Port of Seattle Hacked - Future Compromised
Barry Hurd
Fractional Chief Digital Officer. Data & Intelligence. (CDO, CMO, CINO) - Investor, Board Member, Speaker #OSINT #TalentIntelligence #AI #Analytics
Imagine checking your flight status one morning only to find the Sea-Tac Airport website (PortSeattle.org) completely down, displaying nothing but a cryptic “404 Error.†Your emails to customer service bounce back, phone lines are jammed, and you have no idea if your flight is on time or delayed. This wasn't just a technical glitch—outside of human casualties this was one of the Port of Seattle’s worst cyber nightmares unfolding in real-time.
In a world increasingly reliant on digital infrastructure, the recent cyberattack on the Port of Seattle didn’t just disrupt a website; it exposed just how vulnerable the core systems that keep one of the country’s busiest airports running are. But how could something like this happen so fast? How could hackers slip past what we assume to be robust defenses and cripple systems on such a massive scale?
Most likely human error. Security professionals know employees are the weakest link.
This article delves into one of the more likely scenarios the Port of Seattle may be grappling with, based on real data and technical records. It examines how cyber attackers possibly infiltrated the airport's systems, impersonating key employees to exploit vulnerabilities and progressively weaken the airport's layered defenses. By accessing sensitive systems and bypassing crucial protections, the attackers managed to cripple operations, shutting down systems across more than 40 subdomains and leaving thousands of passengers stranded. As the aviation industry reeled from the disruption, critical questions emerged: Could the breach have been prevented, and what does it mean for the future of airport cybersecurity globally?
Buckle in, because this isn’t just a story of a website going down—it’s a wake-up call for every critical infrastructure system reliant on the internet.
Disclaimer:
I have no inside knowledge of the specific details surrounding the recent cyberattack on the Port of Seattle. The scenario described and analysis provided is one hypothetical explanation based upon the facts related to the change of settings on the domain, having a non-resolving domain for multiple days, a disclosed series of phishing campaigns, and based on my decades of experience in technology and cybersecurity, as well as an understanding of how attackers typically exploit vulnerabilities to compromise organizations. This article is intended to offer insight into the various ways such attacks can unfold and the potential vectors attackers may use. All information is speculative and should not be construed as a factual account of the ongoing situation (until they confirm why someone changed a critical web architecture item.)
The Port of Seattle is a major maritime and aviation hub located in the U.S. state of Washington, responsible for overseeing Seattle-Tacoma International Airport (Sea-Tac) and a variety of marine terminals, marinas, and cargo-handling facilities. Established in 1911, the Port is integral to both the local economy and global trade, handling a significant portion of the Pacific Northwest’s cargo shipping and passenger travel. It operates through a variety of businesses, including cruise terminals and real estate holdings. *In 2023, Seattle-Tacoma International Airport (Sea-Tac) served 50,887,260 passengers.
The Domain: The Lynchpin of the Attack
When it comes to high-profile cyberattacks, it’s easy to think of hackers exploiting weak passwords or unpatched software. But in the case of the Port of Seattle hack, the true vulnerability lay in a far more unexpected place: the domain name registration. While many systems have been fortified with two-factor authentication and encryption, domain control often remains a weak link—an oversight with catastrophic potential.
At the core of any organization’s digital footprint is its domain name. This is the gateway to every email sent, every website visited, and every internal system linked to it. For a major hub like PortSeattle.org, controlling the domain means having the keys to the kingdom. In this attack, hackers first gained control of the port's domain registration, granting them unprecedented access to every platform linked to the domain.
By hijacking the domain, the attackers were able to issue new email credentials, impersonating trusted employees and sending legitimate-looking emails. This is where things took a darker turn. With these new credentials, the hackers began resetting login information for critical systems, bypassing security through what seemed like valid, authorized requests.
Once in control, they moved swiftly to disable security measures on systems that lacked two-factor authentication. This allowed them to infiltrate core operations, including email, webmail, and cloud-based platforms. Every part of the organization that relied on the compromised domain—whether for web hosting or internal communication—was now under the attackers' control.
The domain acted as the single point of failure, demonstrating just how fragile the digital infrastructure of even the most secure organizations can be when this critical component is compromised. With access to domain control, attackers could not only infiltrate systems but completely disable them. And that’s exactly what happened: before anyone could react, hackers rerouted network traffic, shut down servers, and left the port's website and subdomains showing only a 404 error.
This attack highlights a dark reality: domain control is one of the most overlooked aspects of cybersecurity. Even the most advanced firewalls and intrusion detection systems can’t protect against an attack if the domain—the very identity of the organization—is seized by malicious actors. In the cyberattack on the Port of Seattle, the hijacking of the domain name system (DNS) was the turning point that enabled attackers to fully compromise multiple systems. The attackers altered the nameservers associated with the domain, changing them from their original settings on AWS to temporary ones— ns10.worldnic.com and ns9.worldnic.com —for three days. This seemingly small change had profound implications for the port's infrastructure and operations.
Why the Domain and Nameservers Matter
A domain's nameservers are essentially its navigation guides. They resolve the domain (e.g., portseattle.org ) into its underlying IP addresses that tell web browsers, email clients, and other services where to connect. When a domain's nameservers are changed, it reroutes all internet traffic associated with that domain to the new server locations. This means that websites, email servers, and subdomains relying on the original nameservers can no longer function properly unless they are updated to point to the new locations.
In the case of the Port of Seattle, changing the nameservers from AWS DNS (Amazon Web Services, known for robust infrastructure) to WorldNIC nameservers likely had several major consequences:
- Redirection of Traffic: By switching the nameservers, attackers could reroute all web traffic and email communications to their own controlled servers. This could allow them to intercept sensitive information, such as login credentials or confidential communications, or completely block traffic to cripple operations.
- Email and Web Services Disruption: Any emails sent to @portseattle.org during this period would be affected by the DNS change. Since email systems rely on DNS MX records (which are controlled by the nameservers), the new nameservers could reroute emails to malicious servers, potentially harvesting sensitive data from unsuspecting senders. Additionally, without access to the original nameservers, website traffic to the port’s main site and subdomains would result in 404 errors, as users were unable to resolve the proper IP addresses to access services.
- Subdomain and System Downtime: The port's infrastructure likely includes numerous subdomains for critical services—ranging from internal operations to vendor portals. These subdomains, reliant on the primary domain's DNS settings, would have been taken offline or redirected, severely affecting any internal systems that rely on real-time communication or cloud-based services. Critical systems, including automated baggage handling, security protocols, and internal communications, could have been halted or disrupted, leading to cascading failures throughout the airport's operations.
Nameserver Change Details:
- Before and After the Attack: The original nameservers were hosted on AWS:
- AWS DNS services are highly resilient, offering robust protection, scalability, and redundancy. These DNS settings ensure fast, reliable access to web services, applications, and emails.
- During the Attack (Three Days): The nameservers were changed to:
- By switching to WorldNIC, the attackers likely used a third-party, less secure service to manage the domain's DNS temporarily. This allowed them to completely control where PortSeattle.org traffic was routed. During this period, all traffic could be directed to attacker-controlled infrastructure, giving them full control over email communications and potentially sensitive information from users attempting to access the port's systems.
Technical Implications of the Nameserver Change:
- Denial of Service and Disruption: The change to WorldNIC nameservers effectively cut off access to legitimate services hosted on the original AWS infrastructure. As a result, all services that relied on the domain, including email, internal systems, and websites, became unavailable, displaying 404 errors or routing users to malicious pages.
- Phishing and Credential Theft: With access to the domain's email system through DNS redirection, attackers could have initiated large-scale phishing attacks, sending emails that appeared to be legitimate to internal employees or vendors. These emails could trick recipients into providing login credentials or other sensitive information, further deepening the attack.
- Man-in-the-Middle Attacks: By controlling the DNS routing, the attackers could have conducted man-in-the-middle attacks, intercepting communications between users and the compromised servers. This would allow them to gather valuable data such as login credentials, sensitive communications, and financial transactions.
- Impact on Internal Systems and Subdomains: Subdomains tied to critical internal operations, such as employee portals, supply chain management, or airport systems (e.g., baggage handling, security check-ins), would also go down or be redirected. This could cause major disruptions across airport operations, forcing manual handling of processes typically automated and creating significant bottlenecks and delays.
Restoration and Recovery:
Once the Port of Seattle regained control of its domain and reverted the nameservers back to the original AWS DNS settings, normal traffic routing would have been restored. However, any systems dependent on the integrity of the original DNS may have required further scrutiny to ensure no malicious activity persisted, such as backdoors left by the attackers.
In this attack, the domain’s DNS was the linchpin that allowed hackers to exert control over all web traffic and communications for three days. The ability to change nameservers gave the attackers unfettered access to sensitive systems and crippled critical services. Nameserver changes, though seemingly simple, hold the power to disrupt an entire organization, proving that domain security is one of the most critical, yet sometimes overlooked, aspects of cybersecurity infrastructure.
TIMELINE SCENARIO?
1. Initial Access - Domain Registration Hijacking (before 9:00 AM PST)
Attack Method: The hackers successfully hijacked the PortSeattle.org domain registration. Domain registration is often a soft target, and in this case, weak security protocols allowed attackers to seize control.
Vulnerability Exploited: A lack of sufficient protection for domain registrar accounts, such as weak or reused passwords, possibly combined with social engineering techniques aimed at the domain registrar itself.
Impact: Controlling the domain gave hackers the ability to:
- Redirect traffic to malicious servers.
- Create fake employee email accounts to trick internal and external users into providing sensitive information.
- Issue new email credentials mimicking high-ranking employees, such as IT administrators or executives, to gain trust and escalate their attack.
2. Credential Harvesting - Email Spoofing and Phishing (anytime before 9:15 AM PST)
Attack Method: The attackers used their control over the domain to issue phishing emails to employees and external vendors. By impersonating key staff, they targeted other employees and vendors through email spoofing.
Vulnerability Exploited: Lack of proper email authentication mechanisms, such as SPF, DKIM, and DMARC, allowed email spoofing. These protocols can prevent emails from being forged, but if not properly configured, attackers can send seemingly legitimate emails to trick recipients into revealing login credentials.
Impact:
- Multiple employees’ webmail accounts compromised.
- Hackers gained access to internal systems by resetting login information and capturing sensitive login credentials through phishing links.
3. Privilege Escalation - Reissuing Login Access to Webmail Accounts (anytime before 9:15 AM PST)
Attack Method: Using the compromised email accounts, the attackers initiated password resets for privileged systems, such as HR platforms, financial databases, and other sensitive internal systems.
Vulnerability Exploited: A significant weakness here was the lack of multi-factor authentication (MFA) on privileged systems. Without MFA, the hackers could seamlessly reset passwords via email-based recovery links and gain administrative access.
Impact:
- With admin access, the attackers could override existing security policies.
- Access to internal financial systems and databases allowed them to steal sensitive information and further their control over other systems.
4. Expanding Access - Logins to Systems Without 2FA (anytime before 9:47 AM PST)
Attack Method: The red team began systematically accessing critical systems that lacked two-factor authentication (2FA). This included internal web servers, employee management systems, and cloud platforms.
Vulnerability Exploited: Any system that did not have 2FA enabled became a prime target. Without this layer of security, even basic user credentials would be enough to gain access.
Impact:
- Attackers could install backdoors to maintain persistent access to systems.
- They could begin exfiltrating sensitive customer data and financial records undetected.
- Ransomware or keyloggers could be deployed, setting up for a broader system compromise.
5. Domain Takeover and System Disabling - Name Server Change (9:47 AM PST)
Key Event: The attackers made a critical move at 9:47 AM PST by changing the primary name servers associated with PortSeattle.org. This cut off access to all subdomains, email systems, and any system relying on the primary domain.
Vulnerability Exploited: With full control over the domain, they could alter DNS records and redirect traffic, effectively shutting down the Port of Seattle’s online presence.
Impact:
- All internal email systems, websites, and critical applications that relied on the primary domain were instantly crippled.
- The Port of Seattle was thrown into disarray as key systems went offline, preventing recovery efforts from using normal communication channels.
6. Lateral Movement - Accessing Additional Systems (Domain Control + On-going)
Attack Method: With admin-level privileges and full control of the domain, the hackers initiated lateral movement across the network, using their access to compromise additional systems. They used admin credentials to enter other critical platforms, such as logistics systems, airport infrastructure, and payment gateways.
Vulnerability Exploited: Lack of network segmentation allowed the attackers to move freely between systems. Flat networks make it easier for an attacker to access multiple systems once they’ve compromised one.
领英推è
Impact:
- Attackers could alter logs, disable monitoring, and hide their activity.
- Sensitive data, including customer records and operational information, could be exfiltrated using encrypted channels to avoid detection.
7. Data Exfiltration and Persistent Access (10:00 AM PST and onward)
Attack Method: As systems fell under control, the hackers focused on data exfiltration. They used SSL/TLS tunnels to send data out without triggering alarms and likely embedded stolen data using steganography techniques to further obscure it.
Vulnerability Exploited: Weak egress filtering allowed large volumes of sensitive data to leave the network undetected. The organization lacked strong data loss prevention (DLP) tools to monitor and halt the exfiltration.
Impact:
- Massive data loss could have occurred, including financial details, customer information, and operational records.
The attackers also installed backdoors to ensure long-term access and potentially deploy ransomware or sabotage recovery efforts.
Who is Responsible?
Someone failed to secure a primary asset. The ultimate responsibility of planning for the current and future state of the Port of Seattle resides with the elected Port Commissioners. These officials are responsible for decision-making regarding the port’s operations, security measures, and long-term strategic planning, including how to manage and mitigate the risks of future cybersecurity incidents.
Port of Seattle Commissioners hold significant responsibility for overseeing and ensuring the cybersecurity and resiliency of the supply chain that can be impacted by hacking incidents, although they may not manage day-to-day cybersecurity directly.?
Their roles encompass:
1. Strategic Oversight and Policy-Making
- The Port Commissioners are responsible for setting policies and making strategic decisions to ensure the safety, security, and resiliency of the port, including its critical infrastructure such as cybersecurity systems. As part of their oversight, they approve funding and strategic plans to bolster the port’s resilience against cyber threats, including infrastructure improvements and cybersecurity measures.
2. Supply Chain Resilience
- The port's supply chain operations are highly dependent on secure, efficient systems, especially in a world where much of the logistics are digitized. A hacking incident could disrupt maritime cargo operations, trucking, warehousing, and other elements of the logistics network. Commissioners are tasked with strengthening supply chain resilience, which includes mitigating the effects of disruptions caused by cyberattacks, foreign interference, or natural disasters.
3. Approval of Cybersecurity Investments
- Commissioners approve cybersecurity investments, including upgrades to information technology (IT) and operational technology (OT) systems. This ensures that the port’s infrastructure, from port community systems to freight tracking technologies, is protected from cyber threats. For example, funds might be allocated to ensure the implementation of firewalls, encryption, intrusion detection systems, and employee training programs.
4. Incident Response and Recovery Planning
- While commissioners don’t handle the technical incident response, they are responsible for ensuring that the Port of Seattle has a robust cyber incident response plan. This includes measures to minimize downtime and financial loss, as well as policies that ensure rapid recovery and continuity after a cyberattack.
5. Collaborating with Stakeholders
They work closely with federal agencies like the Coast Guard, DHS (Department of Homeland Security), CISA (Cybersecurity and Infrastructure Security Agency), and industry stakeholders to ensure the port follows best practices for cybersecurity and supply chain resilience. These partnerships are essential for sharing threat intelligence and coordinating responses to emerging cyber threats.
Initial Analysis of the Cyberattack Impact on the Port of Seattle and Sea-Tac Airport
1. Business Interruption
- Website Downtime: Sea-Tac's primary website, with 300,000 daily visitors, has been down for three+ days. This downtime disrupts critical services, including flight bookings, parking, and passenger information. Serving 4.2 million monthly travelers, this affects a significant portion of customers.
- Operational Disruption: The lack of real-time information could increase delays, operational inefficiencies, and passenger dissatisfaction. Such incidents often lead to long recovery times, sometimes lasting weeks or months.
2. Direct Financial Costs
- Incident Response: Immediate costs for investigating, securing, and restoring the website and IT systems include forensic analysis, IT support, and legal consultations, which can be significant.
- Lost Revenue: If 1% of daily website visitors (3,000 transactions/day) typically make $50 purchases (e.g., parking or flight-related services), this results in a loss of $150,000 per day, totaling $450,000 over three days. Indirect losses could come from long-term customer frustration and operational inefficiencies.
3. Operational Disruptions
- Passenger Services: The inability to check in, manage bookings, or access parking reservations online leads to congestion at kiosks and customer service counters. This increases delays, staff hours, and overtime costs.
- Airline Operations: Disrupted access to terminal updates, gate assignments, and communications may cause flight delays and operational inefficiencies, increasing fuel costs, crew management challenges, and compensation claims.
4. Loss of Ancillary Revenues
- Retail and Concessions: Passengers often pre-order food, services, and retail products through the website. The downtime could result in reduced income for concessionaires and lost commissions for the airport.
- Car Rentals and Ground Transportation: Similarly, bookings for car rentals or other services could drop, further impacting the airport's partners and reducing income.
5. Reputational Damage and Customer Loyalty
- Customer Trust: Prolonged operational disruptions could erode customer trust. Frustrated passengers may choose alternative airports or airlines in the future, decreasing bookings.
- Public Relations Costs: Managing the fallout requires significant spending on PR campaigns and crisis management to restore trust. Costs could include social media management, email campaigns, and reputation restoration through external consultants.
6. Increased Customer Support Costs
- Call Center Overload: With self-service options unavailable, there would be an increased volume of calls to customer service, leading to potential overtime for existing staff or hiring of temporary workers. These additional staff costs could increase daily operational expenses by 20-30%.
7. Legal and Regulatory Costs
- Compliance Penalties: If sensitive data (such as personal or financial data) is compromised, regulatory fines under privacy laws like the California Consumer Privacy Act (CCPA) or the General Data Protection Regulation (GDPR) could apply. Fines could range from millions to 4% of annual global revenue.
- Litigation: Legal actions may follow, whether from customers, airlines, or partners, leading to additional settlements and legal fees.
8. Cyber Insurance Impact
- Insurance Premiums: Post-attack, the airport’s cyber insurance premiums could increase significantly. Depending on the scope of the breach, premiums could rise 10-200%, or insurers might demand more robust security measures before renewing coverage.
- Claims Processing: The length and complexity of processing claims might mean delays in receiving reimbursement, and not all costs may be covered under the current policy.
9. Cybersecurity and IT Recovery Costs
- Recovery Efforts: The airport will need to hire cybersecurity experts to investigate the breach, patch vulnerabilities, and upgrade systems. This process, including recovery and securing data, could cost $500,000 to many millions of dollars depending on the breach’s complexity.
- Downtime and Productivity Loss: Recovery efforts might take weeks, during which operational inefficiencies and lost productivity will continue to accumulate.
10. Potential Regulatory Fines and Compensation
- Compliance Violations: If the breach exposes sensitive data, the airport could face fines under U.S. and international regulations like GDPR. GDPR fines can reach up to €20 million or 4% of global annual turnover, whichever is higher.
- Passenger Compensation: If delayed flights result from the downtime, airlines may have to compensate passengers under U.S. Department of Transportation rules. These compensations would increase the financial burden on the affected airlines.
The extensive media coverage surrounding the cyberattack on the Port of Seattle has had a profound impact on consumer trust and faith in the security of our critical infrastructure. As news outlets continue to publish reports about the prolonged outages and systemic vulnerabilities, the narrative shifts from a one-time disruption to a broader question about the reliability of essential services like airports and ports. When passengers see headlines detailing multiple days of outages and unresolved cyber vulnerabilities, it leads to a growing sense of insecurity. The constant media attention acts as a reminder that even the most vital infrastructures are not immune to sophisticated attacks, causing passengers and businesses alike to reconsider their reliance on these services.
For consumers, the idea that a single cyber incident could cripple an entire airport for days introduces doubt about the resilience of the systems that underpin their travel plans. In the case of Sea-Tac, this can result in travelers opting for other airports or modes of transportation, fearing further outages or delays. The repeated exposure to articles covering the event erodes their faith in the Port's ability to safeguard its operations against future cyber threats, which could have long-term consequences on passenger traffic and business partnerships.
This erosion of trust doesn't just affect immediate operations—it signals a larger concern about how prepared public infrastructure is to handle evolving cyber threats. In an industry where security, safety, and reliability are paramount, the damage to reputation caused by such extensive media coverage could take years to repair, making proactive communication and transparent recovery efforts more crucial than ever.
Lessons Learned:?
The cyberattack on the Port of Seattle exposed critical vulnerabilities that impacted both the organization and the travelers who depend on the airport. It provides a sobering reminder of how deeply interconnected and vulnerable digital infrastructure can be, especially for a vital public service like an international airport. Here are the key takeaways for both the Port of Seattle and travelers who rely on its services:
For the Port of Seattle:
- Implement Two-Factor Authentication (2FA) on All Critical Systems The possible absence of 2FA played a pivotal role in allowing attackers to easily escalate privileges and access critical systems. Had 2FA been implemented across all systems, it would have added an extra layer of security, making it far harder for hackers to exploit stolen credentials. Actionable Step: Enforce 2FA as a baseline requirement for all system logins, especially for high-privilege accounts such as domain registrars, IT administrators, and email platforms.
- Monitor Domain Registration Security The attack was potentially enabled by hijacking the domain registration. The Port of Seattle should have applied stronger protections such as multi-factor authentication (MFA), strong passwords, and domain transfer locks to prevent unauthorized access to domain controls. Actionable Step: Regularly audit domain registration accounts, ensure that MFA is enabled, and lock the domain transfer to prevent unauthorized changes to DNS settings.
- Enhance Phishing Defenses through SPF, DKIM, and DMARC Email authentication standards like SPF, DKIM, and DMARC can prevent email spoofing, a tactic that hackers used to impersonate key employees and gain access to systems. Implementing these standards would make it far more difficult for attackers to send fraudulent emails that appear to come from trusted sources. Actionable Step: Ensure that SPF, DKIM, and DMARC protocols are fully configured and regularly tested to protect against email spoofing and phishing attacks.
- Conduct Regular Red Team Exercises The incident highlights the need for proactive red team exercises, where a team of security experts simulates an attack to identify vulnerabilities. These exercises can help expose weaknesses in systems that may otherwise go unnoticed until they are exploited in a real-world attack. Actionable Step: Incorporate red team testing into regular cybersecurity protocols to identify weaknesses in both external-facing systems (e.g., domain security) and internal infrastructure.
- Improve Network Segmentation The attackers' ability to move laterally through the network suggests weak network segmentation. By segmenting critical systems—such as those for email, operations, and customer data—attacks on one system would not easily spread to others. Actionable Step: Review and enhance the network segmentation plan, ensuring that sensitive systems are isolated and monitored.
- Strengthen Incident Response and Recovery Plans The three-day DNS takeover demonstrated the need for quicker response times and more robust incident recovery protocols. By ensuring rapid detection and immediate action on domain-related incidents, the impact could be contained more effectively. Actionable Step: Invest in stronger DNS monitoring and recovery tools to regain control of compromised systems swiftly. Practice these recovery steps regularly to ensure readiness.
Conclusion
The timeline of the Port of Seattle cyberattack shows how critical domain control is as a linchpin in modern digital infrastructure. Once the attackers gained control over the PortSeattle.org domain, they leveraged this to carry out credential theft, escalate privileges, and disable key systems within hours. By 9:47 AM, the attackers had fully crippled the port’s digital presence, leaving administrators scrambling to regain control.
As of 12:00 PST Monday on August September 2nd, 2024 - the website is still down.
This ‘hypothetical’ scenario demonstrates how rapidly a cyberattack can unfold if key vulnerabilities—like weak domain security and a lack of MFA—are exploited. Proper defenses, including two-factor authentication, email authentication protocols, and network segmentation, are vital in preventing similar real-world attacks from taking down critical infrastructure.
About the Author
Barry Hurd is an accomplished technology strategist with over 20 years of experience in cybersecurity, data intelligence, and digital innovation. As a trusted advisor to businesses and public sector organizations, Barry specializes in helping teams understand and mitigate complex data and cybersecurity scenarios, particularly those involving critical supply chain? infrastructures. His deep technical knowledge is complemented by his ability to translate complex digital challenges into practical, actionable strategies for leaders at all levels. Barry’s insights bridge the gap between advanced cybersecurity strategies and real-world application, helping organizations safeguard their most valuable assets. His passion for exploring the intersection of technology, risk management, and operational resilience has positioned him as a go-to resource for executives looking to secure their digital future.
Fractional Chief Digital Officer. Data & Intelligence. (CDO, CMO, CINO) - Investor, Board Member, Speaker #OSINT #TalentIntelligence #AI #Analytics
4 个月Asking the question: why is the site still down 60 days later? https://www.dhirubhai.net/posts/barryhurd_how-does-a-state-survive-a-60-day-cyber-activity-7255299461101297665-4tAx
Fractional Chief Digital Officer. Data & Intelligence. (CDO, CMO, CINO) - Investor, Board Member, Speaker #OSINT #TalentIntelligence #AI #Analytics
5 个月It has been a full month since the cyber attack on the Port of Seattle. 1- The main site is still down. 2- Multiple supply chains rely on the main site (either down or reduced capability.) 3- A Port Commissioner finally commented on it. The economic damages caused thirty days later are staggering. https://www.dhirubhai.net/posts/samhcho_it-has-been-one-month-since-we-learned-of-activity-7245235461240094721-Ht6K
Fractional Chief Digital Officer. Data & Intelligence. (CDO, CMO, CINO) - Investor, Board Member, Speaker #OSINT #TalentIntelligence #AI #Analytics
5 个月Unfortunately the latest update finally admitted to ransomware issues and the port not paying demands to unencrypt port systems. They have not identified what types of data were compromised or what types of data could be getting placed on to the dark web marketplace operated by the hacking group. You can also read a bit about the hacking group Rhysida (which also has software named after it) which CISA reported on back in Nov 2023. This group and attack vector is particularly disturbing from a cyber security perspective as it is definitely a 'viral' spread that the 8,500+ vendors of Port of Seattle and affected datasets may have to deal with in the future. https://en.wikipedia.org/wiki/Rhysida_(hacker_group) https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-319a https://www.washingtonports.org/port-of-seattle-updates