Maersk (NotPetya) Shutdown (2017)

The Catastrophe of Lateral Trust

Victim:

A.P Moeller-Maersk

Attacker/Malware:

Sandworm’s NotPetya

Industry:

Shipping

Estimated Cost:

Global $10B, Maersk lost $300M

Primary Attack Vector:

System Vulnerability / Backdoor

Prevention Failure:

Unsegmented networks

BlastWave Solution:

Network Cloaking and Segmentation

Kill Chain Analysis:

Wormable Exploitation and Systemic Collapse

In 2017, the NotPetya malware, attributed to Russian actors, crippledA.P. Moller-Maersk’s global operations, one of the world’s largest shippingand logistics companies.

While the initial infection point was likely part of a supply chain attack (targetingUkrainian software), the primary vector of catastrophe was the malware’s abilityto spread rapidly via wormable exploits that exploited unpatched vulnerabilitiesacross Maersk’s global IT network. The fundamental security flaw was theassumption of implicit trust across the vast corporate network.

The lack of internal segmentation allowed NotPetya to move laterally, quicklyinfecting administrative and logistical systems necessary for port operations.The result was operational paralysis that shut down container terminals globally,forcing a catastrophic recovery effort that cost approximately $300 million andinvolved reinstalling 4,000 servers and 45,000 PCs over ten days.

BlastWave Prevention Analysis:

Confining Ransomware to Single Segments

Uncontrolled lateral spread is the core driver of the immense financial cost associated with NotPetya-style attacks.

BlastWave directly addresses this by applying Identity-Defined Microsegmentation (IDM) to the corporate and OT networks. Once a single machine is compromised, ransomware attempting to spread laterally (via protocols like SMB or byleveraging stolen hashes) would be blocked instantly.

This occurs because the compromised machine’s identity would not be authorized (and thus invisible) to any other system on the network. Any attempt by themalware to initiate communication with other machines would fail, as it lacks thevalid, cryptographically verified identity required to establish a secure tunnel to acloaked endpoint.

The infection would be confined to the initial infection segment, preventing the uncontrolled global operational shutdown.

Download Hackopedia Volume 1 Now – It's Free

Our Privacy Policy applies.

Take the Next Step

Reading about past failures is only useful if it changes future outcomes. If attackers can see your OT network, they can target it. If they can target it, compliance, safety, and uptime are already at risk.

BlastWave eliminates reconnaissance, initial access, and lateral movement — without agents, without downtime, and without changing IPs, protocols, or PLCs.

Secure Your OT Network