Create a free Manufacturing.net account to continue

Transportation and Logistics Under Siege

A look at how this vital and increasingly targeted market sector is responding to more cyberattacks.

Fleet Of Fed Ex Delivery Trucks In A Parking Lot 483290419 4500x3000 (1)

(The following article was contributed by National Motor Freight Traffic Association. It can be found in its entirety here.)

The use of computers has significantly improved the transportation industry over the past few decades. Digitizing documents, automating payments, and storing information in a central location has streamlined processes and made the job easier at all levels.

Unfortunately, it has also opened up the industry to cyberattacks from hackers and other forms of cybercrime. A 2021 study showed that cyberattacks against transportation companies experienced a 186 percent increase between June 2020 and June 2021. These threats are expected to increase, so here's a look at how to safeguard essential systems from the most common types of attacks.

DoS and DDoS Attacks

The Denial of Service (DoS) and Directed Denial of Service (DDoS) share a primary goal, which is to prevent access to the system by overloading it with requests. The system, unable to handle the large volume, shuts itself down. According to a 2022 survey, 20 percent of businesses with over 50 employees in 26 different countries reported being victims of a DoS or DDoS attack in the past year.

This means that a company's maps, data, communications, and nearly every other computer server-based process or application can be rendered unavailable. In fact, the entire system can be thrown into chaos and could cost the company thousands of dollars in spoiled products or cause an inexperienced driver to panic or make mistakes.

There are several ways to counter such an attack, but the most common is to install network monitoring software and block repeated requests from the same IP address. There are also AI solutions that can anticipate threats and dispatch them before they can pose a problem.

MITM Attack

A "Man in the Middle" (MITM) attack involves a hacker intercepting communications between two parties and changing important information for their own gain. For example, imagine a company sends a client a message that requests they wire payment to the company's bank account. A hacker could receive this message, replace the company's bank account with their own, and then potentially walk away with tens of thousands of dollars.

The best way to counter an MITM attack is to ensure that all communications sent are the same as those received. Encryption methods like authentication certificates can be built into email software, confirming whether or not that is the case. If you don't mind an old-fashioned solution, employees can call recipients of important emails to confirm the contents haven't been altered.

Although they aren't often discussed in terms of cybersecurity countermeasures, data shows that MITM attacks make up 19 percent of cybersecurity threats and cost businesses over $2.4 billion every year. Worse, only 10 percent of businesses are prepared for these attacks.

Phishing, Ransomware and More

The easiest way to prevent phishing attacks is by carefully double-checking the sender's email address for every piece of email received. Hackers won't be able to perfectly duplicate the sender's address but will do their best to make it look close enough. For example, if you're expecting an email from "[email protected]" and the address line reads "[email protected]", you might not notice that the "I" has been replaced by a "1" at first glance.

Phishing attacks are on the rise and, in 2022, cost Americans over $40 billion, according to a report by anti-mobile spam company TrueReport.

According to Zippia, ransomware attacks occur every 11 seconds around the world, increased 80 percent from 2021 to 2022, and cost companies over $160 billion in payouts and lost revenue due to downtime. For transportation companies, these costs can be devastating and even result in bankruptcy.

A brute force attack is designed to try every possible combination of numbers, letters, and special characters until it finds the right password that allows the hacker to access the system. They start with common passwords like "password" or "123456" and eventually use what's known as a "dictionary attack", where they guess every possible word. That's why most websites require numbers and special characters, as it slows down a potential brute-force attempt.

These can be slowed down by limiting the number of attempts before access is restricted for a period of time like 15 minutes or an hour. If the hacker is determined enough to resume after the account is restored, additional steps like enabling multi-factor authentication that requires a user to press a button on their mobile device or answer a phone call to verify their identities may be necessary. Brute force attacks are responsible for roughly five percent of all data breaches.

Malware can easily be combined with other cyberattacks, like phishing. For example, a hacker could send an email on a Friday afternoon that appears to be from a supplier asking that the transportation company download its new inventory software.

When the software doesn't work, the employee calls his contact at the supplier. The supplier is understandably confused as he never sent any emails about a new program and says his company has no plans to upgrade its software. The employee decides to tell the boss on Monday but returns to the office to find that the company's proprietary information has been stolen by hackers.

According to a 2019 report, a single malware attack costs companies an average of $2.6 million. As the attacks have become more sophisticated and targeted in recent years, that number is likely to be much higher today.

Transportation Industry Security

If a truck does not have properly protected online systems, it can become seriously vulnerable to hackers. These hackers can access the truck from hundreds of miles away and take over the system. One way they can do this is by pointing an antenna at the truck, catching on to the right radio frequency signal, putting diagnostic messages on the trailer network, and causing the brakes to lock up. This causes intense danger to the driver and everyone around him, especially if the truck's cargo is hazardous.

Thankfully, there are solutions to protect transportation companies from cyberattacks. First, maintaining proper cybersecurity procedures at all times will significantly reduce the risk of hackers being able to inflict damage. Policies should be strictly outlined and employees at all levels, from CEO to janitor, should receive proper training and certifications on how to protect themselves and the company from cybercriminals.

For example, topics that should be covered include not giving out information over the phone to unknown parties, which can be used to guess passwords and figure out the computer system's weak points. All passwords should be difficult to guess (i.e., no birthdays or anniversaries) and should have numbers and/or special characters to slow down hackers attempting brute-force attacks.

Another important step is making sure that all company computers and programs receive software updates as soon as possible after they become available. These software patches prevent known system vulnerabilities that a hacker could be able to exploit. Approximately one-third of all data breaches are caused by issues that should have already been patched out, according to IT professionals.

Attack Response Plans

It's important to have an attack response plan in case a threat is detected. Without one, even the most seasoned IT professional can panic, underestimate the situation, or forget a crucial step that allows the hackers to succeed.

A good attack response plan will have specific step-by-step instructions for all major types of attack, For example, "In case of a Ransomware attack:

  1. Notify management that a ransomware attack has taken place (Depending on the company and time of day, it could be a supervisor or the CEO).
  2. Do not negotiate with the hackers. Send no reply.
  3. Have someone bring over the offsite backups from the Data Warehouse and load the files onto the backup server unit.
  4. Change all access passwords for the server.
  5. Physically unplug the ransomed servers and replace them with the backup units.
  6. Restore service and monitor all incoming traffic for potential threats.

The actual steps will vary depending on the exact situation, but having a step-by-step guide is crucial to protecting company information and assets. Even if the company uses software designed to prevent attacks, it's still vital to have a written action plan to prepare for all possible scenarios should those fail.

More in Cybersecurity