations regardless of where they are in their automation journeys. Vanderlande experts will also present two interactive conference seminars that will draw on real-world examples and lessons learned to show attendees how they can successfully deploy automation for the faster and more efficient warehousing needed to stay competitive and thrive.

Known for providing leading global brands with the most advanced distribution centers (DCs), Vanderlande offers the fully-integrated and comprehensive suite of solutions dynamic retailers, including omnichannel brands and e-commerce companies in the general merchandise, apparel and food sectors, need to excel. The company’s automation technologies encompass the systems, software, robotics and services needed to optimize throughput, order accuracy and storage capacity in the most demanding fulfillment and store replenishment operations.

Keep ReadingShow less

Warp Announces Preparation for U.S. Government Partnership to Enhance Service and Efficiency

Los Angeles, CA, Jan. 29, 2025 (GLOBE NEWSWIRE) -- Warp, a tech-powered network of cross-docks and carriers offering various vehicle sizes, announced that 2025 it will extend its solutions and services to the U.S. government. Warp aims to modernize government freight logistics with machine-learning-driven planning, optimized network strategies, and flexible solutions to create efficient, cost-effective, and sustainable supply chain transportation.

Focused on optimizing every load, every time, Warp employs machine learning (ML), artificial intelligence (AI), and groundbreaking consolidation techniques to blur the traditional lines of freight shipping by combining the best elements of LTL, FTL, and parcel delivery. Using its homogenous fleet including cargo vans, sedans, box trucks, and 53-foot trailers, Warp facilitates carrier injections, inbound vendor consolidation, pool point distribution, zone-skipping, store replenishment, and national retail distribution for some of the world’s largest shippers.

Keep ReadingShow less
Toyota Material Handling MidSouth’s Forklift Donation Raises $40,000 for Higher Education

Toyota Material Handling and Toyota Material Handling MidSouth partner to donate 5,000-pound-capacity pneumatic forklift at Concrete Industry Management’s annual charity auction.

Photo courtesy of Toyota Material Handling

Toyota Material Handling MidSouth’s Forklift Donation Raises $40,000 for Higher Education

LAS VEGAS, Jan. 28, 2024 – Toyota Material Handling MidSouth, a full-service dealer for Toyota Material Handling, showcased its dedication to fostering the next generation of industry professionals by donating a 5,000-pound-capacity Toyota Core IC Pneumatic forklift to the Concrete Industry Management’s (CIM) annual charity auction on January 22.

The forklift’s winning bid of $40,000 significantly contributed to the auction’s total proceeds of $2.15 million, supporting CIM’s mission to address the growing demand for skilled professionals in the concrete industry. Offered at five universities, CIM equips students with technical, communication and management expertise, preparing them for successful careers in a rapidly evolving industry. Proceeds from the auction are used to assist CIM in funding higher education programs that offer degrees in concrete industry management.

Keep ReadingShow less