{"id":5848,"date":"2021-11-25T00:15:34","date_gmt":"2021-11-24T15:15:34","guid":{"rendered":"https:\/\/cyberenso.jp\/?p=5848"},"modified":"2021-12-14T00:18:49","modified_gmt":"2021-12-13T15:18:49","slug":"singapore-offshore-vessel-operator-swire-pacific-offshore-experiences-ransomware-attack-by-cl0p-ransomware-group","status":"publish","type":"post","link":"https:\/\/cyberenso.jp\/en\/singapore-offshore-vessel-operator-swire-pacific-offshore-experiences-ransomware-attack-by-cl0p-ransomware-group\/","title":{"rendered":"Singapore offshore vessel operator, Swire Pacific Offshore experiences ransomware attack by CL0P ransomware group"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"5848\" class=\"elementor elementor-5848\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c42de08 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c42de08\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9d4b200\" data-id=\"9d4b200\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b7f547d elementor-widget elementor-widget-text-editor\" data-id=\"b7f547d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>On Thursday 25<sup>th<\/sup> of November\u00a02021, Swire Pacific Offshore (SPO), a Singapore offshore vessel operator confirmed they had suffered a cyber-attack might have resulted in the loss of confidential proprietary commercial information and personal information. They have not disclosed any specifics of the attack but the ransomware group, CL0P have released a listing on their leak blog where they have claimed to have gain accessed to Swire Pacific Offshore\u2019s systems and have stolen data. The stolen data has been seen to includes data on:<\/p><ul><li>Full names<\/li><li>Location data<\/li><li>Passport scans<\/li><li>Banking details<\/li><li>Phone numbers<\/li><li>Email addresses<\/li><li>Company names<\/li><li>Payment advice<\/li><li>Personal folders<\/li><li>Mailbox backups<\/li><\/ul><p>\u201cSPO has taken immediate actions to reinforce existing security measures and to mitigate the potential impact of the incident. It takes a serious view of any cyber-attack or illegal accessing of data or any unlawful action that potentially compromises the privacy or confidentiality of data, and will not be threatened by such actions,\u201d Swire Pacific Offshore\u2019s statement on the cyber-attack.<\/p><p>According to a statement released by Swire Pacific Offshore, the attack didn\u2019t impact their global operations as they took immediate action to secure their systems and reinforce their implemented security measures as soon as they discovered the incident. They also stated that they have reported the incident to the relevant authorities and is contacting potentially affected parties to inform them about the incident.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>On Thursday 25th of November&nbsp;2021, Swire Pacific Offshore (SPO), a Singapore offshore vessel operator confirmed they had suffered a cyber-attack might have resulted in the loss of confidential proprietary commercial information and personal information. They have not disclosed any specifics of the attack but the ransomware group, CL0P have released a listing on their leak blog where they have claimed<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":1,"featured_media":5853,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,10,12,9,2,7,1],"tags":[],"class_list":["post-5848","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-latest_news","category-latest_vulnerabilities","category-read_article","category-ransomware_criminals","category-ce_news","category-by_country","category-uncategorized"],"acf":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/12\/Picture1-21.jpg?fit=1375%2C917&ssl=1","_links":{"self":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/5848"}],"collection":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/comments?post=5848"}],"version-history":[{"count":6,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/5848\/revisions"}],"predecessor-version":[{"id":5856,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/5848\/revisions\/5856"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media\/5853"}],"wp:attachment":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media?parent=5848"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/categories?post=5848"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/tags?post=5848"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}