Connect with us

Hi, what are you looking for?

Business

Choppy waters: Port of Houston cyberattack

The attack began after hackers triggered a flaw with place webshells, which enable the adversary to conduct post-exploitation activities.

Photo: © AFP
Photo: © AFP

The Port of Houston was the target of a cyberattack during August 2021 (and reported in late September). While the attack was thwarted, it raises issues relating to cybersecurity within companies as well as the continuing rise in different forms of attacks.

According to the authorities: “Port Houston followed its Facilities Security Plan in doing so, as guided under the Maritime Transportation Security Act (MTSA), and no operational data or systems were impacted as a result.”

The attack began after hackers triggered a flaw with place webshells, which enable the adversary to conduct post-exploitation activities, such as compromising administrator credentials, conducting lateral movement, and exfiltrating registry hives and Active Directory files.

A major cyberattack on a port like this (which is the largest port in the U.S.) could have the ability to upend multiple supply chains.

Looking at the incident for Digital Journal is Paul Martini, the CEO of cloud cybersecurity company iboss. Martini recommends that the time is here for organizations to get smarter and to develop systems to shut the virtual doors so that hackers do not exploit the easy way in use for these types of attacks.

Martini, is from the U.S., explains the threat: “We’ve learned of attacks aimed at organizations critical to our nation’s food supply as well as to one of the country’s busiest ports.”

In terms of who is behind such attacks, including  the Port of Houston, Martini pinpoints nation-state actors.

Rogue actors have had an easier time due to the pandemic as many workplaces have been distracted with other demands. Martini notes: “The global supply chain teeters dangerously close to breaking down due to COVID-19 and if a cyberattack like the one aimed at the Port of Houston succeeds, catastrophic results including shortages of food, consumer goods and critical materials could follow.” In terms of formulating a response, Martini recommends: “Private organizations and the government need to get a hold of this problem by starting to improve defenses that can shut the doors bad actors use to access networks, this starts with securing the Internet connections used by remote workers that hackers often try to exploit.”

Avatar photo
Written By

Dr. Tim Sandle is Digital Journal's Editor-at-Large for science news. Tim specializes in science, technology, environmental, business, and health journalism. He is additionally a practising microbiologist; and an author. He is also interested in history, politics and current affairs.

You may also like:

Business

American AI developer Anthropic plans to "lay the risks out on the table" even as it restricts deployment of a new model dubbed Mythos.

Tech & Science

A push to reduce reliance on foreign compute and give researchers access to more power

Tech & Science

Since the human brain is five orders of magnitude more energy efficient than a digital computer, it makes sense to look to the brain...

Business

New peer-reviewed research finds that actively questioning and refining AI output, not avoiding it, is what keeps people's reasoning sharp.