Read more about digitalisation in the Rotterdam region.
Because it is still very much on everyone’s mind how a major cyber-attack in 2017 struck Europe’s largest main port as well, with a subsidiary of logistics company Maersk being one of the bigger victims. A total loss of €300 million underlined the dependence on IT and the need to do something about security. Then.
Today, it is essential to keep developing and to always stay one step ahead. In 2022, cyberattacks are listed as a risk to the national security of the Netherlands, as our partner NCSC (the Dutch National Cyber Security Center) noted in their latest Cyber Security Assessment Netherlands. Bridging the gap to new threats as a result of geopolitical developments, we find the main vulnerability at the moment in the disruption of logistic processes. If you look at how disruptive it was for the world economy that one ship blocked the Suez Canal, then you can imagine what effect it has when part of the port is disrupted.
Cyber security throughout the value chain
The digital revolution has changed the way we work. It has made our world bigger, but also smaller. It brings new opportunities, but also new risks. Risks that could cost us money.
The port of Rotterdam is huge – both physically and in terms of gross domestic product, with its 6.2 percent share in the Dutch economy. It is a highly connected infrastructure and therefore vulnerable, from maritime and logistics to energy and chemicals. The impact is often significant – just look at the aforementioned example in 2017, but also far more recent incidents including the chaos for our 'neighbours' in Antwerp, Ghent, Terneuzen and Germany in February and March, and the impact on Colonial Pipeline in the US in 2021.
Cybersecurity is a very complex playing field consisting of actors, threats, vulnerabilities, interests, implications across various axes, system processes – and, of course, the people who ultimately do their work every day. What makes the port special is first of all the impact in the logistics chains. That also makes the state threat from the war in Ukraine more tangible than elsewhere. Within the Port Industrial Complex (HIC), companies are highly dependent on each other, and our processes are interconnected. Moreover, almost all of us depend on information technology (IT) and operational technology (OT).
Realistic threats
Criminal organisations are becoming increasingly active. The average ransom amount after a ransomware attack has risen to €150,000, while recovery costs have more than doubled in a year: from €631,000 to €1.5 million. Due to the pandemic, the rise of the cloud and the acceleration of digital transformation, both software (Saas) and products (PaaS) are experiencing tremendous growth. This allows users to purchase 'off-the-shelf' solutions that are developed or even managed by vendors from start to finish. Following the same model, groups of cybercriminals make their tools and techniques available to those who do not have the resources or sufficient technical knowledge. Tools to penetrate systems via spam emails sometimes come with a toolkit, a detailed user manual (either in writing or on video). It is hard to imagine an easier way to take your first steps into the lucrative world of cybercrime, which makes cyber-attacks extremely accessible.
This relatively low-threshold availability of ransomware via a RaaS model goes hand in hand with the worrying rise of organised gangs, which, as in the 'classic' underworld, are entering into far-reaching partnerships to roll out cybercrime as a serious business. It is partly because of this development that so many new forms of malware and ransomware have emerged in recent years, including the concept of "ransomware-as-a-service", where there are indications that the malware was distributed via online sales of partner programs.
In general, cybercriminals continue to scour the digital attack surface for new attack opportunities, such as Internet infrastructures and network communication protocols. A ransomware attack is usually not a rampage, but a painstaking process in which the perpetrators take several steps to make their money from your data. They know how to (1) gain access, e.g. via phishing (an employee clicks on an unfortunate link), after which they (2) move through the network unseen to quietly see what can be gained, or only then (3) proceed to steal, take hostage or render business-critical data unusable.