Maritime Computer Emergency Response Team ADMIRAL dataset ADMIRAL dataset

Publicly disclosed information for this event

Index Number:
Title:
2013_007
A port would have been victim of a Denial of Service attack.
Day Month Year Country Activity Incident Type
XX N/A 2013 United States Port Denial of Service

Summary

A research paper linking to a now vanished article (that I found back on web.archive.org) mentions the possibility that the victim port would have been victim of a "large scale" Distributed Denial of Service attack in 2013.

The port mentioned, in other available studies, that it had to face at that date one million hacking attempts a day and two to three so-called "cyber storms" a year.

Victim

Port of Long Beach

Claimed/Reported Threat Actor

N/A

Origin

Unknown

Main impact

Availability

References

Recommendations to Port to reduce Denial of Service risks:

  • Implement rate limiting and traffic filtering to mitigate the impact of incoming malicious traffic.
  • Check with your IT service provider that the resilience of its systems against such attack was tested.
  • Regularly monitor network traffic and set up alerting for unusual patterns or spikes.
  • Diversify your server locations and use fail-over systems to ensure service availability in case of an attack.
  • Establish an incident response plan to quickly mitigate and recover from DoS attacks.
Previous Next
Disclaimer: the data are provided as is. France Cyber Maritime and the M-CERT take no responsibility for the soundness, quality, precision, nor the eventual attribution made by the referenced URLs. We give a lot of respect and support to the victims of attacks.
Files generated on Monday, 11th December 2023.
ADMIRAL is licensed under the Creative Commons CC-BY-NC license. Copyright © France Cyber Maritime 2023.