Monday, May 6, 2019

Maersk Cyber Attack


Maersk Line, the world’s largest container shipping company that has found in 1904. The company operates all over the world and has a fleet of 639 ships which sail every major trade lane on the globe and employing around 90,000 people (Maersk Investor Relation, 2016).
In June 2017 The APM terminal, which is held by shipping group Maersk, has been facing a ransomware attack named Petya across its global IT network. Petya is a form of malware that infects a targeted computer, encrypts some of the data on it, and gives the victim a message explaining how they can pay a ransom to get the keys to get their data back. Petya malware spreads through malicious office attachments and email (Urrico, 2017). Petya overwrite the affected system’s master boot record after it installs its own boot loader and encrypts the master file.
The malicious cyber-attack has distressed Maersk from carrying out its regular business operations. In a usual day, APM terminal handles almost 5,000 containers. However, the company was forced to adapt to being locked out of its computer networks around the world. From USA, to India, the firm switched to manual tracking of its loading and unloading of cargo. Moreover, in New Zealand and Australia, Maersk staff used handwritten records and Excel spreadsheets to register shipments (Chambers, 2017).
According to a statement issued by the company, Petya related costs contributed to a $264 million loss for the two mid quarters of 2017 (Interim Report Q2, 2017). "We had to reinstall an entire infrastructure" (World Economic Forum, 2018), said the CEO of Maersk Line at World after installing 4,000 new servers, 45,000 new PCs and 2,500 applications to recover from the cyber-attack.
In fact, it is very significant that business managers should develop a security policy with assigned committee for it with regular, scheduled meetings to develop and vote on any changes or additions to the policy (Martin et al, 1998).  Business managers should also collaborate with every department at the organization and insure that everyone is maintaining their security tools and technology.

Reference:
Chambers, S. (2017). Back to the future for Maersk in the wake of Petya attack. Retrieved February 6, 2019, from https://splash247.com/back-future-maersk-wake-petya-attack/
Interim Report Q2 2017. (2017). Retrieved February 6, 2019, from http://investor.maersk.com/static-files/7eee21c8-e825-46d2-bc62-dcd155d00e88
Maersk Investor Relation. (2016). Maersk Group strategy and performance. Retrieved February 6, 2019, from http://investor.maersk.com/static-files/f5fb74fc-ee2a-470f-b0d0-3c2dbf4bd422
Martin, E. W., Brown, C. V., Hoffer, J. A., Perkins, W. C., & DeHayes, D. W. (1998). Managing information technology: What managers need to know. Prentice Hall PTR.
Petya attack: JNPT offers alternatives to maersk terminal. (2017, Jun 29). Businessline Retrieved from https://search-proquest-com.sdl.idm.oclc.org/docview/1914687658?accountid=142908
Urrico, R. (2017). Under attack again, petya the latest assault. Credit Union Times.Breaking News, Retrieved from https://search-proquest-com.sdl.idm.oclc.org/docview/1914737082?accountid=142908
World Economic Forum [Video file]. (2018). Securing a Common Future in Cyberspace. Retrieved February 6, 2019, from https://www.weforum.org/events/world-economic-forum-annual-meeting-2018/sessions/securing-a-common-future-in-cyberspace.

No comments:

Post a Comment

Today's Top Picks for Our Readers:
Recommended by Recommended by NetLine

Blog Archive

Featured Post

Johns Hopkins Aramco Healthcare Business Case Study

Business Case:   Johns Hopkins Aramco Healthcare    Operations Management Report   Table of Content...

Translate