The shipping giant Mediterranean Shipping Company (MSC) discloses a malware-based attack that took place on April 10.
The incident affected the company’s data center and took down its website, msc.com, and its myMSC customer and vendor portal.
“The incident was confined to MSC’s headquarters in Geneva only and affected the availability of some of MSC’s digital tools and msc.com for a few days during the Easter holiday long weekend. MSC agencies remained fully functional and continued serving customers as usual during this time.” reads the advisory published by MSC.
“After a thorough investigation, we confirmed that it was confined to a limited number of physical computer systems in Geneva only and we determined that it was a malware attack based on an engineered targeted vulnerability. We have shared as per industry standards the malware with our technology partners so that mitigations could be made available not only to us.”
The company announced that it has resolved the problems and recovered its portals.
The company did not reveal the family of malware that infected its systems, the outage caused by the infection suggests a possible involvement of ransomware.
Fortunately, the incident did not impact the company’s business, MSC confirmed that it is not aware of any data that has been compromised after the security breach.
“During the network outage, MSC’s global agencies and our people around the world continued to serve customers as usual in most cases. All MSC departments, terminals, depots etc. operated without disruptions and the incident posed no threat to parties engaging in business with the company,” continues the advisory.
Other major shipping companies were hit by malware that caused severe losses, including Maersk, COSCO, and Toll Group.
| [adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – malware, ransomware)
[adrotate banner=”5″]
[adrotate banner=”13″]
Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…
A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…
A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…
Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…
Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…
This website uses cookies.