0% found this document useful (0 votes)
44 views3 pages

Maersk Cyberattack: Supply Chain Crisis

CYBERATTACK: THE MAERSK GLOBAL SUPPLY-CHAIN MELTDOWN
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
44 views3 pages

Maersk Cyberattack: Supply Chain Crisis

CYBERATTACK: THE MAERSK GLOBAL SUPPLY-CHAIN MELTDOWN
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

CYBERATTACK: THE MAERSK

GLOBAL SUPPLY-CHAIN MELTDOWN

Question 1:
In 2014, Russia began sponsoring cyberattacks against key components of the
Ukrainian economy and infrastructure, targeting pro-western websites. The common
attack types are distributed denial of service, phishing, and ransomware. NoPetya is a
ransomware program that targeted MeDoc, a Ukrainian financial program. It is designed
to spread automatically and rapidly. It arrived as a malware attachment in the emails
received by MeDoc employees, and they fell for it. Attackers used leaked U.S. NSA
exploits - EternalBlue and EternalRomance to destroy the systems. EternalBlue gave
attackers remote access to the systems through vulnerable Microsoft Windows file and
printer sharing protocols, while EternalBlue escalated privileges to control and modify
systems without detection. Attackers installed other software, monitored
communications, and stole data and passwords. With those passwords, attackers hid
the ransomware in a software update pushed out to MeDoc customers on June 22,
2017. NoPetya remained dormant for five days until the eve of Ukrainian Constitution
Day. This ticking bomb exploded on June 27 and spread through infected networks. It
started with an unscheduled reboot of computers, followed by encoding of the master
boot record. Several Ukrainian companies, banks, and hospitals were infected.
However, MeDoc was also being used by multinational corporations doing business in
the region for local tax filing. Once a computer in their network had been compromised,
the malware spread through their global networks. One of those firms was A.P.
Møller-Maersk. A systems engineer in Copenhagen prepared to deliver an update for
the company’s PCs but was stopped by a spontaneous reboot of his computer. Then he
noticed all screens began simultaneously rebooting. That is how Maersk was attacked.

Question 2:
The attack was successful primarily because the ancient Windows 2000 and Windows
XP operating systems, which Microsoft had long discontinued support for, still powered
many of the company’s PC terminals. Senior system administrators at Maersk had
warned about this vulnerability in 2016. The senior leadership team had approved the
upgrades, but the systems administrators did not install upgrades as their bonuses
depend on the infrastructure ‘uptime.’ Also, the company did not expect all 150 domain
controllers to be simultaneously hit by the same malware, wiping out the entire network.
This fast spread of malware indicates that all the domain controllers in the network are
not segmented correctly.

Question 3:
Maersk followed best practices, making backups of its data every few days and keeping
those backups offline at various geographic locations. Maersk brought in consultants
from Deloitte to manage the recovery effort, along with Predica, and started recovery
efforts from London. Upon contacting key IT staff at each of the company’s 150 domain
controllers, it came to know that all were affected by malware except one located in
Ghana. This machine was off the internet when the attack happened because Ghana
had a power cut. It was the time when Ghana was facing an energy crisis. This news
brought joy to the London command centre. Connecting this domain controller to the
internet is impossible as Ghana’s network bandwidth was very slow. Also, connecting it
to the internet risks infecting the last uninfected controller. Instead, the company
instructed its administrator in Ghana to deliver the hard drive to London. However, no
one in the Ghana office had a travel visa for the United Kingdom. So, an employee from
Ghana handed over the drive to another employee in Nigeria, who then transported the
hard drive to London. After many efforts, network restoration began with online ordering
and tracking prioritized to allow shipping services to return to normal. On July 25, 2017,
Maersk announced that its online quoting system was back online. Chairman of Maersk,
Snabe, stated that they installed 4,000 new servers, 45,000 new PCs, and 2,500
applications in ten days. These ten days cost the company $300 million in expenses
and lost earnings.
References:
● Wesley, D., Roth, A. & Dau, L. (2019) Cyberattack: The Maersk Global Supply
Chain Meltdown.

Common questions

Powered by AI

Maersk’s response included bringing in consultants and prioritizing the restoration of crucial services such as online ordering. While they effectively installed 4,000 new servers and 45,000 PCs in ten days, the recovery cost the company $300 million. Potential areas of improvement include enhancing pre-attack network segmentation and reducing reliance on outdated systems. Moreover, ensuring all key locations have personnel with necessary travel visas could have expedited the transport of critical components like the uninfected hard drive .

The Ghana domain controller remained uninfected due to a power outage keeping it offline during the attack. This event underscores the vital importance of physical and network decentralization as a security measure. It incidentally provided Maersk with a clean source to begin their network recovery, thereby highlighting a glaring vulnerability: reliance on interconnected systems without independent protections. This incident illustrated that redundancy and isolation can prevent total operational collapse during cyber incidents .

Maersk’s offline backups were crucial in their recovery efforts because they ensured that clean data was available to restore after the attack. However, challenges arose in reconnecting their systems and painstakingly restoring operations due to the extent of damage across 149 of their 150 domain controllers. Additionally, with the only unaffected domain controller being in Ghana, it took significant logistical efforts to securely transport its data to London due to interrupted internet services and travel restrictions .

Other companies can learn the importance of upgrading outdated systems and ensuring network segmentation to prevent malware spread. Establishing robust cyber hygiene practices, with regular employee training and system updates, is crucial. The incident also highlights the need for contingency planning, including offline backups and organizational flexibility to respond across international offices. Lessons in logistics, such as having personnel ready for unexpected travel to handle emergencies, are also key takeaways .

The NoPetya attack inflicted $300 million in expenses and lost earnings on Maersk, indicating the high financial stakes involved in cybersecurity breaches for multinational corporations. These costs arose from infrastructure replacement (4,000 new servers, 45,000 PCs), consulting services, and operational disruptions. The financial impact illustrates how cyberattacks can swiftly erode corporate earnings and enforce capital reallocation to emergency recoveries, underscoring the cost-effectiveness of proactive cybersecurity investment .

The logistical challenge of transporting the hard drive from Ghana to London revealed difficulties in international coordination, such as travel restrictions due to visa issues, resource constraints, and bandwidth limitations. This demonstrates the need for thorough crisis management plans that take into account international contingencies. Developing strategies for rapid mobilization and communication across borders can mitigate delays and enhance response efficacy during global cyber incidents .

Employee awareness was a critical vulnerability exploited in the attack as MeDoc employees inadvertently activated the malware via email attachments. This points to the necessity for rigorous cybersecurity training programs emphasizing the identification of phishing attempts and malware. Regular simulations and updates on emerging threats should be enforced to enhance vigilance and adaptability among staff. Educating employees on the role they play in safeguarding organizational integrity is pivotal .

The lack of network segmentation at Maersk meant that the malware could spread unrestrictedly across their entire network. Because all 150 domain controllers were interconnected without proper segmentation, the NoPetya malware was able to wipe out the entire network simultaneously once it breached a single point, leading to total system downtime .

The outdated Windows 2000 and Windows XP operating systems, which no longer received support from Microsoft, made Maersk's systems susceptible to the NoPetya attack. This vulnerability was exacerbated by the fact that senior system administrators had previously warned about the danger in 2016. Although the upgrades were approved by senior leadership, they were not implemented by the systems administrators because their bonuses were tied to infrastructure 'uptime.' Additionally, the absence of network segmentation meant the malware could rapidly spread across all 150 domain controllers .

The NoPetya malware was developed amidst Russia's cyber activities against Ukraine, targeting Ukrainian infrastructure and enterprises linked to Western interests. This geopolitical tension contributed to the malware's design, intending widespread disruption. The incident highlights the growing use of cyberattacks in geopolitical conflicts, pressing for stronger international cybersecurity frameworks and cooperation to pre-emptively manage such threats, potentially through shared protocols and cross-border response teams .

You might also like