Competent β’ Trusted β’ Experienced
Attack Type: Ransomware
What Happened: Global IT systems shut down within minutes. Unable to identify cargo. Ports worldwide reverted to manual, paper-based processes.
What Happened: Critical systems crippled including phone networks and email services.
What Happened: Cyberattack disrupted operations across the marine giant.
Deceptive emails designed to trick crew into revealing information or downloading malware.
- Fake emails from port authorities
- Spoofed messages from ship owners
- Malicious attachments
- Credential harvesting
Encrypts systems and demands payment to restore access.
- Disrupts navigation systems
- Locks cargo management
- Prevents communication
- Halts port operations
Manipulates GPS signals to mislead navigation.
- Navigation to wrong coordinates
- Collision risks
- Unauthorized detours
- Entry into restricted waters
80% of incidents start here!
- Unknown USB drives
- Infected software updates
- Compromised systems
- Supply chain attacks
- ECDIS - Electronic Charts
- GPS/GNSS - Positioning
- ARPA - Radar Plotting
- RADAR Systems
Risk: Wrong course, collisions, grounding
- VSAT - Satellite Communications
- AIS - Identification System
- GMDSS - Distress & Safety
- Email and Internet
Risk: Loss of communication, isolation
- Engine Control Systems
- Power Management
- Steering Control
- Dynamic Positioning
Risk: Loss of propulsion, power blackout
- Cargo Management Systems
- Ballast Control
- Refrigeration Systems
- Tank Level Monitoring
Risk: Cargo damage, stability loss
Five Functional Elements
IMO Resolution MSC.428(98) - Required in SMS by January 1, 2021
Define roles and identify systems, assets, and data that could be threatened.
- Inventory all IT and OT systems
- Identify critical systems
- Assess potential threats
- Map system interconnections
Implement processes and measures to protect against incidents.
- Network segmentation (IT from OT)
- Access controls and authentication
- Regular software updates
- Firewall and security software
- USB and removable media controls
Develop activities to detect cyber incidents timely.
- Continuous network monitoring
- Anomaly detection systems
- Log analysis and review
- Regular security audits
Take action when cyber incidents occur.
- Incident response plan
- Communication procedures
- Containment strategies
- Notification of authorities
Identify measures for backing up and restoring systems.
- System restoration procedures
- Data recovery from backups
- Lessons learned analysis
- Business continuity planning
β Essential Prevention Measures for All Crew
- Use strong, unique passwords (12+ characters)
- Enable multi-factor authentication
- Never use default passwords
- Change passwords regularly
- Don't share credentials
- NEVER insert unknown USB drives
- Scan all USB devices before use
- Use only company-approved devices
- Disable USB ports on critical systems
- 80% of incidents start with USB!
- Verify sender before opening attachments
- Watch for phishing signs
- Don't click on unknown links
- Report suspicious emails immediately
- Use email filtering
- Segment networks (IT separate from OT)
- Use firewalls on all connections
- Disable unnecessary services
- Monitor network traffic
- Secure Wi-Fi networks
- Lock screens when away
- Secure server rooms
- Control bridge access
- Properly dispose of equipment
- Escort visitors
- Regular cybersecurity training
- Simulated phishing exercises
- Incident response drills
- Stay informed about threats
- Promote security culture
π― Critical Points to Remember
- β Cybersecurity is everyone's responsibility - not just IT
- β 80% of incidents start with USB drives - never use unknown USBs
- β Think before you click - verify emails and links
- β Passwords are your first defense - make them strong
- β Updates save ships - keep systems patched
- β Report immediately - early detection is critical
- β Train regularly - threats evolve constantly
- β It takes 140 days on average to detect an attack - stay vigilant
- β $300M lesson from Maersk - cybersecurity is critical
- Resolution MSC.428(98)
- Cyber risks in SMS by Jan 1, 2021
- MSC-FAL.1/Circ.3/Rev.3
- Annual verification required
- UR E26 - Operational aspects
- UR E27 - Onboard systems
- Mandatory from July 1, 2024
- Applies to 500+ GT vessels
- Cybersecurity plans by July 2027
- Designated Cybersecurity Officer
- Multi-factor authentication
- Regular penetration testing
