Red Sky Alliance monthly queries our backend databases, identifying all new data containing Motor Vessel (MV) and Motor Tanker (MT) in the subject line of malicious emails. Malicious actors use emails with Motor Vessel (MV) or Motor Tanker (MT) in the subject line as a lure to entice users in the maritime industry to open emails containing malicious attachments. Red Sky Alliance is providing this list of Motor Vessels in which we directly observed the vessel being impersonated, with associated malicious emails. The identified emails attempted to deliver malware or phishing links to compromise the vessels, parent companies, ports and the entire Transportation Supply Chain. Specific vessel names or key words in the transportation supply chain can be queried using our two services and tools. Full report available here.
Significant Vessel Keys Words:
Figure 1. Map displaying location of attacker domains
Figure 2. Map displaying location of victim domains
Figure 3. Distribution of attacker and target domains
Common Transportation Attack Chain Overview
Table 1: List of dates, subject lines, malware detections, and sender data seen in Red Sky Alliance’s malicious email collection from last 30 days. Information extrapolated from the Subject Line. Full table attached.
Analysis
Five prevalent subject lines seen in our recent query are as follows:
- ROQ // NYMPH THETIS V2602B - PORT KLANG / BENZENE LOADING
- ***TOP URGENT***SEA LADY - New Inquiry
- Enesel Bulk / PDA & Restriction / Karachi, Pakistan / Discharging Coal
- RFQ - TARSUS M - CON-VR-0008/2026 - DECK FITTER ITEMS
- MT Eagle Asia 11 V42/26 - Agency appointment & Request Quotation - Tg. Priok Port
There are several themes generally represented by the subject lines seen. Specifically, in this month’s query we see a variety of appointments, port requests, and discharge/loading notifications. These emails are seen to utilize common terminology to establish credibility. This credibility can make for a solid lure. In terms of the sending emails themselves, we saw a number of shipping companies and operators, a shipbuilder in the Netherlands, several freight forwarders, an automotive manufacturer in Michigan, and a pet store in Texas.
In addition to impersonating these companies and various types of communication, these emails are also seen to be impersonating specific vessels. Vessels potentially being impersonated by these emails are:
- Atlantis Artemida (pictured above), which is a chemical tanker currently en route to Turkey and is sailing under the flag of Marshall Islands.
- Tarsus M (pictured below), which is a bulk carrier currently located at the Black Sea and is sailing under the flag of Panama.
- Nymph Thetis, which is a chemical tanker currently en route to India and is sailing under the flag of Barbados.
- Eagle Asia 11, which is a chemical tanker currently located in Asia and is sailing under the flag of Singapore.
As one might expect, fabricating a vessel name is not difficult, but using a real ship’s name does not take much effort and could result in an increase of credibility.
The most prevalent malware detections associated with these emails this month are as follows:
- Html.Iframe.udgq - NANO-Antivirus
- ExecInMail – Arcabit
- Probably Heur.W97ShellO – Zoner
- SpamMalware-ZIP.Gen - MicroWorld-eScan
- GenericKD.78149863 - ALYac
Detections in these emails tend to be representative of generic trojans intended for a variety of purposes like delivering malware payloads, performing remote execution, credential stealing, etc. We see this with the Trojan.GenericKD detection listed above. Exploit.Html references threats via web exploits or HTML injection, ExecInMail references threats that can be embedded or executed from within emails, Heur.W97ShellO refers to macro-based Office file detections, and Trojan.SpamMalware-ZIP refers to trojanized archive threats.
Vessel Flag of Convenience – All shipping size vessels which fall under international law must fly a country flag where it is registered. The flag of convenience (FOC) is the system that allows the vessel owners to avoid burdensome international legal regulations. When the ships are involved in this system, they are not connected to the laws of the countries where they are registered. The top five (5) flag states with the largest number of registered vessels are: Panama, Liberia, Marshall Islands, Hong Kong and Singapore.[1]
Supply Chain Report
Supply Chain Spoofing: In 2023, our analyst began monitoring the transportation supply chain, as often these transportation companies are used to gain cyber access to valuable targets. Maritime shipping is just one portion of the entire commercial transportation supply chain. By querying our data with numerous important supply chain keywords, we can also extract some more general supply chain related malicious emails. The five most prevalent subject lines seen with a general supply chain focus are as follows:
- PURCHASE ORDER TRANSMISSION DLNG REF. 4520007393
- DHL SHIPMENTS NOTIFICATION : 9877789** ARRIVAL NOTICE DATED 2/19/2026
- PDA and PORT INFO for 69 x 20' IMO CONTAINERS // TOP URGENT
- Re: AW: Purchase Order sheet please confirm (AL Shabiz Trading LLC )
- Port agency appointment by Ace Quantum Chemical Tankers, CHEM SILICON/ 273/(Johor)
Much like maritime related emails, we can see many themes emerge in the subject lines of these malicious emails. In the last month, we can see primarily purchase orders. These emails can also contain impersonations of companies in many industries. In our most recent query, we saw multiple shipping companies, manufacturers in several industries including automotive, industrial, electronics, or textiles, an art gallery in Belgium, and an engineering consulting firm in Greece.
The five most prevalent detections associated with these emails are as follows:
- PDF:MalwareX-gen [Phish] – Avast
- HEUR:Trojan.Script.Generic – Kaspersky
- RTF:Obfuscated-gen [Trj] – AVG
- Trojan:Script/Wacatac.B!ml – Microsoft
- Html.Iframe.udgq - NANO-Antivirus
Unlike maritime specific emails, detections attached to emails targeting a wider supply chain tend to leverage phishing activities, as we see with the PDF:MalwareX detection. HEUR:Trojan.Script.Generic and Trojan:Script/Wacatac.B!ml represent generic trojans that can be deployed and act in a variety of ways, and RTF:Obfuscated-gen represents an obfuscated Office file exploit.
Table 2: List of dates, subject lines, malware detections, and sender data seen in Red Sky Alliance’s malicious email collection from last 30 days. Information extrapolated from the Subject Line. Full table attached.
Closing: These analytical results illustrate how a recipient could be fooled into opening an infected email and what sorts of dangers can accompany these emails. It is common for attackers to specifically target pieces of a company’s supply chain to build up cyber-attacks targeting larger companies. Doing so could cause the recipient to become an infected member of the maritime supply chain and thus possibly infect victim vessels, port facilities and/or shore companies in the marine, agricultural, and other industries with additional malware. With approximately 90% of products being shipped in the maritime related supply chain, this is a serious cyber matter.
Fraudulent emails designed to make recipients hand over sensitive information, extort money, or trigger malware installation on shore-based or vessel IT networks remains one of the biggest day-to-day cyber threats facing the maritime industry and associated transportation supply line. These threats often carry a financial liability to one or all those involved in the Transportation Supply Chain. Preventative cyber protection offers a strong first-line defense by preventing deceptive messages from ever reaching staff inboxes, but malicious hackers are daily developing new techniques to evade current detection. This supports our recommendation of daily cyber diligence.
The more convincing an email appears, the greater the chance employees will fall victim to a scam. To address this residual risk, software-based protection should be treated as one constituent of a wider strategy that also encompasses the human element as well as organizational workflows and procedures.
It is important to:
- Train all levels of the marine supply chain to realize they are under constant cyber-attack.
- Emphasize maintaining constant attention to real-world cyber consequences of careless cyber practices or general inattentiveness.
- Provide practical guidance on how to identify a potential phishing attempt.
- Use direct communication to verify emails and supply chain email communication.
About Red Sky Alliance
Red Sky Alliance strongly recommends ongoing monitoring from both internal and external perspectives. Internal monitoring is common practice. However, external threats are often overlooked and can represent an early warning of impending cyber-attacks. Red Sky Alliance can provide both internal monitoring in tandem with RedXray notifications on external threats to include botnet activity, public data breaches, phishing, fraud, and general targeting. All emails connected to the Transportation Supply Chain, to include Vessels, should be viewed with scrutiny.
Red Sky Alliance is in Steamboat Springs, CO USA. We are a Cyber Threat Analysis and Intelligence Service organization. We have been tracking vessel impersonation for over 6 years (and maintain historical reports). For questions, comments or assistance, please contact our lab directly at 1-844-492-7225, or feedback@wapacklabs.com
- Reporting: https://www.redskyalliance.org/
- Website: https://www.wapacklabs.com/
- LinkedIn: https://www.linkedin.com/company/64265941
Weekly Cyber Intelligence Briefings:
REDSHORTS - Weekly Cyber Intelligence Briefings
https://register.gotowebinar.com/register/5378972949933166424
[*]: Vessel images obtained from VesselFinder
Comments