{"id":8157,"date":"2020-10-25T13:14:47","date_gmt":"2020-10-25T12:14:47","guid":{"rendered":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/?p=8157"},"modified":"2020-10-25T13:14:47","modified_gmt":"2020-10-25T12:14:47","slug":"cargo-fleets","status":"publish","type":"post","link":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/2020\/10\/25\/cargo-fleets\/","title":{"rendered":"Cargo fleets and the looming threat of ransomware"},"content":{"rendered":"<p style=\"text-align: justify;\">For hackers, any system with Wi-Fi, Bluetooth, GPS, or Internet connectivity \u2013 including federally-mandated electronic logging devices (ELDs) for trucking and transportation fleets \u2013 represents an enticing entry point for attack.<\/p>\n<p style=\"text-align: justify;\">Today\u2019s cargo fleets are integrating more and more connected technologies, bringing substantial improvements in performance. But greater connectivity also means greater vulnerability to cyber attacks \u2014 a serious threat even in boom times. Amid the current coronavirus pandemic and a sharp global economic downturn, it\u2019s now more important than ever that essential goods like medical supplies and food reach their intended destinations free of malicious disruptions.<\/p>\n<p style=\"text-align: justify;\">For hackers, any system with Wi-Fi, Bluetooth, GPS, or internet connectivity \u2013 including federally-mandated electronic logging devices (ELDs) for trucking and transportation fleets \u2013 represents an enticing entry point for attack.<\/p>\n<p style=\"text-align: justify;\">And it can work two ways. First, vehicles can be directly hacked through their internal communication networks, enabling hackers to take control of the one vehicle and the vehicle can serve as a gateway into the fleet company\u2019s IT system itself.<\/p>\n<p style=\"text-align: justify;\">Alternatively, hackers can enter through fleet companies\u2019 IT systems and ultimately penetrate vehicles within the fleet. By gaining access to these systems, hackers can inject harmful ransomware devastating enough to paralyze entire fleets.<\/p>\n<p style=\"text-align: justify;\">To protect the safety of fleets\u2019 cargo and to avoid financial ramifications, it\u2019s imperative that OEMs ensure that they implement robust cybersecurity protection. Now more than ever, people\u2019s lives and livelihoods hang in the balance.<\/p>\n<p style=\"text-align: justify;\"><b>Ransomware and safety-critical systems<\/b><\/p>\n<p style=\"text-align: justify;\">Ransomware can prove highly lucrative for hackers \u2013 and highly damaging to networks and fleet operators that experience such an attack. The<a href=\"https:\/\/www.wired.com\/story\/notpetya-cyberattack-ukraine-russia-code-crashed-the-world\/\" target=\"_blank\" rel=\"noopener noreferrer\"> NotPetya ransomware attack<\/a>, linked to a group of Russian military hackers, is perhaps the most potent example of the havoc these attacks can wreak: Victims received ransom messages requesting payment if they wanted to unlock their files, but all computer files were encrypted anyway, with some completely erased. This particular attack cost FedEx\u2019s TNT courier delivery service nearly <a href=\"https:\/\/www.bbc.com\/news\/technology-41336086\" target=\"_blank\" rel=\"noopener noreferrer\">\u00a3221 million<\/a>, impacting both deliveries and sales.<\/p>\n<p style=\"text-align: justify;\">More prominently, the 2017 WannaCry cyber attack disabled computers across the globe, with North Korea-linked hackers demanding locked-out users pay ransom in Bitcoin. <a href=\"https:\/\/www.telegraph.co.uk\/technology\/2018\/10\/11\/wannacry-cyber-attack-cost-nhs-92m-19000-appointments-cancelled\/\" target=\"_blank\" rel=\"noopener noreferrer\">In the United Kingdom alone<\/a>, the attack shut down computers across the nation\u2019s hospitals and cost the National Health Service \u00a392 million. Crucially, hackers penetrated below the level of IT-based cyber solutions, via a zero-day vulnerability found in out-of-date operating systems, highlighting the need for connected devices to be secure by design.<\/p>\n<p style=\"text-align: justify;\">The implications of a similar attack on cargo fleets would be grave \u2013 particularly given how many safety-critical systems, whose malfunction could result in death or injury to the driver, are internet connected. By 2022, <a href=\"https:\/\/www.consumerwatchdog.org\/sites\/default\/files\/2019-07\/KILL%20SWITCH%20%207-29-19_0.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">two in three new vehicles<\/a> in the United States will have connected safety-critical systems. Ransomware attacks on these systems \u2013 among which include brakes, steering wheels, and airbags \u2013 can stop entire fleets of vehicles from functioning\u00a0or even bring them to a halt on the highways, potentially causing significant casualties. Massive supply-chain chaos would financially harm fleet operators, as well as potentially cause billions of dollars of economic damage.<\/p>\n<p style=\"text-align: justify;\"><b>Understanding ransomware<\/b><\/p>\n<p style=\"text-align: justify;\">How might hackers go about executing such an attack? They\u2019d start by obtaining a small set of target vehicles on which to practice. Hackers would then create a primary malware for infiltrating the vehicles (or fleet IT network), perhaps with the aid of a social engineering attack in which they gain access to sensitive information through malicious (if seemingly legitimate) emails. Their next order of business is finding a mechanism for actually infecting vehicles with the malware, via an over-the-air (OTA) update or through a physical connection, for instance.<\/p>\n<div id=\"div-gpt-ad-1603627919062-756\" class=\"ad-container ad-container--max-width-300 ad-container--float-right\" style=\"text-align: justify;\" data-informa-gam-location=\"article\" data-informa-gam-position=\"inarticle3\" data-informa-gam-context=\"{&quot;contentId&quot;:21130090}\" data-informa-gam-key=\"article_300_3_rht_infinite\" data-gam-path=\"\/21687441225\/fleet.home\/article\/technology\" data-gam-size=\"[[300,250],[300,600]]\" data-gam-size-mapping=\"[{&quot;viewport&quot;:[0,0],&quot;size&quot;:[[300,250]]},{&quot;viewport&quot;:[779,0],&quot;size&quot;:[[300,250],[300,600]]}]\" data-gam-targeting=\"{&quot;pos&quot;:&quot;300_3_rht&quot;,&quot;article_number&quot;:&quot;1&quot;,&quot;ptype&quot;:&quot;Article&quot;,&quot;nid&quot;:&quot;21130090&quot;,&quot;pterm&quot;:&quot;technology&quot;}\" data-gam-collapse=\"true\" data-google-query-id=\"CMeu34Tcz-wCFYUAGwod3vsHbA\">\n<div id=\"google_ads_iframe_\/21687441225\/fleet.home\/article\/technology_18__container__\"><\/div>\n<\/div>\n<p style=\"text-align: justify;\">Malware \u2013 either the primary malware or some secondary malware it has spawned \u2013 then targets the vehicle\u2019s ECU. Executed across an entire connected fleet, the ramifications could be catastrophic.<\/p>\n<p style=\"text-align: justify;\">Even the less calamitous possibilities are troubling to contemplate. Say hackers successfully extort a ransom payment: It\u2019s possible they may simply pocket the payment and allow the attack to proceed anyway \u2013 but even if they unlock the vehicles, fleet owners will still have paid a substantial sum, likely in cryptocurrency payments that authorities won\u2019t be able to trace.<\/p>\n<p style=\"text-align: justify;\"><b>What\u2019s at stake for fleet owners<\/b><\/p>\n<p style=\"text-align: justify;\">The financial costs to business go beyond any payments lost to hackers and not covered by insurance. If a shipping company has its fleet disrupted by a cyber attack, the company will experience substantial downtime between the onset of an attack and its resolution \u2013 and for many businesses, as well as the economy, downtime can prove devastating. In some cases, paying the ransom will be cheaper than going through the necessary steps to remove the ransomware, which could take weeks.<\/p>\n<p style=\"text-align: justify;\">The risk isn\u2019t merely theoretical. After the Australian Toll Group fleet operator was struck by a ransomware attack earlier this year, it <a href=\"https:\/\/www.itnews.com.au\/news\/toll-group-returns-to-normal-after-mailto-ransomware-attack-539507\" target=\"_blank\" rel=\"noopener noreferrer\">took six weeks<\/a> before deliveries and core services were returned to normal operating capabilities.<\/p>\n<p style=\"text-align: justify;\">That attack came on the heels of a 2019 ransomware attack <a href=\"https:\/\/www.freightwaves.com\/news\/aduie-pyle-ceo-opens-up-about-ransomware-attack\" target=\"_blank\" rel=\"noopener noreferrer\">targeting<\/a> Pennsylvania-based trucking company A.Duie Pyle; it took days before the company was back online, and once systems were restored, the company had to rebuild all its applications. And while the financial cost was never disclosed, it\u2019s clear that the fleet operator, their customers and others in the economic shipping chain, were hurt financially.<\/p>\n<p style=\"text-align: justify;\">To avoid a hit to business \u2013 or worse \u2013 fleet owners need cybersecurity solutions that can be implemented across their entire fleets during production as well as in the aftermarket. Because a fleet is only as secure as its least secure vehicle, it\u2019s essential that each and every vehicle in the fleet is cyber-secure. For automakers to safeguard vehicles against ransomware threats, security-by-design must be the fundamental principle underpinning every aspect of the vehicle; more importantly, for models already on the road, aftermarket solutions are necessary for all fleet vehicles. Fortunately, for manufacturers, solutions currently exist that can be easily retrofitted to existing trucks at minimal costs.<\/p>\n<p style=\"text-align: justify;\">By providing ongoing monitoring of all messages transmitted in the vehicle network, an automotive cybersecurity solution can guard against both known and unknown threats, preventing infiltrations.<\/p>\n<p style=\"text-align: justify;\">In this increasingly connected age, it\u2019s inevitable that virtually every organization will face a hacking attempt \u2013 and for hackers looking to maximize their impact, cargo fleets represent prime targets. Only by fortifying each vehicle in their fleet against this threat can fleet owners stop hackers in their tracks.<\/p>\n<p>&nbsp;<\/p>\n<p><span class=\"page-attribution__content-name\"><a href=\"https:\/\/www.fleetowner.com\/home\/contact\/21704594\/joseph-evangelist\"><i>By Moshe Shlisel, CEO and co-founder of\u00a0<a href=\"https:\/\/www.guardknox.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">GuardKnox<\/a><\/i><\/a><\/span><time datetime=\"2018-10-12T12:28:35+00:00\"> <\/time><\/p>\n<p><span class=\"posted-by\">Source: <a href=\"https:\/\/www.fleetowner.com\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.fleetowner.com<\/a><\/span><\/p>\n<h3 style=\"text-align: center;\"><a href=\"https:\/\/advancedfleetmanagementconsulting.com\/eng\/consultancy\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>CUT COTS OF THE FLEET WITH OUR AUDIT PROGRAM<\/strong><\/a><\/h3>\n<p><a href=\"https:\/\/advancedfleetmanagementconsulting.com\/eng\/consultancy\/\"><img loading=\"lazy\" class=\"aligncenter wp-image-5377\" src=\"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-content\/uploads\/sites\/3\/2020\/04\/nueva-ley-auditoria.jpg\" sizes=\"(max-width: 858px) 100vw, 858px\" srcset=\"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-content\/uploads\/sites\/3\/2020\/04\/nueva-ley-auditoria.jpg 2000w, https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-content\/uploads\/sites\/3\/2020\/04\/nueva-ley-auditoria-300x200.jpg 300w, https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-content\/uploads\/sites\/3\/2020\/04\/nueva-ley-auditoria-1024x682.jpg 1024w\" alt=\"\" width=\"858\" height=\"572\" \/><\/a><\/p>\n<p style=\"text-align: justify;\">The audit is a key tool to know the overall status and provide the analysis, the assessment, the advice, the suggestions and the actions to take in order to cut costs and increase the efficiency and efficacy of the fleet. We propose the following fleet management audit.<\/p>\n<h3 style=\"text-align: center;\"><a href=\"https:\/\/advancedfleetmanagementconsulting.com\/eng\/consultancy\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>FLEET MANAGEMENT AUDIT<\/strong><\/a><\/h3>\n","protected":false},"excerpt":{"rendered":"<p>For hackers, any system with Wi-Fi, Bluetooth, GPS, or Internet connectivity \u2013 including federally-mandated electronic logging devices (ELDs) for trucking and transportation fleets \u2013 represents an enticing entry point for attack. Today\u2019s cargo fleets are integrating more and more connected technologies, bringing substantial improvements in performance. But greater connectivity also means greater vulnerability to cyber&#8230;<\/p>\n","protected":false},"author":3,"featured_media":8158,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[18],"tags":[361],"_links":{"self":[{"href":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-json\/wp\/v2\/posts\/8157"}],"collection":[{"href":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-json\/wp\/v2\/comments?post=8157"}],"version-history":[{"count":1,"href":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-json\/wp\/v2\/posts\/8157\/revisions"}],"predecessor-version":[{"id":8159,"href":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-json\/wp\/v2\/posts\/8157\/revisions\/8159"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-json\/wp\/v2\/media\/8158"}],"wp:attachment":[{"href":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-json\/wp\/v2\/media?parent=8157"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-json\/wp\/v2\/categories?post=8157"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-json\/wp\/v2\/tags?post=8157"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}