Ransomware and details breaches ended up the most notable cyber-threats impacting Europe’s transportation sector previous 12 months, with incidents of the previous virtually doubling in quantity, according to ENISA.
The EU security agency’s to start with ever threat landscape report for the vertical addresses the period January 2021 to Oct 2022.
It claimed that ransomware incident reviews improved from 13% of the total in 2021 to 25% in 2022, though malware stories declined from 11% to 6% and info breaches and leaks slumped from 21% to 9%.
Having said that, that continue to can make facts-related threats the 2nd most prolific classification about the interval right after ransomware, with attackers concentrating on qualifications, personnel and consumer personalized info, and intellectual home.
Read through a lot more on transportation cyber-threats: US Transport Huge Loses $7.5m in Ransomware Attack.
More than 50 percent (55%) of incidents tracked by ENISA around the period of time had been traced to cyber-criminals, this means they were possible to be economically motivated. Hacktivists accounted for an additional quarter (23%), which partly explains the 6-fold surge in DDoS attacks, from 2% to 13% concerning 2021 and 2022.
European airports, railways and transportation authorities were being amongst the victims of all those attacks, ENISA said.
Condition-backed attacks accounted for one more 15% of the total and had been mostly aimed at the maritime sector and govt transportation authorities, according to the report.
“Transport is a key sector of our economic climate that we count on in each our own and qualified lives,” argued ENISA executive director, Juhan Lepassaar.
“Understanding the distribution of cyber-threats, motivations, trends and patterns, as well as their likely affect, is important if we want to make improvements to the cybersecurity of the critical infrastructures involved.”
Even so, the agency acknowledged that its visibility into the menace landscape is restricted to publicly described incidents.
“Such disclosed incidents on which ENISA dependent its assessment and conclusions even so are probably to less than-symbolize truth if non-disclosed ones outweigh individuals built public,” it cautioned.
Some parts of this article are sourced from:
www.infosecurity-journal.com