Wapack Labs performs weekly queries of our backend databases, identifying all new data containing Motor Vessel (MV) and Motor Tanker (MT) in the subject line of malicious emails. Email subject line Motor Vessel (MV) or Motor Tanker (MT) keyword usag
All Articles (295)
This week's Maritime Watchlist for 02 05 2019 is found in the link below:
Summary
Merchant Vessel (M/V) VICTORIA is being impersonated utilizing a spoofed email address from the ship management company, ProFYShip Management, Odessa Ukraine.
The email is being used to spread a Trojan malware:
- Avast - Win32:Malware-gen;
- GDa
Weekly 2018 Motor Vessel (MV) & Motor Tanker (MT) Impersonation
Wapack Labs performs weekly queries of our backend databases, identifying all new data containing Motor Vessel (MV) and Motor Tanker (MT) in the subject line of malicious emails. Email
The European Maritime Safety Agency (EMSA) in Lisbon Portugal, may be infected with the Lokibot trojan malware and connecting directly to an owned C2 domain in Ho Chi Minh City Vietnam. Caution should be exercised in any cyber interactions with the
Attached is a link for the Maritime Weekly Watchlist. This watch list contains weekly observed malicious emails collected in the Wapack Labs propietary data through a variety of maritime keys words, which parse the domain name, sender email, subject
Cyber-Attacks and the Maritime Sector: Companies and infrastructure within naval and maritime sector companies and their associated infrastructures continue to be vulnerable to cyber related attacks. In recent years, security experts have observed a
Weekly 2018 Motor Vessel (MV) & Motor Tanker (MT) Impersonation
Wapack Labs performs weekly queries of our backend databases, identifying all new data containing Motor Vessel (MV) and Motor Tanker (MT) in the subject line of malicious emails. Email
Attached is a link for the Maritime Weekly Watchlist. This watch list contains weekly observed malicious emails collected in the Wapack Labs propietary data through a variety of maritime keys words, which parse the domain name, sender email, subject
M/V YI CHUN is being impersonated luring ships and maritime industry companies into spreading various versions of Trojan malware families. Collection and analysis of malicious email subject lines exposed someone impersonating the M/V YI CHUN. Thes
Attached is a link for the Maritime Weekly Watchlist. This watch list contains weekly observed malicious emails collected in the Wapack Labs propietary data through a variety of maritime keys words, which parse the domain name, sender email, subject
Wapack Labs performs weekly queries of our proprietary collection databases, identifying all new data containing Motor Vessel (MV) and Motor Tanker (MT) in the subject line of malicious emails. Email subject line Motor Vessel (MV) or Motor Tanker (M
Summary
A Bangladeshi based Cosco Shipping company email was detected in Wapack Labs malicious email used to pass malicious email targeting a publishing company in Australia/New Zealand. The email was most likely taken from a Cosco open source shipp
Malicious actors are targeting the shipping industry, using “whaling[1],” a.k.a. business email compromise (BEC) attacks, to collect credentials and compromise critical transportation systems.
Hackers are launching whaling attacks to target various
Attached is a link for the Maritime Weekly Watchlist. This watch list contains weekly observed malicious emails collected in the Wapack Labs propietary data through a variety of maritime keys words, which parse the domain name, sender email, subject