Maersk joins peers with emergency surcharges on Pakistan cargo
Maersk has joined its peers in implementing ’emergency operational surcharges’ on cargo in and out ...
WTC: RIDE THE WAVEFDX: TOP EXEC OUTPEP: TOP PERFORMER KO: STEADY YIELD AND KEY APPOINTMENTAAPL: SUPPLIER IPOCHRW: SLIGHTLY DOWNBEAT BUT UPSIDE REMAINSDHL: TOP PRIORITIESDHL: SPECULATIVE OCEAN TRADEDHL: CFO REMARKSPLD: BEATING ESTIMATESPLD: TRADING UPDATEBA: TRUMP TRADE
WTC: RIDE THE WAVEFDX: TOP EXEC OUTPEP: TOP PERFORMER KO: STEADY YIELD AND KEY APPOINTMENTAAPL: SUPPLIER IPOCHRW: SLIGHTLY DOWNBEAT BUT UPSIDE REMAINSDHL: TOP PRIORITIESDHL: SPECULATIVE OCEAN TRADEDHL: CFO REMARKSPLD: BEATING ESTIMATESPLD: TRADING UPDATEBA: TRUMP TRADE
Reading like an airport thriller, this Wired story of the infamous NotPetya cyber attack recounts the panic spreading through Maersk’s HQ in Copenhagen that summer morning when its IT system became infected. “Maersk employees were running down hallways, yelling to their colleagues to turn off computers or disconnect them from Maersk’s network before the malicious software could infect them, as it dawned on them that every minute could mean dozens or hundreds more corrupted PCs. Tech workers ran into conference rooms and unplugged machines in the middle of meetings. Soon staffers were hurdling over locked key-card gates…” This is in-depth account of the hows and whys of NotPetya is the most definitive yet, and also confirms the increasingly common view that Maersk was not the object of the cyber attack, just collateral damage.
Comment on this article