Company Details
maersk-group
79,448
2,242,896
47
maersk.com
232
A.P_1351900
Completed

A.P. Moller - Maersk Company CyberSecurity Posture
maersk.comA.P. Moller - Maersk is an integrated transport and logistics company; going all the way, together, for our customers and society. ALL THE WAY is our commitment to connect the world so that everyone has both the possibility and the ability to trade, grow and thrive. The company employs roughly 110.000 employees across operations in 130 countries.
Company Details
maersk-group
79,448
2,242,896
47
maersk.com
232
A.P_1351900
Completed
Between 800 and 849

AMM Global Score (TPRM)XXXX

Description: In 2017, Maersk, the world’s largest shipping company, fell victim to the **NotPetya cyberattack**, a destructive malware campaign attributed to Russian military hackers. The attack originated from a compromised update in Ukrainian accounting software, rapidly spreading across Maersk’s global network. The incident forced the **shutdown of 76 port terminals**, disrupted **over 45,000 PCs and 4,000 servers**, and paralyzed critical operations, including cargo tracking, booking systems, and communication channels.The financial and operational impact was severe, with Maersk estimating losses between **$250–$300 million** due to halted shipments, delayed deliveries, and recovery efforts. The attack exposed deep vulnerabilities in the company’s IT infrastructure, particularly its reliance on interconnected systems without adequate segmentation. While Maersk managed to restore operations within weeks by reinstalling entire systems from backups, the incident highlighted the maritime sector’s susceptibility to **state-sponsored cyber warfare** and the cascading effects of a single breach on global trade.The attack also triggered industry-wide alarm, prompting Maersk and other shipping giants to invest heavily in cybersecurity upgrades, including network isolation, endpoint protection, and employee training to mitigate future threats.


No incidents recorded for A.P. Moller - Maersk in 2025.
No incidents recorded for A.P. Moller - Maersk in 2025.
No incidents recorded for A.P. Moller - Maersk in 2025.
AMM cyber incidents detection timeline including parent company and subsidiaries

A.P. Moller - Maersk is an integrated transport and logistics company; going all the way, together, for our customers and society. ALL THE WAY is our commitment to connect the world so that everyone has both the possibility and the ability to trade, grow and thrive. The company employs roughly 110.000 employees across operations in 130 countries.


Ecom Express: Delivering Over 1.9 Billion Reasons to Trust Us Based in Gurugram, Ecom Express was established in 2012 by veterans backed by 100+ years of collective logistics expertise. We aren't just a logistics provider—we're your partner in bridging distances and making connections. Our network
We make everyday life easier. PostNord is a leading provider of parcel and logistics services to, from, and within the Nordic region. We ensure the provision of a postal service to households and businesses in Sweden, regardless of where they live and work. PostNord connects companies, public auth
With more than 82,000 employees at almost 1,300 sites in close to 100 countries, the Kuehne+Nagel Group is one of the world's leading logistics providers. Headquartered in Switzerland, Kuehne+Nagel is listed in the Swiss blue-chip stock market index, the SMI. The Group is the global number one in

Yusen Logistics is the insight-driven, customer-centric logistics partner to global business. We deliver this through an extended range of services from International Freight Forwarding and Contract Logistics to Supply Chain Solutions and Industry insights covering the full supply chain. We invest

DTDC Express Ltd is one of India’s leading integrated express logistics company offering domestic and international services. DTDC offers a comprehensive range of technology-enabled logistics services, serving a wide spectrum of customers across diverse industry verticals. Today, DTDC operates India

Leading the way in international logistics across an unparalleled network of 220 countries and territories. With decades of experience, we’re your ideal partner for flexible, sustainable shipping to support your growing business and help you expand into new markets. DHL website terms and conditions

Premier réseau commercial de proximité en France, le groupe La Poste est organisé en 4 branches d’activité : Services-Courrier-Colis, Banque et Assurance, Distributeur physique et numérique, GeoPost/DPDGroup pour l'international. Présent dans plus de 63 pays, sur 5 continents, il a réalisé un chiffr

bpostgroup is a leading logistics expert, active in Europe, North-America and Asia. Whether it's as a parcel-sized last mile partner with mail products in Belgium and the Netherlands, a specialized operator in the high value logistics markets or through our leading cross-border network: we excel thr
PSA International (PSA) is a leading global port operator and trusted partner to cargo stakeholders. Currently, PSA’s portfolio comprises over 70 deepsea, rail and inland terminals, across more than 180 locations in 45 countries – including two flagship port operations in Singapore and Belgium. Draw
.png)
Explore how Maersk's cyber incident reshaped cybersecurity strategies in European shipping. Learn essential lessons to protect maritime...
2017 ransomware attack on shipping company A P Moller Maersk marked a turning point for the cybersecurity industry, according to its former...
A new Coast Guard rule for cybersecurity in the US marine transportation system will go into effect in July.
Explore why cybersecurity is vital in logistics, how it protects supply chains from evolving digital threats, and advanced security measures...
When it comes to cyber safety, you're only as strong as your weakest link. Hear from @Andy Powell, CISO @A.P. Moller - Maersk on why...
Security leaders must strengthen their defenses against everyday threats while preparing for potentially devastating attacks.
With new rules on Cyber Security coming down from the U.S. Coast Guard, Angeliki Zisimatou, Director Cybersecurity, ABS,…
While AI's rapid growth carries cyber vulnerability risks the tech also promises improvements in profiling the very cybersecurity threats it...
In the 19th century, Prussian general Carl von Clausewitz famously stated that war is politics by other means. Nearly two hundred years...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of A.P. Moller - Maersk is http://www.maersk.com.
According to Rankiteo, A.P. Moller - Maersk’s AI-generated cybersecurity score is 801, reflecting their Good security posture.
According to Rankiteo, A.P. Moller - Maersk currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, A.P. Moller - Maersk is not certified under SOC 2 Type 1.
According to Rankiteo, A.P. Moller - Maersk does not hold a SOC 2 Type 2 certification.
According to Rankiteo, A.P. Moller - Maersk is not listed as GDPR compliant.
According to Rankiteo, A.P. Moller - Maersk does not currently maintain PCI DSS compliance.
According to Rankiteo, A.P. Moller - Maersk is not compliant with HIPAA regulations.
According to Rankiteo,A.P. Moller - Maersk is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
A.P. Moller - Maersk operates primarily in the Transportation, Logistics, Supply Chain and Storage industry.
A.P. Moller - Maersk employs approximately 79,448 people worldwide.
A.P. Moller - Maersk presently has no subsidiaries across any sectors.
A.P. Moller - Maersk’s official LinkedIn profile has approximately 2,242,896 followers.
A.P. Moller - Maersk is classified under the NAICS code 47, which corresponds to Transportation and Warehousing.
No, A.P. Moller - Maersk does not have a profile on Crunchbase.
Yes, A.P. Moller - Maersk maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/maersk-group.
As of December 14, 2025, Rankiteo reports that A.P. Moller - Maersk has experienced 1 cybersecurity incidents.
A.P. Moller - Maersk has an estimated 6,259 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack.
Total Financial Loss: The total financial loss from these incidents is estimated to be $300 million.
Detection and Response: The company detects and responds to cybersecurity incidents through an incident response plan activated with maersk (notpetya: global it recovery), incident response plan activated with port of rijeka (unspecified), incident response plan activated with u.s. coast guard mandates (2025 rule), and third party assistance with cybersecurity firms (e.g., maersk’s recovery), third party assistance with government agencies (e.g., nato ccdcoe warnings), and law enforcement notified with maersk (notpetya attributed to russian military), law enforcement notified with potential notifications for port of rijeka/marinemax, and containment measures with isolation of infected systems (maersk), containment measures with manual overrides (ot failures), containment measures with gnss backup systems (jamming mitigation), and remediation measures with system rebuilds (maersk: 45,000 pcs/4,000 servers), remediation measures with software patching (outdated systems), remediation measures with supply chain audits (third-party risks), and recovery measures with maersk: 10-day global recovery (notpetya), recovery measures with port of rijeka: data restoration (8base), recovery measures with iranian tankers: communications reestablishment, and communication strategy with public disclosures (maersk, marinemax), communication strategy with stakeholder advisories (imo/nis2 compliance), communication strategy with customer notifications (data breaches), and network segmentation with recommended (e.g., imo guidelines), and enhanced monitoring with marlink’s threat tracking (1,800 vessels, 2024), enhanced monitoring with ai-driven anomaly detection (emerging)..
Title: Maritime Cybersecurity Threats and Incidents (2017–2024)
Description: The maritime sector, including ships, ports, and terminals, faces escalating cyber threats due to modernization, geopolitical tensions, and the adoption of AI. Incidents range from ransomware attacks (e.g., Maersk's NotPetya in 2017) to GNSS jamming/spoofing and AI-powered attacks. Vulnerabilities stem from outdated systems, supply chain risks, lack of in-house expertise (only 17% of shipyards have cybersecurity capabilities), and fragmented cybersecurity governance across public/private actors. High-profile cases include the MV Dali power loss (2024, no confirmed cyberattack but raised concerns), the Port of Rijeka ransomware attack by 8Base, and Lab-Dookhtegan’s disruption of 60+ Iranian oil tankers. Regulatory responses include the U.S. Coast Guard’s 2025 rule, EU’s NIS2 Directive, and IMO’s updated ISM Code guidelines.
Type: Ransomware
Attack Vector: Compromised Software Updates (NotPetya via Ukrainian accounting software)Phishing/Social EngineeringOutdated/Poorly Maintained SystemsThird-Party Vendor VulnerabilitiesGNSS Jamming/Spoofing (Russia, Iran, China)AI-Assisted Exploits (e.g., subverting AI assistants)Manual Override of Digital Systems (human error)
Vulnerability Exploited: Lack of In-House Cybersecurity Expertise (17% of shipyards)Fragmented Cybersecurity Governance (no common procedures)Limited Supply Chain Visibility (beyond first-tier vendors)Outdated Software (e.g., Iranian oil tankers)Poorly Secured OT Systems (e.g., MV Dali electrical blackout)Absence of Standardized Risk AssessmentsInsufficient Workforce Training (phishing/social engineering)
Threat Actor: Name: Russian Military (NotPetya), Type: State-Sponsored, Motivation: Geopolitical Disruption, Name: 8Base Ransomware Group, Type: Financially Motivated, Motivation: Extortion, Name: Lab-Dookhtegan, Type: Hacktivist/State-Aligned, Motivation: Disruption (targeted Iranian maritime sector), Name: Unspecified State Actors (Russia, Iran, China), Type: State-Sponsored, Motivation: GNSS Jamming/Spoofing for Strategic Advantage, Name: Financially Motivated Hackers, Type: Cybercriminal, Motivation: Ransomware/Data Theft.
Motivation: Financial Gain (Ransomware)Geopolitical Disruption (State Actors)Espionage (Strategic Maritime Data)Hacktivism (e.g., Lab-Dookhtegan)Operational Sabotage (e.g., GNSS Interference)
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Compromised Software Update (NotPetya via Ukrainian accounting software)Phishing/Social Engineering (MarineMax and Port of Rijeka)Outdated Software (Iranian Tankers)Third-Party Vendor Vulnerabilities (Supply Chain).

Financial Loss: Maersk: $300M (NotPetya, 2017)Unspecified losses for MarineMax, Port of Rijeka, and other targets
Data Compromised: Financial records (maersk, marinemax, port of rijeka), Employee/customer data (marinemax), Shipping routes/cargo data (ports), Personal data (port of rijeka: invoices, contracts, accounting records), Navigation/logistics data (gnss spoofing)
Systems Affected: 76 Port Terminals (Maersk, 2017)45,000+ PCs and 4,000 Servers (Maersk)Accounting Systems (MarineMax)Communications (60+ Iranian Oil Tankers)GNSS Navigation (Jamming/Spoofing)OT Systems (MV Dali power loss)
Downtime: ['Maersk: Weeks (NotPetya)', 'Port of Rijeka: Unspecified (8Base Attack)', 'Iranian Tankers: Communications Disabled (Lab-Dookhtegan)']
Operational Impact: Collapse of Francis Scott Key Bridge (MV Dali, indirect)Disruption of 80% Global Trade (Port Targeting)Manual Overrides Required (Digital System Failures)Supply Chain Delays (Ransomware/OT Attacks)
Revenue Loss: ['Maersk: $300M (2017)', 'Potential losses for Port of Rijeka, MarineMax, and other entities']
Customer Complaints: ['Likely for MarineMax (data breach)', 'Potential for Maersk/Port of Rijeka (service disruptions)']
Brand Reputation Impact: Maersk (NotPetya)MarineMax (Customer/Employee Data Exposure)Port of Rijeka (Confidential Data Theft)
Legal Liabilities: Potential GDPR Violations (EU Ports)U.S. Coast Guard Reporting Requirements (2025 Rule)IMO ISM Code Non-Compliance Risks
Identity Theft Risk: ['Employee/Customer Data (MarineMax, Port of Rijeka)']
Payment Information Risk: ['Financial Records (Maersk, MarineMax, Port of Rijeka)']
Average Financial Loss: The average financial loss per incident is $300.00 million.
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Financial Records, Employee Data, Customer Data, Shipping Routes/Cargo Data, Personal Data (Contracts, Invoices), Accounting Records and .

Entity Name: Maersk
Entity Type: Shipping Company
Industry: Maritime/Logistics
Location: Global (HQ: Denmark)
Size: Large (World’s largest shipping company)
Customers Affected: Global supply chain partners

Entity Name: Port of Rijeka
Entity Type: Port Authority
Industry: Maritime/Logistics
Location: Croatia
Size: Medium

Entity Name: MarineMax
Entity Type: Boat Retailer
Industry: Maritime/Retail
Location: USA
Size: Large
Customers Affected: Yes (financial/employee/customer data)

Entity Name: Iranian Oil Tankers (60+ vessels)
Entity Type: Shipping Fleet
Industry: Oil/Gas Maritime
Location: Iran/Global
Size: Large

Entity Name: MV Dali
Entity Type: Cargo Ship
Industry: Maritime
Location: Baltimore, USA (incident location)
Size: Medium

Entity Name: Francis Scott Key Bridge
Entity Type: Infrastructure
Industry: Transportation
Location: Baltimore, USA

Incident Response Plan Activated: ['Maersk (NotPetya: Global IT Recovery)', 'Port of Rijeka (Unspecified)', 'U.S. Coast Guard Mandates (2025 Rule)']
Third Party Assistance: Cybersecurity Firms (E.G., Maersk’S Recovery), Government Agencies (E.G., Nato Ccdcoe Warnings).
Law Enforcement Notified: Maersk (NotPetya attributed to Russian military), Potential notifications for Port of Rijeka/MarineMax,
Containment Measures: Isolation of Infected Systems (Maersk)Manual Overrides (OT Failures)GNSS Backup Systems (Jamming Mitigation)
Remediation Measures: System Rebuilds (Maersk: 45,000 PCs/4,000 servers)Software Patching (Outdated Systems)Supply Chain Audits (Third-Party Risks)
Recovery Measures: Maersk: 10-Day Global Recovery (NotPetya)Port of Rijeka: Data Restoration (8Base)Iranian Tankers: Communications Reestablishment
Communication Strategy: Public Disclosures (Maersk, MarineMax)Stakeholder Advisories (IMO/NIS2 Compliance)Customer Notifications (Data Breaches)
Network Segmentation: ['Recommended (e.g., IMO Guidelines)']
Enhanced Monitoring: Marlink’s Threat Tracking (1,800 vessels, 2024)AI-Driven Anomaly Detection (Emerging)
Incident Response Plan: The company's incident response plan is described as Maersk (NotPetya: Global IT Recovery), Port of Rijeka (Unspecified), U.S. Coast Guard Mandates (2025 Rule), .
Third-Party Assistance: The company involves third-party assistance in incident response through Cybersecurity Firms (e.g., Maersk’s recovery), Government Agencies (e.g., NATO CCDCOE warnings), .

Type of Data Compromised: Financial records, Employee data, Customer data, Shipping routes/cargo data, Personal data (contracts, invoices), Accounting records
Sensitivity of Data: High (financial, PII, operational)
Data Exfiltration: Port of Rijeka (8Base claimed theft)MarineMax (online exposure)Potential in NotPetya (Maersk)
Data Encryption: ['Ransomware Encryption (NotPetya, 8Base)']
File Types Exposed: InvoicesReceiptsEmployment ContractsAccounting RecordsNavigation Logs (GNSS Data)
Personally Identifiable Information: Employee/Customer Data (MarineMax, Port of Rijeka)
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: System Rebuilds (Maersk: 45,000 PCs/4,000 servers), Software Patching (Outdated Systems), Supply Chain Audits (Third-Party Risks), .
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by isolation of infected systems (maersk), manual overrides (ot failures), gnss backup systems (jamming mitigation) and .

Ransom Demanded: ['8Base (Port of Rijeka: unspecified)', 'NotPetya (Maersk: no ransom demanded, wiper malware)']
Ransom Paid: Maersk: None (NotPetya was wiper malware)Port of Rijeka: Unspecified
Ransomware Strain: NotPetya (2017)8Base (2024)
Data Encryption: ['NotPetya (Maersk)', '8Base (Port of Rijeka)']
Data Exfiltration: ['8Base (Port of Rijeka: claimed theft)']
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through Maersk: 10-Day Global Recovery (NotPetya), Port of Rijeka: Data Restoration (8Base), Iranian Tankers: Communications Reestablishment, .

Regulations Violated: Potential GDPR (EU Ports/Data Breaches), IMO ISM Code (Cybersecurity Integration), U.S. Coast Guard 2025 Rule (Incident Reporting),
Regulatory Notifications: Mandatory under NIS2 (EU)U.S. Coast Guard National Response Center (2025 Rule)IMO MSC.428(98) Reporting

Lessons Learned: Fragmented cybersecurity governance increases risk; standardized procedures are critical., Supply chain visibility must extend beyond first-tier vendors to mitigate third-party risks., OT systems (e.g., ship navigation) require air-gapping/segmentation to prevent cascading failures., Workforce training is essential to counter phishing/social engineering (human error = top risk)., AI-powered attacks demand continuous threat monitoring and adaptive defenses., GNSS jamming/spoofing highlights the need for redundant navigation systems., Regulatory compliance (NIS2, IMO, U.S. Coast Guard) is evolving; proactive adaptation is necessary.

Recommendations: Implement **network segmentation** to isolate OT/IT systems (e.g., ship navigation vs. accounting)., Conduct **continuous risk assessments** for AI-driven and supply chain threats., Establish **cross-sector collaboration** (public/private info-sharing on threats)., Mandate **cybersecurity training** for all staff, including manual override procedures., Adopt **IMO ISM Code updates** and align with NIS2/U.S. Coast Guard requirements., Deploy **GNSS backup systems** (e.g., inertial navigation) to counter jamming/spoofing., Invest in **third-party vendor audits** to map supply chain risks beyond Tier 1., Develop **incident response playbooks** for ransomware, OT failures, and data breaches., Leverage **AI for threat detection** while securing AI systems against adversarial attacks., Appoint **dedicated Cybersecurity Officers** (per U.S. Coast Guard 2025 rule).Implement **network segmentation** to isolate OT/IT systems (e.g., ship navigation vs. accounting)., Conduct **continuous risk assessments** for AI-driven and supply chain threats., Establish **cross-sector collaboration** (public/private info-sharing on threats)., Mandate **cybersecurity training** for all staff, including manual override procedures., Adopt **IMO ISM Code updates** and align with NIS2/U.S. Coast Guard requirements., Deploy **GNSS backup systems** (e.g., inertial navigation) to counter jamming/spoofing., Invest in **third-party vendor audits** to map supply chain risks beyond Tier 1., Develop **incident response playbooks** for ransomware, OT failures, and data breaches., Leverage **AI for threat detection** while securing AI systems against adversarial attacks., Appoint **dedicated Cybersecurity Officers** (per U.S. Coast Guard 2025 rule).Implement **network segmentation** to isolate OT/IT systems (e.g., ship navigation vs. accounting)., Conduct **continuous risk assessments** for AI-driven and supply chain threats., Establish **cross-sector collaboration** (public/private info-sharing on threats)., Mandate **cybersecurity training** for all staff, including manual override procedures., Adopt **IMO ISM Code updates** and align with NIS2/U.S. Coast Guard requirements., Deploy **GNSS backup systems** (e.g., inertial navigation) to counter jamming/spoofing., Invest in **third-party vendor audits** to map supply chain risks beyond Tier 1., Develop **incident response playbooks** for ransomware, OT failures, and data breaches., Leverage **AI for threat detection** while securing AI systems against adversarial attacks., Appoint **dedicated Cybersecurity Officers** (per U.S. Coast Guard 2025 rule).Implement **network segmentation** to isolate OT/IT systems (e.g., ship navigation vs. accounting)., Conduct **continuous risk assessments** for AI-driven and supply chain threats., Establish **cross-sector collaboration** (public/private info-sharing on threats)., Mandate **cybersecurity training** for all staff, including manual override procedures., Adopt **IMO ISM Code updates** and align with NIS2/U.S. Coast Guard requirements., Deploy **GNSS backup systems** (e.g., inertial navigation) to counter jamming/spoofing., Invest in **third-party vendor audits** to map supply chain risks beyond Tier 1., Develop **incident response playbooks** for ransomware, OT failures, and data breaches., Leverage **AI for threat detection** while securing AI systems against adversarial attacks., Appoint **dedicated Cybersecurity Officers** (per U.S. Coast Guard 2025 rule).Implement **network segmentation** to isolate OT/IT systems (e.g., ship navigation vs. accounting)., Conduct **continuous risk assessments** for AI-driven and supply chain threats., Establish **cross-sector collaboration** (public/private info-sharing on threats)., Mandate **cybersecurity training** for all staff, including manual override procedures., Adopt **IMO ISM Code updates** and align with NIS2/U.S. Coast Guard requirements., Deploy **GNSS backup systems** (e.g., inertial navigation) to counter jamming/spoofing., Invest in **third-party vendor audits** to map supply chain risks beyond Tier 1., Develop **incident response playbooks** for ransomware, OT failures, and data breaches., Leverage **AI for threat detection** while securing AI systems against adversarial attacks., Appoint **dedicated Cybersecurity Officers** (per U.S. Coast Guard 2025 rule).Implement **network segmentation** to isolate OT/IT systems (e.g., ship navigation vs. accounting)., Conduct **continuous risk assessments** for AI-driven and supply chain threats., Establish **cross-sector collaboration** (public/private info-sharing on threats)., Mandate **cybersecurity training** for all staff, including manual override procedures., Adopt **IMO ISM Code updates** and align with NIS2/U.S. Coast Guard requirements., Deploy **GNSS backup systems** (e.g., inertial navigation) to counter jamming/spoofing., Invest in **third-party vendor audits** to map supply chain risks beyond Tier 1., Develop **incident response playbooks** for ransomware, OT failures, and data breaches., Leverage **AI for threat detection** while securing AI systems against adversarial attacks., Appoint **dedicated Cybersecurity Officers** (per U.S. Coast Guard 2025 rule).Implement **network segmentation** to isolate OT/IT systems (e.g., ship navigation vs. accounting)., Conduct **continuous risk assessments** for AI-driven and supply chain threats., Establish **cross-sector collaboration** (public/private info-sharing on threats)., Mandate **cybersecurity training** for all staff, including manual override procedures., Adopt **IMO ISM Code updates** and align with NIS2/U.S. Coast Guard requirements., Deploy **GNSS backup systems** (e.g., inertial navigation) to counter jamming/spoofing., Invest in **third-party vendor audits** to map supply chain risks beyond Tier 1., Develop **incident response playbooks** for ransomware, OT failures, and data breaches., Leverage **AI for threat detection** while securing AI systems against adversarial attacks., Appoint **dedicated Cybersecurity Officers** (per U.S. Coast Guard 2025 rule).Implement **network segmentation** to isolate OT/IT systems (e.g., ship navigation vs. accounting)., Conduct **continuous risk assessments** for AI-driven and supply chain threats., Establish **cross-sector collaboration** (public/private info-sharing on threats)., Mandate **cybersecurity training** for all staff, including manual override procedures., Adopt **IMO ISM Code updates** and align with NIS2/U.S. Coast Guard requirements., Deploy **GNSS backup systems** (e.g., inertial navigation) to counter jamming/spoofing., Invest in **third-party vendor audits** to map supply chain risks beyond Tier 1., Develop **incident response playbooks** for ransomware, OT failures, and data breaches., Leverage **AI for threat detection** while securing AI systems against adversarial attacks., Appoint **dedicated Cybersecurity Officers** (per U.S. Coast Guard 2025 rule).Implement **network segmentation** to isolate OT/IT systems (e.g., ship navigation vs. accounting)., Conduct **continuous risk assessments** for AI-driven and supply chain threats., Establish **cross-sector collaboration** (public/private info-sharing on threats)., Mandate **cybersecurity training** for all staff, including manual override procedures., Adopt **IMO ISM Code updates** and align with NIS2/U.S. Coast Guard requirements., Deploy **GNSS backup systems** (e.g., inertial navigation) to counter jamming/spoofing., Invest in **third-party vendor audits** to map supply chain risks beyond Tier 1., Develop **incident response playbooks** for ransomware, OT failures, and data breaches., Leverage **AI for threat detection** while securing AI systems against adversarial attacks., Appoint **dedicated Cybersecurity Officers** (per U.S. Coast Guard 2025 rule).Implement **network segmentation** to isolate OT/IT systems (e.g., ship navigation vs. accounting)., Conduct **continuous risk assessments** for AI-driven and supply chain threats., Establish **cross-sector collaboration** (public/private info-sharing on threats)., Mandate **cybersecurity training** for all staff, including manual override procedures., Adopt **IMO ISM Code updates** and align with NIS2/U.S. Coast Guard requirements., Deploy **GNSS backup systems** (e.g., inertial navigation) to counter jamming/spoofing., Invest in **third-party vendor audits** to map supply chain risks beyond Tier 1., Develop **incident response playbooks** for ransomware, OT failures, and data breaches., Leverage **AI for threat detection** while securing AI systems against adversarial attacks., Appoint **dedicated Cybersecurity Officers** (per U.S. Coast Guard 2025 rule).
Key Lessons Learned: The key lessons learned from past incidents are Fragmented cybersecurity governance increases risk; standardized procedures are critical.,Supply chain visibility must extend beyond first-tier vendors to mitigate third-party risks.,OT systems (e.g., ship navigation) require air-gapping/segmentation to prevent cascading failures.,Workforce training is essential to counter phishing/social engineering (human error = top risk).,AI-powered attacks demand continuous threat monitoring and adaptive defenses.,GNSS jamming/spoofing highlights the need for redundant navigation systems.,Regulatory compliance (NIS2, IMO, U.S. Coast Guard) is evolving; proactive adaptation is necessary.

Source: NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE)
URL: https://ccdcoe.org/

Source: Marlink’s 2024 Maritime Cyber Threat Report

Source: U.S. Coast Guard 2025 Cybersecurity Rule

Source: EU NIS2 Directive
URL: https://digital-strategy.ec.europa.eu/en/policies/nis2-directive

Source: Maersk NotPetya Post-Incident Report

Source: Port of Rijeka 8Base Ransomware Attack (2024)
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE)Url: https://ccdcoe.org/, and Source: Marlink’s 2024 Maritime Cyber Threat Report, and Source: U.S. Coast Guard 2025 Cybersecurity RuleUrl: https://www.uscg.mil/, and Source: EU NIS2 DirectiveUrl: https://digital-strategy.ec.europa.eu/en/policies/nis2-directive, and Source: IMO ISM Code (MSC.428(98))Url: https://www.imo.org/, and Source: Maersk NotPetya Post-Incident Report, and Source: Port of Rijeka 8Base Ransomware Attack (2024).

Investigation Status: ['Maersk NotPetya: Attributed to Russian military (confirmed)', 'MV Dali: No confirmed cyberattack (electrical failure under investigation)', 'Port of Rijeka: Ongoing (8Base claims unverified)', 'Iranian Tankers: Lab-Dookhtegan claimed responsibility (verified communications disruption)']
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Public Disclosures (Maersk, Marinemax), Stakeholder Advisories (Imo/Nis2 Compliance) and Customer Notifications (Data Breaches).

Stakeholder Advisories: Imo: Urges Cyber Risk Assessments And Ism Code Integration., Nato Ccdcoe: Warns Of State-Sponsored Threats To Port Infrastructure., U.S. Coast Guard: Mandates Cybersecurity Officers And Incident Reporting By 2025., Eu: Nis2 Directive Requires Maritime Operators To Report Incidents And Secure Supply Chains..
Customer Advisories: Maersk: Notified partners of NotPetya impact (2017).MarineMax: Advised customers on data breach risks (2024).Port of Rijeka: Likely notified stakeholders of ransomware attack (2024).
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Imo: Urges Cyber Risk Assessments And Ism Code Integration., Nato Ccdcoe: Warns Of State-Sponsored Threats To Port Infrastructure., U.S. Coast Guard: Mandates Cybersecurity Officers And Incident Reporting By 2025., Eu: Nis2 Directive Requires Maritime Operators To Report Incidents And Secure Supply Chains., Maersk: Notified Partners Of Notpetya Impact (2017)., Marinemax: Advised Customers On Data Breach Risks (2024)., Port Of Rijeka: Likely Notified Stakeholders Of Ransomware Attack (2024). and .

Entry Point: Compromised Software Update (Notpetya Via Ukrainian Accounting Software), Phishing/Social Engineering (Marinemax, Port Of Rijeka), Outdated Software (Iranian Tankers), Third-Party Vendor Vulnerabilities (Supply Chain),
Backdoors Established: ['Potential in NotPetya (lateral movement)', 'Possible in 8Base/Port of Rijeka attack']
High Value Targets: Shipping Routes/Cargo Data (Ports), Financial Systems (Maersk, Marinemax), Navigation/Ot Systems (Mv Dali, Iranian Tankers),
Data Sold on Dark Web: Shipping Routes/Cargo Data (Ports), Financial Systems (Maersk, Marinemax), Navigation/Ot Systems (Mv Dali, Iranian Tankers),

Root Causes: Lack Of Cybersecurity Expertise (17% Of Shipyards), Fragmented Governance (No Common Incident Response Procedures), Supply Chain Blind Spots (Limited Visibility Beyond Tier 1 Vendors), Outdated/Poorly Maintained Systems (Iranian Tankers), Insufficient Ot/It Segmentation (Mv Dali, Maersk), Human Error (Phishing/Social Engineering Success), Regulatory Gaps (Pre-2025 U.S. Coast Guard Rules),
Corrective Actions: Maersk: Global It Infrastructure Overhaul Post-Notpetya., Imo: Updated Ism Code To Mandate Cyber Risk Assessments., U.S. Coast Guard: 2025 Rule For Cybersecurity Officers And Incident Reporting., Eu: Nis2 Directive Enforcement For Maritime Sector., Ports: Increased Third-Party Vendor Audits (E.G., Rijeka Post-Attack)., Shipping Companies: Ai Threat Monitoring And Workforce Training Programs.,
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Cybersecurity Firms (E.G., Maersk’S Recovery), Government Agencies (E.G., Nato Ccdcoe Warnings), , Marlink’S Threat Tracking (1,800 Vessels, 2024), Ai-Driven Anomaly Detection (Emerging), .
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Maersk: Global It Infrastructure Overhaul Post-Notpetya., Imo: Updated Ism Code To Mandate Cyber Risk Assessments., U.S. Coast Guard: 2025 Rule For Cybersecurity Officers And Incident Reporting., Eu: Nis2 Directive Enforcement For Maritime Sector., Ports: Increased Third-Party Vendor Audits (E.G., Rijeka Post-Attack)., Shipping Companies: Ai Threat Monitoring And Workforce Training Programs., .
Ransom Payment History: The company has Paid ransoms in the past.
Last Ransom Demanded: The amount of the last ransom demanded was ['8Base (Port of Rijeka: unspecified)', 'NotPetya (Maersk: no ransom demanded, wiper malware)'].
Last Attacking Group: The attacking group in the last incident were an Name: Russian Military (NotPetya)Type: State-SponsoredMotivation: Geopolitical DisruptionName: 8Base Ransomware GroupType: Financially MotivatedMotivation: ExtortionName: Lab-DookhteganType: Hacktivist/State-AlignedMotivation: Disruption (targeted Iranian maritime sector)Name: Unspecified State Actors (Russia, Iran and China)Type: State-SponsoredMotivation: GNSS Jamming/Spoofing for Strategic AdvantageName: Financially Motivated HackersType: CybercriminalMotivation: Ransomware/Data Theft.
Highest Financial Loss: The highest financial loss from an incident was ['Maersk: $300M (NotPetya, 2017)', 'Unspecified losses for MarineMax, Port of Rijeka, and other targets'].
Most Significant Data Compromised: The most significant data compromised in an incident were Financial Records (Maersk, MarineMax, Port of Rijeka), Employee/Customer Data (MarineMax), Shipping Routes/Cargo Data (Ports), Personal Data (Port of Rijeka: invoices, contracts, accounting records), Navigation/Logistics Data (GNSS Spoofing) and .
Most Significant System Affected: The most significant system affected in an incident were 76 Port Terminals (Maersk, 2017)45,000+ PCs and 4,000 Servers (Maersk)Accounting Systems (MarineMax)Communications (60+ Iranian Oil Tankers)GNSS Navigation (Jamming/Spoofing)OT Systems (MV Dali power loss).
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was cybersecurity firms (e.g., maersk’s recovery), government agencies (e.g., nato ccdcoe warnings), .
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Isolation of Infected Systems (Maersk)Manual Overrides (OT Failures)GNSS Backup Systems (Jamming Mitigation).
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Navigation/Logistics Data (GNSS Spoofing), Shipping Routes/Cargo Data (Ports), Employee/Customer Data (MarineMax), Financial Records (Maersk, MarineMax, Port of Rijeka), Personal Data (Port of Rijeka: invoices, contracts and accounting records).
Highest Ransom Demanded: The highest ransom demanded in a ransomware incident was ['8Base (Port of Rijeka: unspecified)', 'NotPetya (Maersk: no ransom demanded, wiper malware)'].
Highest Ransom Paid: The highest ransom paid in a ransomware incident was ['Maersk: None (NotPetya was wiper malware)', 'Port of Rijeka: Unspecified'].
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Regulatory compliance (NIS2, IMO, U.S. Coast Guard) is evolving; proactive adaptation is necessary.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Appoint **dedicated Cybersecurity Officers** (per U.S. Coast Guard 2025 rule)., Develop **incident response playbooks** for ransomware, OT failures, and data breaches., Mandate **cybersecurity training** for all staff, including manual override procedures., Adopt **IMO ISM Code updates** and align with NIS2/U.S. Coast Guard requirements., Deploy **GNSS backup systems** (e.g., inertial navigation) to counter jamming/spoofing., Establish **cross-sector collaboration** (public/private info-sharing on threats)., Invest in **third-party vendor audits** to map supply chain risks beyond Tier 1., Leverage **AI for threat detection** while securing AI systems against adversarial attacks., Implement **network segmentation** to isolate OT/IT systems (e.g., ship navigation vs. accounting). and Conduct **continuous risk assessments** for AI-driven and supply chain threats..
Most Recent Source: The most recent source of information about an incident are Maersk NotPetya Post-Incident Report, EU NIS2 Directive, Port of Rijeka 8Base Ransomware Attack (2024), IMO ISM Code (MSC.428(98)), U.S. Coast Guard 2025 Cybersecurity Rule, Marlink’s 2024 Maritime Cyber Threat Report and NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE).
Most Recent URL for Additional Resources: The most recent URL for additional resources on cybersecurity best practices is https://ccdcoe.org/, https://www.uscg.mil/, https://digital-strategy.ec.europa.eu/en/policies/nis2-directive, https://www.imo.org/ .
Current Status of Most Recent Investigation: The current status of the most recent investigation is ['Maersk NotPetya: Attributed to Russian military (confirmed)', 'MV Dali: No confirmed cyberattack (electrical failure under investigation)', 'Port of Rijeka: Ongoing (8Base claims unverified)', 'Iranian Tankers: Lab-Dookhtegan claimed responsibility (verified communications disruption)'].
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was IMO: Urges cyber risk assessments and ISM Code integration., NATO CCDCOE: Warns of state-sponsored threats to port infrastructure., U.S. Coast Guard: Mandates Cybersecurity Officers and incident reporting by 2025., EU: NIS2 Directive requires maritime operators to report incidents and secure supply chains., .
Most Recent Customer Advisory: The most recent customer advisory issued was an Maersk: Notified partners of NotPetya impact (2017).MarineMax: Advised customers on data breach risks (2024).Port of Rijeka: Likely notified stakeholders of ransomware attack (2024).
.png)
A weakness has been identified in itsourcecode Online Pet Shop Management System 1.0. This vulnerability affects unknown code of the file /pet1/addcnp.php. This manipulation of the argument cnpname causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.
A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.
A weakness has been identified in code-projects Student File Management System 1.0. This issue affects some unknown processing of the file /admin/update_student.php. This manipulation of the argument stud_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.
A security flaw has been discovered in code-projects Student File Management System 1.0. This vulnerability affects unknown code of the file /admin/save_user.php. The manipulation of the argument firstname results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.
A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument user_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.