Colonial-Level Cyberattack On Trucking Likely – But Preventable
In case they needed one, the transportation and logistics industry got a reminder — in the form of the ransomware attack on Colonial Pipeline — of the kind of havoc hackers can wreak on businesses and their customers. The shutdown of a vital supplier of the diesel that keeps trucks moving could just as easily have happened to a major truckload carrier or any other company in the supply chain. And chances are a catastrophic attack will hit the industry — again. In 2020, the big ones struck Forward Air (NASDAQ: FWRD ) and CMA CGM, causing widespread disruption to their complex operations. Meanwhile smaller companies keep getting hit on a regular basis. "The trucking and logistics industry is an attractive target because many of its customers are expecting deliveries," Jérôme Segura, director of threat intelligence at Malwarebytes, told FreightWaves in an email. Ransomware attacks have been around for years. They involve malware that infiltrates a system or systems and then encrypts data.
Colonial-Level Cyberattack On Trucking Likely – But Preventable
In case they needed one, the transportation and logistics industry got a reminder — in the form of the ransomware attack on Colonial Pipeline — of the kind of havoc hackers can wreak on businesses and their customers. The shutdown of a vital supplier of the diesel that keeps trucks moving could just as easily have happened to a major truckload carrier or any other company in the supply chain. And chances are a catastrophic attack will hit the industry — again. In 2020, the big ones struck Forward Air (NASDAQ: FWRD ) and CMA CGM, causing widespread disruption to their complex operations. Meanwhile smaller companies keep getting hit on a regular basis. "The trucking and logistics industry is an attractive target because many of its customers are expecting deliveries," Jérôme Segura, director of threat intelligence at Malwarebytes, told FreightWaves in an email. Ransomware attacks have been around for years. They involve malware that infiltrates a system or systems and then encrypts data.