Skip to content
Search AI Powered

Latest Stories

Press releases are provided by companies as is and have not been edited or checked for accuracy. Any queries should be directed to the company issuing the release.

Resilience360: How Hackers Leverage COVID-19 to Disrupt Supply Chain Operations

As the COVID-19 pandemic shows little sign of wavering, commercial IT vulnerabilities that were created, exposed, or accentuated by new global health circumstances have also crystallized rather than subsided.

Resilience360: How Hackers Leverage COVID-19 to Disrupt  Supply Chain Operations

Over the past month, Resilience360 has recorded cyberattacks on major manufacturers in the automotive, aerospace, and health & life sciences industries, among others. As the COVID-19 pandemic shows little sign of wavering, commercial IT vulnerabilities that were created, exposed, or accentuated by new global health circumstances have also crystallized rather than subsided.

“The COVID-19 working environment has created new IT vulnerabilities and has accentuated known vulnerabilities for commercial enterprises,” said Daniel Boccio, Risk Intelligence Analyst, Resilience360. “Attacks on maritime and offshore energy enterprises have increased four-fold, compounding damage to businesses that were already confronting market shocks. This has spared no industry; even critical life sciences and healthcare facilities and institutions have found themselves the victims of attacks, despite pacts by some ransomware groups to spare them from targeting.”


“Once a commercial IT network has been compromised, hackers may be able to steal sensitive information in a data breach or shut down systems operations until a ransom is paid,” continued Boccio. “One can expect exploitation of the pandemic in cyberspace to include, but not be limited to, phishing, exploits with refined lures to either exploit information or install malware, or to exploit vulnerabilities in minimally populated and/or remote workplaces.”

Below, Resilience360 details the two methods of exploitation that are most commonly being employed to disrupt commercial IT networks during the COVID-19 pandemic.

Phishing:
The most common method utilized by hackers to compromise IT networks, phishing. Phishing involves the impersonation of legitimate governmental, business, or personal entities in order to “fish” for a victim that will enable access to a network. This is often facilitated by tricking the victim into clicking a dubious link with malicious software — malware — embedded. Hackers often include information of public or personal interest to increase open and click rates. With the emergence of the COVID-19 pandemic, hackers have seized the opportunity to develop “phishing lures” designed to exploit strong public demand for updates on the constantly evolving global health situation, accentuating the risk of attack by this method.

Remote and office workstation security exploits:
The rapid transition to remote, digital workstation solutions and the corresponding decrease in activity at office workstations have generated new vulnerabilities for commercial enterprises. In a physical sense, below-average volumes of workers on-site create new opportunities for security breaches. Absences from stationary workstations or server rooms, or even the open display of PII, FI, and credentials around an office, can create an untold number of opportunities for an intruder or unauthorized visitor to compromise business systems.

To combat these tactics, Resilience360 recommends that customers work with their suppliers on the following measures:

● Maintain data backups: Supply chain managers can work with suppliers to verify or stipulate that they are maintaining system backups. Regular and thorough backups are the best mitigation against ransomware, regardless of inclination to pay. As a best practice, companies which maintain ongoing, comprehensive backup programs create an effective “mirror” of current operations, enabling them to quickly jump to a parallel system in the event of an attack.
● Know your defenses: Mindful that customers will be challenged to assess cybersecurity across the entirety of an organization, firewall and vulnerability mitigation should be prioritized for those with not only the greatest access to the customer’s host network, but also for those with the greatest exposure to threats. This measure of exposure includes factors such as industrial control systems known to be vulnerable, or location or in an industry known to be a frequent target for attacks. Keeping abreast of the latest threats that target backups can further enhance an organization’s defense posture.
● Enhance physical security: Verify that suppliers have adequate measures in place to protect office environments from compromise. While offices remain below normal occupancy, customers should ensure that supplier facilities have secured any physical documents with potentially compromising PII, FI, and credentials to reduce exposure.
● Synchronize threat preparation and response: Ensure that suppliers have business continuity in place should a cyberattack occur. Such preparation to enhance coordination and minimize confusion in the event that a crisis strikes can allow all parties involved to save time and act in unison to maintain supply chain agility.
● Know the systems of your suppliers: Awareness of technological tools, hardware, equipment, and operational systems of suppliers can empower those responsible for information security on your team to anticipate potential disruptions and take a proactive role in helping supply chain managers to mitigate threats amongst suppliers.
● Ensure social engineering awareness: Collaborate with IT partners to conduct realistic, frequent, and varied phishing testing at the supplier level and across the supplier network in order to identify vulnerabilities and reduce to the greatest extent possible the threat field that a potential hacker can exploit. Maintain information-sharing relationships with appropriate law-enforcement bodies to further enhance awareness and protection and encourage suppliers to do the same. Supply chain managers must also collaborate with IT teams to determine impact to a disrupted business, obligations to maintain cybersecurity, and standards to maintain, such as ISO/IEC 20071/2.

For a complete list of all of Resilience360’s COVID-19 supply chain research, please visit https://www.resilience360.dhl.com/coronavirus-supply-chain-resources/.

https://www.resilience360.dhl.com/wp-content/uploads/2020/08/20200806_COVID-19-Pandemic-creates-opportunity-for-innovative-cyber-threat-campaigns.pdf

The Latest

More Stories

HTL Freight Acquires CTS Logistics, Expanding into Managed Transportation

HTL Freight Acquires CTS Logistics, Expanding into Managed Transportation


September 24th, Charlotte, NC - HTL Freight, a rising leader in the third-party logistics (3PL), is pleased to announce the acquisition of CTS Logistics, a full-service managed transportation company (4PL) headquartered in Windham, NH. This acquisition, HTL Freight’s fourth major transaction since 2021, reinforces its commitment to delivering exceptional freight solutions across North America.

Keep ReadingShow less

Featured

ETIHAD CARGO celebrates 20 years of successful operations in India

ETIHAD CARGO celebrates 20 years of successful operations in India

Abu Dhabi, United Arab Emirates – Etihad Cargo, the cargo and logistics arm of Etihad Airways, is celebrating 20 years of operations in India, a milestone that reflects the airline's ongoing commitment to the Indian market since its first flight to Mumbai on 26 September 2004. Over the years, Etihad Cargo has expanded its presence in India, now offering belly hold capacity via nonstop services between Abu Dhabi and 12 major Indian cities, with plans for further growth.

Etihad Cargo handles over 46,000 tonnes of cargo annually ex India, connecting the country to over 100 global destinations via its Abu Dhabi hub via 588 widebody and narrowbody rotations each month. To meet the needs of specific sectors, Etihad Cargo has enhanced its product range, adding new features and launching new products. Key commodities handled include electronics, including mobile phones and semiconductors, garments, pharmaceuticals, perishables, e-commerce, automobile components and courier shipments, reflecting the diversity and strength of India's manufacturing and export sectors.

Keep ReadingShow less

Xtreme Trucking selects HOPTEK’s Dispatch Engine® solution forreal-time visibility and optimization of fleet operations

Charlotte NC, September 23, 2024 (McLeod User Conference ) – HOPTEK, a global leader in AI-driven trucking and fleet transportation solutions, has been selected by Xtreme Trucking of Wisconsin, one of the U.S.’s leading technology-first transportation and logistics providers, for its Dispatch Engine® solution, a digital platform providing instant visibility and access to the spot load market, while matching available carrier capacity across thousands of possible options. HOPTEK’s “digital twin” will provide real-time visibility and enable Xtreme to boost operational efficiency and fleet utilization, while reducing driver turnover and deadhead miles, resulting in material cost savings and profitability.

Started as a small independent operation in 2006, Xtreme Trucking was formally established in 2009 to become a quality diversified transportation provider, with a growing revenue profile and extensive coverage across the United States. Through HOPTEK’s Dispatch Engine®, Xtreme has leveraged real-time data visibility and dynamic decision-making to drive operational velocity to achieve up to a 20% increase in both Revenue per Hour and Weekly Revenue Miles per Driver – a clear competitive advantage.

Keep ReadingShow less
Nulogy and Kinaxis Announce Partnership to Accelerate Synchronization for Manufacturing Supply Chain

Nulogy and Kinaxis Announce Partnership to Accelerate Synchronization for Manufacturing Supply Chain

Nulogy, a leading provider in supply chain collaboration solutions, and Kinaxis, a global leader in supply chain orchestration, have announced a partnership to develop cutting-edge solutions for brand manufacturing supply chain networks worldwide.

The new partnership aims to catalyze fast-moving consumer goods (FMCG) and life science brands and their supplier networks to work together more effectively through digital transformation solutions, thereby mutually improving costs, service and revenue. Combining the supply chain orchestration capabilities of Kinaxis with the collaborative external manufacturing specialization of Nulogy will enable customers to share forecasts and order information with suppliers and receive inventory capacity information faster.

Keep ReadingShow less
ULINE AWARDED DAYTON FREIGHT FOR EXCEPTIONAL PERFORMANCE

ULINE AWARDED DAYTON FREIGHT FOR EXCEPTIONAL PERFORMANCE

FOR IMMEDIATE RELEASE
Contact: Sherri Bosslet
Title: Director of Customer Relations
Phone: 937.415.1715
Email: sbosslet@daytonfreight.com
Date: September 5, 2024
Web: daytonfreight.com

ULINE AWARDED DAYTON FREIGHT FOR EXCEPTIONAL PERFORMANCE
DAYTON, Ohio – Dayton Freight Lines, Inc., a leading provider of regional less-than-truckload (LTL) transportation services, was presented the 2023 Exceptional Performance Award and the Minnesota LTL Carrier of the Year award from Uline.

Keep ReadingShow less