Greek Firms Check IT Systems as Iran Conflict Spikes Cyberattack Risk

According to reports, Greek shipowners and various firms are examining their computer systems for signs of cyberattacks following guidance from the National Cybersecurity Authority.
Last week, the authority issued a notice, accessed by Reuters, directed at security personnel from shipping firms, banks, and companies in transport, telecommunications, health, and energy sectors, according to a source within the authority, noting that the action was precautionary.
On March 11, a hacking group associated with Iran took responsibility for a cyberattack on the U.S. medical device and services provider Stryker, as stated in messages shared on the group's Telegram channel.
Albania has confirmed a cyberattack on its parliamentary digital infrastructure last week, which local media reported was carried out by the Iran-linked group known as "Homeland Justice."
The Greek advisory, categorized as "high-priority," recommended that companies conduct scans and notify security officials of a verified incident involving a "large international organisation" overseas.
Also Read: A Brief History of India's Transformation Under PM Narendra Modi
It didn't specify it. It identified signs of potential compromise, including IP addresses, tools, and malware like the VShell Remote Access Trojan.
Also Read: 5 Latest CHRO Appointments in Global Corporations
Individuals discovering signs of an attack must promptly examine their systems and restrict those IP addresses.
A minimum of two shipping firms have been alerted. In recent days, electronic disruptions to commercial vessel navigation systems have increased around the Strait of Hormuz and the broader Gulf.
Also Read: How This Techie Turned Visa Struggles into Startup Success
The Greek advisory indicated that an inquiry into the confirmed incident revealed an unknown, advanced threat actor employing dual layers of infrastructure to monitor activities, attempt unauthorized access, host malware, or execute command-and-control operations while evading detection.