<rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Maritime cyber risks - Category - Maritimeinfosec.org</title><link>https://maritimeinfosec.org/categories/risks/</link><description>Maritime cyber risks - Category - Maritimeinfosec.org</description><generator>Hugo -- gohugo.io</generator><language>en-US</language><copyright>Copyright Maritimeinfosec.org 2018-2026</copyright><lastBuildDate>Tue, 30 Jun 2020 08:33:22 +0000</lastBuildDate><atom:link href="https://maritimeinfosec.org/categories/risks/" rel="self" type="application/rss+xml"/><item><title>Autonomous maritime vehicles and cybersecurity risks</title><link>https://maritimeinfosec.org/autonomous-maritime-vehicles-and-cybersecurity-risks/</link><pubDate>Tue, 30 Jun 2020 08:33:22 +0000</pubDate><author>Olivier JACQ</author><guid>https://maritimeinfosec.org/autonomous-maritime-vehicles-and-cybersecurity-risks/</guid><description><![CDATA[<p>We have already discussed autonomous maritime vehicles in several previous articles, notably in the context of the first trials of autonomous ferries in Finland, in an article about the future of maritime information systems, and when reviewing some of the emerging regulatory references on the subject.</p>
<p>In the maritime domain, different categories of autonomous systems exist or are expected to emerge, including UAVs (<em>Unmanned Aerial Vehicles</em>), USVs (<em>Unmanned Surface Vehicles</em>), and UUVs (<em>Unmanned Underwater Vehicles</em>).</p>]]></description></item><item><title>Known incidents</title><link>https://maritimeinfosec.org/known-incidents/</link><pubDate>Mon, 18 May 2020 10:14:34 +0000</pubDate><author>Olivier JACQ</author><guid>https://maritimeinfosec.org/known-incidents/</guid><description>&lt;p>This article lists nearly 80 public incidents that have affected the maritime sector, deliberately or otherwise, over the past twenty years. It is not intended to be exhaustive, but please let me know if you are aware of other public and corroborated cases. The aim is not to single out a company or a state, but to raise awareness of incidents that have already occurred and, when known, their consequences. I will add more over time. As always, attribution and sources should be treated with caution, as should the apparent increase in the public number of incidents. I am also gradually adding submarine cable outages.&lt;/p></description></item><item><title>Cyber risks associated with satellite positioning systems</title><link>https://maritimeinfosec.org/cyber-risks-associated-with-satellite-positioning/</link><pubDate>Mon, 20 Apr 2020 17:18:19 +0000</pubDate><author>Olivier JACQ</author><guid>https://maritimeinfosec.org/cyber-risks-associated-with-satellite-positioning/</guid><description><![CDATA[<h3 id="context">Context</h3>
<p>Today, the relatively low cost (a few tens of euros for a basic receiver), the miniaturization of hardware, and the widespread availability of GPS receivers have led many to assume that this global infrastructure will always be available. These advantages have also enabled the rapid expansion of GPS usage across many sectors where it was previously absent: healthcare, pet tracking, sports, agriculture, domestic robotics such as lawn mowers, photography, and even <a href="https://cranetechsolutions.com/GPS-guidance/" target="_blank" rel="noopener noreferrer ">port cranes</a> (see also <a href="http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.687.6757&amp;rep=rep1&amp;type=pdf" target="_blank" rel="noopener noreferrer ">this article</a>). As a result, it is now difficult to estimate how many GPS receivers are currently deployed worldwide.</p>]]></description></item><item><title>Major risk scenarios affecting maritime information systems</title><link>https://maritimeinfosec.org/major-risk-scenarios-affecting-maritime-information-systems/</link><pubDate>Mon, 28 Oct 2019 21:37:33 +0000</pubDate><author>Olivier JACQ</author><guid>https://maritimeinfosec.org/major-risk-scenarios-affecting-maritime-information-systems/</guid><description><![CDATA[<p>Even a brief and high-level risk analysis makes it possible to identify several major risk scenarios that could affect the maritime sector. The list below is not exhaustive, but it provides an overview of some of the most relevant concerns.</p>
<p>For vessels, these scenarios may include:</p>
<ul>
<li>attempts to spoof or jam positioning or communication systems, either directly targeting the vessel or affecting its surrounding environment</li>
<li>malfunctions or loss of availability of ECDIS navigation systems, even though these systems are often deployed with redundancy</li>
<li>the transmission of false safety information to vessels (GMDSS alerts, AIS data, weather information, etc.)</li>
<li>intrusions targeting onboard industrial control systems, including propulsion, navigation, or cargo management systems</li>
<li>the remote takeover of a vessel or part of its systems</li>
<li>the partial or complete encryption of onboard information systems through ransomware attacks</li>
</ul>
<p>Ports are also exposed to similar risks, including:</p>]]></description></item><item><title>Submarine cables</title><link>https://maritimeinfosec.org/submarine-cables/</link><pubDate>Mon, 14 Oct 2019 10:05:26 +0000</pubDate><author>Olivier JACQ</author><guid>https://maritimeinfosec.org/submarine-cables/</guid><description><![CDATA[<div class="featured-image">
                <img src="/images/wp-content/uploads/2019/10/cables.png" referrerpolicy="no-referrer">
            </div><p>This has always surprised me, but relatively few people are actually familiar with the field of submarine cables. I am not only referring to the technology itself, but it is quite surprising to realize that some people are not even aware of their existence. It must be said that, lying deep on the ocean floor, it is tempting to forget about them. Yet they handle 98% of intercontinental telephone communications and data transfers every day. Without them, our daily lives and our economy would be profoundly disrupted.</p>]]></description></item><item><title>Threat sources targeting the maritime sector</title><link>https://maritimeinfosec.org/threat-sources-targeting-the-maritime-sector/</link><pubDate>Wed, 24 Oct 2018 19:11:09 +0000</pubDate><author>Olivier JACQ</author><guid>https://maritimeinfosec.org/threat-sources-targeting-the-maritime-sector/</guid><description><![CDATA[<p>Who might want to target maritime information systems?</p>
<p>Intentional threat sources are broadly similar to those encountered in other sectors. Rather than reproducing a long and exhaustive list of possible threat actors, it is worth noting that the French cybersecurity agency ANSSI has already documented them in detail (see p. 15 and following pages in the reference below).</p>
<p>Today, the most realistic threat sources include:</p>
<ul>
<li>state-sponsored actors, pursuing objectives such as espionage, pre-positioning within systems, or even disruption and destruction</li>
<li>&ldquo;casual&rdquo; hackers, inspired by demonstrations or proof-of-concept attacks presented at cybersecurity conferences and attempting to reproduce them</li>
<li>competitors, a possibility that cannot be completely ruled out and should at least be considered in risk assessments</li>
<li>terrorist or piracy-related organizations, which could see financial or strategic value in such attacks</li>
<li>collateral infections, meaning attacks that do not specifically target the maritime sector but still affect it, as is often the case with ransomware campaigns</li>
</ul>
<p>It is worth remembering that cyber operations have several advantages for attackers: they can often be carried out anonymously, attribution is difficult, and attacks can be launched rapidly and at relatively low cost (especially when the attacker only needs to deploy existing tools).</p>]]></description></item></channel></rss>