{
	"id": "f2a66060-7fe0-43d7-b088-88af6c23865e",
	"created_at": "2026-04-06T00:07:56.804051Z",
	"updated_at": "2026-04-10T13:12:50.940542Z",
	"deleted_at": null,
	"sha1_hash": "aadce8f6eef36f27d94b797d27810fbb8da85331",
	"title": "Marine services provider Swire Pacific Offshore hit by ransomware",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 4380628,
	"plain_text": "Marine services provider Swire Pacific Offshore hit by ransomware\r\nBy Bill Toulas\r\nPublished: 2021-11-26 · Archived: 2026-04-05 17:36:42 UTC\r\nMarine services giant Swire Pacific Offshore (SPO) has suffered a Clop ransomware attack that allowed threat actors to steal\r\ncompany data.\r\nSwire Pacific Offshore discovered an unauthorized network infiltration onto its IT systems, resulting in the compromise of\r\nsome employee data.\r\n\"Swire Pacific Offshore (SPO) has discovered that it was the target of a cyberattack which involved unauthorised access to\r\nits IT systems,\" Swire Pacific Offshore said in a statement to BleepingComputer.\r\nhttps://www.bleepingcomputer.com/news/security/marine-services-provider-swire-pacific-offshore-hit-by-ransomware/\r\nPage 1 of 4\n\n0:00\r\nhttps://www.bleepingcomputer.com/news/security/marine-services-provider-swire-pacific-offshore-hit-by-ransomware/\r\nPage 2 of 4\n\nVisit Advertiser websiteGO TO PAGE\r\n\"The unauthorised access has resulted in the loss of some confidential proprietary commercial information and has resulted\r\nin the loss of some personal data. The cyberattack has not materially affected SPO's global operations.\"\r\nAs the company clarified, the cyberattack hasn't affected SPO's global operations, and neither has it resulted in the loss of\r\nconfidential information.\r\nThe firm has reported the incident to the relevant authorities and continues to investigate with the help of external experts to\r\ndetermine the exact scope and impact.\r\nClop gang claims responsibility\r\nThe Clop ransomware group has claimed responsibility for the attack and posted screenshots of data during the attack.\r\nThe screenshots indicate that the ransomware gang stole passports, payroll information, ID numbers, bank account details,\r\nemail addresses, and internal correspondence messages.\r\nSwire Pacific page on Clop data leak site\r\nFrom what BleepingComputer could discern by the leaked data, the claims that the threat actors stole employees' personal\r\ndata during the attack appear valid.\r\nSize of the breach\r\nThe number of exposed individuals could reach 2,500, corresponding to the firm’s seafaring and onshore personnel in 18\r\ncountries.\r\nSPO will contact all of the potentially affected individuals to inform them about the incident, but no exact numbers have\r\nbeen published yet.\r\nSwire Pacific Offshore is a Singapore-based maritime services provider which operates a fleet of over 50 offshore support\r\nvessels.\r\nhttps://www.bleepingcomputer.com/news/security/marine-services-provider-swire-pacific-offshore-hit-by-ransomware/\r\nPage 3 of 4\n\nTargeting the shipping industry\r\nRansomware actors always aim for costly business disruptions, as this raises the chances of them receiving the ransom\r\nquickly and without much negotiation.\r\nSome of the most notable recent incidents against firms in the industry include:\r\nA.P. Møller-Maersk hit by NotPetya ransomware in January 2018\r\nCOSCO hit by an undetermined group of ransomware actors in July 2018\r\nPitney Bowes hit by an undetermined group of ransomware actors in October 2019\r\nU.S. Coast Guard hit by Ryuk ransomware in December 2019\r\nAt this time, the shipping industry is going through a turbulent period, struggling to keep up with pressing demand in the\r\npost-pandemic world.\r\nThe cost of shipments has tripled since 2019, delivery delays are still on the rise, shortages and inflation are growing, and all\r\ncontracts are under renegotiation.\r\nIt’s a “perfect storm” for the industry, and ransomware actors likely see it as an excellent opportunity for successful\r\nextortions.\r\nAutomated Pentesting Covers Only 1 of 6 Surfaces.\r\nAutomated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the\r\nother.\r\nThis whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic\r\nquestions for any tool evaluation.\r\nSource: https://www.bleepingcomputer.com/news/security/marine-services-provider-swire-pacific-offshore-hit-by-ransomware/\r\nhttps://www.bleepingcomputer.com/news/security/marine-services-provider-swire-pacific-offshore-hit-by-ransomware/\r\nPage 4 of 4",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://www.bleepingcomputer.com/news/security/marine-services-provider-swire-pacific-offshore-hit-by-ransomware/"
	],
	"report_names": [
		"marine-services-provider-swire-pacific-offshore-hit-by-ransomware"
	],
	"threat_actors": [],
	"ts_created_at": 1775434076,
	"ts_updated_at": 1775826770,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/aadce8f6eef36f27d94b797d27810fbb8da85331.pdf",
		"text": "https://archive.orkl.eu/aadce8f6eef36f27d94b797d27810fbb8da85331.txt",
		"img": "https://archive.orkl.eu/aadce8f6eef36f27d94b797d27810fbb8da85331.jpg"
	}
}