User:Mhumphrey8530/sandbox

Introduction:
Maritime Cyber Warfare involves cyber attacks against the maritime industry (usually shipping involving cargo, crude oil and Liquid Natural Gas), carried out by criminal organizations, sovereign nations, or a lone actor. Attacks include corporate espionage, systems shutdown, or thefts made with the assistance of viruses. Maritime Cyber Attacks use the same viruses and similar tactics as any other cyber attack, however the intended targets and outcomes can be both drastically similar or different.

Maritime cyber attacks are a relatively new occurrence, unique to the late 20th and 21st centuries. Maritime cyber attacks have become more and more common between 2005-2018, as rival or warring countries have begun investing in cyber counterintelligence, and will launch attacks on each others industries in an attempt to slow down or stop their logistical and tactical abilities in the maritime domain.

Means of Attack:
Trojan Horse: A type of virus that disguises itself as a friendly software, upon gaining access it will target data, either deleting it, copying it, corrupting it, modifying it or disrupting the way that the computer runs, or the software it uses.

Worm: A worm is a form of malware that spreads itself through replication, usually taking advantage of security breaches to enter new systems.

Rogue Software: A malicious software that tricks a user into believing that they have a virus, offering to remove the non-existent virus for money.

Virus Dissemination: unauthorized access to a system by means of malignant viruses, programs, worms etc.

Man in the Middle: when communication between two systems is intercepted by an outside entity. Can occur with any form of online communication, such as social media, email and web surfing. They try to eavesdrop on private conversations, but they also can target all the information outside of your devices

Phishing: A program that will disguise itself as a data request from an otherwise trusted third party, requesting sensitive information to then exploit.

Password Attacks: Pretty much exactly what it sounds like: a hacker trying to guess or “hack” a password in order to gain access or permission to an account or action. An attack like this does not usually require any type of malicious code or software to run on the system, though some programs that some hackers use contain many tactical methods to access accounts, including brute force attacks made to guess passwords, as well as comparing various orders of word combinations against a mixed symbol and dictionary file.

Denial-of-Service (DoS) Attacks: An attack of this kind focuses on disrupting the service to a network. An attacker will send an abnormally large amount of data or traffic activity through the network (i.e. making lots of connection requests), until the network becomes overloaded and can no longer function. Credit Card Fraud: This act starts with the theft of a credit card, and then the theft of data associated with that bank account Cyberstalking: using any type of internet communication to stalk, harass, or threaten another person or group.

Malvertising: cyber attackers that upload infected display ads to different sites using ad networks. When a user clicks on one of these ads, a type of malware will be downloaded.

Virus: A code that has the ability to self replicate and cause damage within hardware.

Recent Attacks:
The Not Petya ransomware attacks that occured in January of 2018, targeted many different companies and nations worldwide, including the Danish shipping company, A.P. Moller-Maersk, which had nearly 4,000 servers, 45,000 computers, and 2,000 applications across its global systems network sabotaged and ruined.

This system wide shutdown caused a total halt in shipping operations, as containers could not be sent or accepted from port to port without authorization or clearance from the Maersk computer network. The problem was solved by a 10 day overhaul of the entire computer network, involving the replacement of every single effected computer, server, and related piece of equipment.

An official attacker has not been exposed or claimed responsibility as of March 2018, however the United States and United Kingdom have both pointed fingers at the Russian Federation.