Transportation

Wapack Labs performs weekly queries of our backend databases, identifying all new data containing Motor Vessel (MV) and Motor Tanker (MT) in the subject line of malicious emails.  Email subject line Motor Vessel (MV) or Motor Tanker (MT) keyword usage is a common lure to entice users in the maritime industry to open emails containing malicious attachments.  Wapack Labs is providing this weekly list of Motor Vessels in which Wapack Labs directly observed the vessel being impersonated, with associated malicious emails.  The identified emails attempted to deliver malware or phishing links to compromise the vessels and/or parent companies.  Users should be aware of the subject lines used and the email addresses that are attempting to deliver them.  Users should never click on or download any attachments or links in suspicious emails.

Significant Vessel Keys Words:

MT, M/T

merchant tanker

MV, M/V

merchant vessel

MY, M/Y

motor yacht

VLCC

very large crude carrier

ULCC

ultra large crude carrier

RV, R/V

research vessel

FPSO

floating production storage & offloading

Figure 1.  Geo-location of receiving IPs of the malicious emails. Location is not exact and is approximate location of the receiving IP gathered from Wapack Lab’s malicious email collection.

Figure 2. MV MEDI OKINAWA, flag Panama, bulk carrier

Table 1: List of subject lines, motor vessel, type of malware sent and sender data that was seen in Wapack Lab’s malicious email collection from February 19, 2019 to February 26, 2019.

 

First Seen

 

Subject Line Used

 

Malware Detections

 

Sending Email

 

Targets

February 20th 2019

Subject consignment expected to arrive your port on MV. CMA CGM Verdi V-250E dated 18/02/2019

Ikarus - Trojan-Downloader.O97M.Donoff


Ms.Julie Tsukahara-LOGISTICS MATES CORP. <info@esanat.com>

friterm.com

 

esanat.com

 

maillocal.friterm.com

February 21st 2019

Final Request KOREA MARINECRAFT- for vessel MV MEDI OKINAWA

Fortinet - W32/Agent.AJFK!tr
McAfee - Exploit-CVE2017-11882.aj

Sophos - Troj/RtfExp-EV

McAfee-GW-Edition - Exploit-CVE2017-11882.aj

ZoneAlarm - HEUR:Exploit.MSOffice.CVE-2018-0802.gen

Ikarus - Win32.Outbreak

ESET-NOD32 - a variant of DOC/Abnormal.E

\"S.S. Hwang\" <kmc@ksmcom.co.kr>

 

Figure 3. Geo-location of sender IPs of the malicious emails. Location is not exact and is approximate location of the sender IP gathered from Wapack Lab’s malicious email collection. 

Figure 4.  MV CMA CGM Verdi, Flag: Liberia, container ship

About Wapack Labs

Wapack Labs, located in New Boston, NH, is a Cyber Threat Analysis and Intelligence organization supporting the Red Sky Alliance, the FS-ISAC, and individual corporations.  For questions or comments regarding this report, please contact the lab directly by at 1-844-492-7225, or feedback@wapacklabs.com.

E-mail me when people leave their comments –

You need to be a member of Red Sky Alliance to add comments!

Join Red Sky Alliance