Maritime Cybersecurity
Maritime Cybersecurity
Maritime Cybersecurity
2, Winter 2020
Abstract
In the era of technological advancements and digitization, the
security phenomenon encompasses both physical and digital
paradigms. The recent developments in cyber security domain
reveal an increased number of cyberattacks on critical
infrastructures, organizations, and industries. The maritime
industry, being the critical infrastructure of any nation, is no
exception to it, which is also vulnerable to cyberattacks. With
terminals, vessels, ships, transport operators, ports and any other
interconnected and integrated critical infrastructure are prone to
cyberattacks. This paper discusses the important concepts such as
‘maritime’ and ‘cyber security in maritime industry’ and explains
the utmost significance of cyber security at sea both on land and on
board. It further discusses the major global cyber security incidents
to determine vulnerabilities in maritime industry and also
highlights challenges faced by maritime stakeholders amidst the
COVID-19. Finally, this paper looks into existing cyber security
measures and guidelines in the maritime industry.
Introduction
T
he maritime sector is known as ‘reactive’ in terms of setting
regulations and standards based on catastrophic incidents. Citing an
example in this context would be the sinking of ‘RMS Titanic’ which
clashed with an iceberg during her first journey to New York City from
Southampton, United Kingdom on April 15, 1912.1 The Titanic was
Senior Research Associate at National Institute of Maritime Affairs, Bahria
University Islamabad. Email: [email protected]
The founder and CEO of the Global Foundation for Cyber Studies and
Research. Email: [email protected]
1 Charles D. Michel, Paul F. Thomas, and Andrew E.Tucci, “Cyber Risks in the
Marine Transportation System, The US Coast Guard Approach,” 2009,
Maritime Cybersecurity 43
https://www.dco.uscg.mil/Portals/9/CGFAC/Documents/USCG_Paper_MTS_
CyberRisks.pdf
2 Mandy Savage, “Five Safety Lessons Learned from the Sinking of the Titanic,”
EHS Today, April 14, 2015, https://www.ehstoday.com/safety/
article/21916859/five-safety-lessons-learned-from-the-sinking-of-the-titanic
3 Michael Clancy et al., Cruise Ship Tourism (Oxford: CABI, 2017).
4 Jolanta Joszczuk Januszewska, Importance of Cloud-Based Maritime Fleet
Management Software (Springer, 2013), https://link.springer.com/book/
10.1007/978-3-642-41647-7.
5 Don Walsh, “Oceans - Maritime Cyber Security: Shoal Water Ahead?” U.S.
Naval Institute, February 21, 2019, https://www.usni.org/magazines/
proceedings/2015/july/oceans-maritime-cyber-security-shoal-water-ahead.
6 Steven L Caponi, and Kate B Belmont, “Maritime Cyber Security: A Growing
Threat Goes Unanswered,” Intellectual Property & Technology Law Journal Vol
27, Issue 1, (2015), 16-18.
7 Alexeis Garcia Perez, Mick Thurlbeck, and Eddie How, “Towards Cyber
Security Readiness in the Maritime Industry: A Knowledge-Based Approach,”
Coventry University, 2017. https://pure.coventry.ac.uk/ws/portalfiles/
portal/12219284/Towards_Cyber_Security_Readiness_In_The_Maritime_Indu
stry.pdf.
44 Journal of Contemporary Studies, Vol. IX, No.2, Winter 2020
8 Carmen Casado, “Vessels on The High Seas: Using A Model Flag State
Compliance Agreement To Control Marine Pollution,” Scholarly Commons,
March 2, 2005, https://scholarlycommons.law.cwsl.edu/cwilj/vol35/iss2/3/
9 UT News, “UT Austin Researchers Successfully Spoof an $80 Million Yacht at
Sea,” The University of Texas at Austin News, August 7, 2018,
https://news.utexas.edu/2013/07/29/ut-austin-researchers-successfully-
spoof-an-80-million-yacht-at-sea/
10 “Annual Report 2018,” MAERSK, 2018, https://investor.maersk.com/news-
release/news-release-details/annual-report-2018,accessed 29 March 2020.
Maritime Cybersecurity 45
digital platforms for cyber security programs.11 Rolls Royce and Google are
working on autonomous shipping and intelligent systems.12
Nevertheless, interconnected shipping industry calls for effective
operational time and effectiveness of various processes for the transaction
of every business. It is important to remember that development and
progress of cybersecurity goes in parallel with the latest technological
advancements. Nevertheless, insufficient knowledge with regards to
cybersecurity issues and prospective challenges, which maritime
companies face these days. This paper explores the significance of cyber
security in the maritime industry and the major incidents occurred in near
past. It also discusses how important it is to secure maritime
infrastructure from cyber threats in this age of technological
advancements. The first section of paper delineates the definitions of
cyber security, maritime sector, and volume of cyber security in the
maritime industry. The second section looks into incidents of cyberattacks
on maritime infrastructure at global level and explains the cyber threats to
maritime infrastructure during the COVID-19 times. The last section deals
with the cyber security measures in the maritime industry.
Recreational hackers
These are the hackers who try to hack cyber systems just to
impress their counterparts with a skilful exploit rather than making
money.
Cyber Terrorists
Cyber terrorism is the combination of cyberspace and terrorism,
which is generally understood as unlawful attacks or threats of attacks
through networks, computers, and the data stored therein. These attacks
can be launched to coerce or intimidate the government or people in
connection to social or political objectives. Cyber terrorists are the actors
who use internet to achieve their goals, which results in threatening a life
or damage an infrastructure through intimidation.25
Criminal Entities
There are individuals who perform malicious activities on
networks or digital systems by the use of technology in maritime domain.
These activities include importing drugs, counterfeit goods, and illegal
chemical to get profits in the black market and stealing cargo.
State-Actors
State-Actors are tasked by the governments to steal sensitive
information or disrupt other governments critical infrastructure by cyber
means.
Accidental Stumblers
They are also known as ‘Script Kiddies’ who actually learn hacking
from the online resources and end up penetrating into systems and
disrupting sensitive operations unintentionally.
maritime shipping
company.
h. Long Beach Terminal of A ransomware attack was USA 2018
Cosco launched against Cosco
Shipping at the port of
Long Beach Terminal
i. US Coast Guard Rescues a A cyber attack was USA 2019
Shipping Vessel from Cyber launched against a vessel
Attack bound to New York and
Coast Guard rescued that.
j. Global Logistics Operator A ransomware attack was Australia 2020
Toll Group has been Subject launched against global
to Cyber Attack logistics operator Toll
Group
Source: Compiled by the author.
Cyberattacks on the Maritime Assets of the
Islamic Republic of Iran – 2011
Shipping has been the major pillar of Iranian’s economy to make it
alive during the times of multilateral sanctions by the International
community. In August 2011, an Iranian state-owned shipping organization
named the Islamic Republic of Iran Shipping Lines (IRISL) became the
victim of cyber-attack.28 The founder of Cyber Keel, Lars Jenson stated,
“the cyber attack almost damaged data related to cargo number, loading,
date and place, and rates, which resulted in huge financial loss.” 29
According to the IRISL, the general shipping information and cargo
information was taken by the hackers. Resultantly, it became nearly
impossible for Iranian stevedores to count those containers, which were
stored pier-side or placed on ships without manually verifying all twenty-
foot equivalent units (TEUs). Though there is no information on how long
time it took to restore, but the loss to IRISL was considerable.
Cyberattack on Saudi Oil and Gas Company Aramco - 2012
The Saudi’s largest oil and gas operator named ARAMCO was hit by
a cyberattack. The company’s employee mistakenly opened a phishing
email which contained an infected link. This resulted in corruption of files,
and disconnection of phone calls. Almost 35,000 computers were infected
and 3 quarters of data was removed. On top of that, the oil company could
not perform its regular functions for 17 days.30 It took ARAMCO 5 months
to recover from the loss and resume its day-to-day operations.
Ghost Shipping / Port of Antwerp – 2013
During the year 2011 and 2013, Drug traffickers in Dutch hired
cyber experts to infiltrate computer networks, which were responsible to
manage what’s inside each container at the port of Antwerp. This way,
they managed to hide cocaine in the containers and got them release to the
destination without the knowledge of port authorities.31
Ice Fog – South Korean and Japanese Assets Incident – 2013
Kaspersky Labs, an Internet security company, released proofs of
consistent cyberattacks of phishing on South Korean and Japanese assets
in 2013.32 The targeted institutions included military, telecom, media
houses, government, and shipbuilding groups. The most lethal cyberattack
is known as advanced persistent threats (APTs).
Vessels GPS in Korea – 2016
South Korean vessel suffered a cyberattack in April 2016 in which
navigational system was jammed. The GPS was hacked by hackers; some
signals were dead, and some others were providing false information. The
GPS had not exhibited correct information, and eventually the ship was
returned to the port. This can become a serious navigational fault, if it
happens in poor weather condition, vessel traffic area or having
inadequate visibility.33
Port Operations of A.P. Moller-Maersk - 2017
The Dutch maritime shipping company ‘Maersk’ was hit by
cyberattack in 2017. This cyberattack was the one which raised serious
cyber vulnerabilities of maritime industry. The company’s loss was
estimated to be around $300 million and they continued their operations
30 Jose Pagliery, "The Inside Story of the Biggest Hack in History," CNN Money,
August 5, 2015, https://money.cnn.com/2015/08/05/technology/aramco-
hack/
31 Joseph Direnzo, Dana A. Goward, and Fred S. Roberts, “The Little-Known
Challenge of Maritime Cyber Security,” 6th International Conference on
Information, Intelligence, Systems and Applications (IISA), 2015,
https://doi.org/10.1109/iisa.2015.7388071.
32 “The ‘Icefog’ Apt: A Tale Of Cloak And Three Daggers,” Kaspersky Media,
https://media.kaspersky.com/en/icefog-apt-threat.pdf, last accessed June 25,
2020.
33 “Cyber Security Fleet Protection Digital Ship Singapore March 2018,” OSM
Maritime Group, 2018, https://static1.squarespace.com/static/
57a8878837c58153c1897c2c/t/5ab3b85f88251b5549a07357/1521727638
547/8PeterSchellenberger_OSM_APM18.pdf
Maritime Cybersecurity 53
without IT for many days till the resume of operational activities.34 Maersk
had to close down its activities from several ports across the globe
reducing the volume by 25 percent. In order to resume its services, the
organization had replaced its 45000 computers, 4,000 servers and
installed 2500 new applications.
Long Beach Terminal of Cosco - 2018
In July 2018, Cosco Long Beach Terminal, which was associated
with Cosco Shipping was affected by a ransomware cyberattack. Though,
the cyberattack could not harm the company’s daily operations, but the
company decided to close down its connections with external regions.
Later, the company sent letter to every client in order to clarify the
incident.35
US Coast Guard Rescues a Shipping
Vessel from Cyber Attack - 2019
In February 2019, the US Coast Guard received a message from a
large ship bound for New York that the vessel was facing an alarming
cyberattack impacting their shipboard network.” An incident response
team led by the Coast Guard investigated the matter and found that ship
system was affected by the malware and it has significantly degraded the
functionality of the vessel. Fortunately, the imperative systems for the
control of vessel remained unimpeded.36
Global Logistics Operator Toll Group
had been Subject to a Cyber Attack - 2020
Global logistics operator Toll Group has reported to be under
cyberattack across its sea and land operations on 03 February 2020. The
company had closed down its number of systems at various sites in order
to respond the attack. As a consequence, majority of the customers were
experiencing disruption or delays while the company was trying to resume
its operations. The attack later on was identified as Mailto ransomware or
34 Jonathan Saul, "Global Shipping Feels Fallout from Maersk Cyber Attack,"
Reuters, June 29, 2017, https://www.reuters.com/article/us-cyber-attack-
maersk-idUSKBN19K2LE
35 Michael Juliano, "Cosco's Long Beach Terminal Hit by Cyber-attack,"
Tradewinds - Global Shipping News, July 25, 2018.
https://www.tradewindsnews.com/casualties/1541843/coscos-long-beach-
terminal-hit-by-cyber-attack
36 James Rundle, “U.S. Coast Guard Warns Shipping Industry on Cybersecurity,”
The Wall Street Journal, July 11, 2019, https://www.wsj.com/articles/u-s-
coast-guard-warns-shipping-industry-on-cybersecurity-11562837402.
54 Journal of Contemporary Studies, Vol. IX, No.2, Winter 2020
37 Zoe Reynolds, “Toll Group Shuts Down IT Systems after Cyber Attack,”
SafetyatSea, February 6, 2020, https://safetyatsea.net/news/2020/toll-
group-shuts-down-it-systems-after-cyber-attack/
38 Mukhisa Kituyi, “Coronavirus: Let’s Keep Ships Moving, Ports Open and Cross-
Border Trade Flowing,” United Nations Conference on Trade and Development
(UNCTAD), March 25, 2020, https://unctad.org/news/coronavirus-lets-keep-
ships-moving-ports-open-and-cross-border-trade-flowing
39 Ibid.
40 Benjamin Hilliburton, “COVID-19 is a Black Swan,” Forbes, March 19,
2020,https://www.forbes.com/sites/forbesbooksauthors/2020/03/19/covi
d-19-is-a-black-swan/#211c1ea67b4b.
Maritime Cybersecurity 55
46 Aron Soerensen, “Safety at Sea and BIMCO publish Cyber Security,” BIMCO
Bulletin, September 19, 2019, https://www.bimco.org/news/priority-
news/20190916-safety-at-sea-and-bimco-publish-cyber-security-white-
paper
47 Rasmus N Jorgensen, “Industry Publishes Improved Cyber Guidelines,” BIMCO
Bulletin, December 7, 2018, https://www.bimco.org/news/priority-
news/20181207-industry-publishes-improved-cyber-guidelines.
58 Journal of Contemporary Studies, Vol. IX, No.2, Winter 2020
Conclusion
In this digital age of maritime industry, information, and
communication technologies play an important role through increased
connectivity of networks and systems. The industry has been transformed
from traditional concepts into new technologies having advanced and
sophisticated systems. The modern shipping industry now facilitates
routine operations, but it also becomes vulnerable to different type of
cyberattacks. Organizations actually invest in cyber technology and
systems but not on the training of staff. Given this, most cyber-attack
incidents are associated with the human factor making the state of affairs
completely paradoxical. Either we take the example of 2011 Stuxnet in
Iran or Saudi Aramco cyberattack in 2012, human error and incompetency
prevail in these major cyber security attacks. This scenario is mostly
prevalent in developing countries or LDCs where highest cyber
commitment is still lacking behind; resultantly they fall to various
malicious viruses leading to cyberattacks.
Since, the maritime sector is evolving; the demonstration of new
technologies makes it significant to work for a longer-term cybersecurity
framework and plans. This requirement is also reflected in the IMO and
United Nations’ agenda in order to achieve the sustainable development
goals. Since cybersecurity has emerged as a strong threat to the maritime
industry, it has become mandatory for all stakeholders to collaborate and
participate to address this global threat. The participation of all maritime
sectors is also important to contribute in creating optimal operational
conditions, implementing national regulations, enforcing and contributing
to the prosperity and stability of maritime industry. This will not only help
in ensuring the maritime sector plays its role, but also better develop
future working conditions for new generations. For the same reason, it
becomes inevitable that vessels, shipping companies, ports and harbor
facilities and regulatory organizations keep working on the enhancement
of cybersecurity measures in order to protect critical infrastructure and
key resources from cyber threats. Though the maritime industry is
becoming aware of cyber incidents and adapting cyber risks mitigation
trainings, however, there is strong need not to let go of multiple unnoticed
and unregulated cyber incidents.