Services resume at IMO after cyber attack

Fathom World media opportunities

Following an attack on the UN agency earlier int he week the IMO has issued a statement to say it has been working to re-establish its services, with its website now up and running.

The systems impacted included the IMO public website and other web-based services. IMO’s internal and external email systems continued to function, the organisation said.

It went on to explain that the platform used for virtual meeting sessions with simultaneous interpretation has been unaffected and continued to function, without issue, during Wednesday’s Facilitation Committee (FAL) session and is continuing during today’s final FAL session”, the IMO said in its update.

“IMO has ISO/IEC 27001:2013 certification for its information security management system. IMO was the first UN organization to get this certification in 2015. The IMO Headquarters file servers are located in the UK, with extensive backup systems in Geneva. The backup and restore system is regularly tested”.

Following the attack the Secretariat shut down key systems to prevent further damage from the attack and is now working with the UN International Computing Centre (UN ICC) and security experts to restore systems as soon as possible, to identify the source of the attack, and further enhance security systems to prevent recurrence.

“Service has been restored to the GISIS database; IMODOCS; and Virtual Publications. For security reasons, these systems were not available for a few hours early this morning but they are now back up and running. Service will be restored to other web-based services as soon as possible and as safe as possible”.

“The Secretariat takes its responsibilities for cyber risk management and information security management extremely seriously and has acted immediately to address the cyber attack and to implement measures to ensure the risk of recurrence is minimised”.

It has yet to explain the nature of the attack, but Fathom.World subsequently checked its own computers and found an indication of something a number of days prior to the attack.

A check on stored passwords is always recommended. it can reveal who you have been in contact with that may have had an unintentional data breach

Share post:

Share on facebook
Share on twitter
Share on linkedin


Stay On Top Of The Transformation Of The Shipping And Maritime Sectors With Our Weekly Email Newsletter.