Ransomware has infected computers used by the Port of San Diego, disrupting operations at the southern California shipping hub and attracting the attention of federal authorities.
The FBI and Department of Homeland Security are investigating a “serious cybersecurity incident” involving a ransomware attack affecting the Port of San Diego, its president and chief executive said Thursday.
“While some of the Port’s information technology systems were compromised by the attack, Port staff also proactively shut down other systems out of an abundance of caution,” Randa Coniglio said in a written statement.
The incident is “mainly an administrative issue,” Ms. Coniglo continued, affecting operations related to park permits, public records requests and business services.
“The Port remains open, public safety operations are ongoing, and ships and boats continue to access the Bay without impacts from the cybersecurity incident,” she added.
DHS has offered “technical support and assistance, as we do whenever we become aware of a potential cyber incident affecting a critical infrastructure partner,” said Scott McConnell, a spokesperson for the agency’s National Protection and Programs Directorate.
The San Diego FBI is aware of the incident and referred to the Port of San Diego for further information, a spokesperson told The Washington Times.
“Per FBI policy, we are unable to confirm or deny the existence of an investigation,” the spokesperson said Friday.
The Port of San Diego first publicly disclosed the incident Wednesday, a day after it was initially detected, and Ms. Coniglo said that investigators subsequently determined that the attack involved ransomware, referring to a type of malicious software that typically renders a computer inoperable until its perpetrator receives a payment.
Port computer infected with the ransomware requested payment in the form of Bitcoin, a digital cryptocurrency, Ms. Coniglo said Thursday, albeit without disclosing the specific amount sought.
The Port of San Diego covers 34 miles along San Diego Bay spanning five cities, and includes cargo and cruise terminals in addition to hotels, restaurants, marinas, museums and 22 public parks, according to its website.
Other high-profile victims of recent ransomware infections include the city of Atlanta’s computers and Baltimore’s emergency dispatch system, both hacked in March.
A report published the following month by Verizon Communications, meanwhile, found that ransomware accounted for 39 percent of all malware-related infections spotted during 2017.
“To detect ransomware early enough to stop it, cybersecurity teams must understand the business models used by ransomware network operators, as well as have visibility into the kill chain of a ransomware attack and how to detect and disrupt ransomware in corporate environments,” said Barry Shteiman, vice president of research and innovation at Exabeam, a Silicon Valley-based cybersecurity company. “Armed with this information, analysts should be able to react faster in the unfortunate event their organization is hit with a ransomware infection.”
• Andrew Blake can be reached at ablake@washingtontimes.com.
Please read our comment policy before commenting.