• Cyber Security
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware File Recovery
    • Ransomware Types
  • Ransomware Services
    • Ransomware Removal
    • Ransomware File Recovery
  • News
  • Tutorials
  • Ransomware TV

COSCO Resumes Operations

August 7, 2018Simeon Georgiev

The recent attack on the Chinese Shipping Lines made headlines all around the world due to the scale and severity of the data compromised as its operations were primarily affected heavily in the USA while other regions were also affected to an extent.

However, ransomware removal reporters state that the shipping giant has almost restored its IT systems in the USA after a week since the attack. The Shanghai-based enterprise says that its applications related to the networking infrastructure in the USA have been restored after the recovery process. The company further gave the good news that its operations were back to normal.

Earlier, several components of the COSCO’ infrastructure including phone lines and emails were disrupted due to the ransomware attack, as clients were unable to communicate with the company for service requests, resulting in the loss of revenues. However, COSCO has asserted that its entire communication media, which include email, phone, and electronic data exchange, are functioning again.

Additionally, COSCO is also trying its best to manage the service requests that were not properly dealt with due to the onslaught of the ransomware attacks. While the company informed its shippers and stakeholders about the return of its email system, ransomware removal reporters came to know that the email systems in Long Beach and Los Angeles were still non-functional and would take a few more days to recover.

In the meantime, clients have been requested to use the company’s Yahoo email address. This email address was provided after the attack as part of the contingency plan that aimed to continue providing services to clients while the company was simultaneously dealing with the ransomware removal, recovery, and other critical security measures.

The company also advised the clients to supply proof of customers’ clearance to its customer service representatives via email until the situation is resolved completely.

 

Simeon Georgiev
https://www.linkedin.com/in/simeon--georgiev/
I am a Cyber Security Enthusiast from Bulgaria. I like to write about malware and ransomware and global cyber attacks. You can reach me on Twitter @sgeorgiev1995 or Email: [email protected]
Previous post Cybercriminals Demand Ransom from CarePartners Next post The Impact of Ransomware Attacks on COSCO (CSL) found to be International

Related Articles

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

January 27, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

February 1, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

BitPaymer Ransomware Traced Back to Dridex Developers

February 1, 2018Simeon Georgiev
BitPaymer Ransomware Traced Back to Dridex Developers

Latest on Ransomware TV

https://vimeo.com/399908876?loop=0

Recent Posts

  • How to protect your organization against ransomware reinfections
  • AuKill Helps Ransomware Operators Disable EDR and Security Tools
  • AI-ransomware is a real threat, just not a realistic one yet
  • Rorschach is the new speed king in the ransomware space
  • The Role of Supply Chain Breaches in Ransomware Attacks

Stay Protected

Subscribe to our mailing list to get the latest cyber security and ransomware removal articles!

Thank you for subscribing.

Something went wrong.

Navigation

  • Cyber Security
    • Ransomware File Recovery
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware Types
  • News
  • Tutorials

Ransomware Attacks (Last 6M)

0

Connect & Protect

Facebook
Google+
LinkedIn
YouTube
Vimeo

More

  • BECOME A CONTRIBUTOR

MonsterCloud Reviews

© 2020 MonsterCloud.com. All Rights Reserved.