<rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Smartport - Tag - Maritimeinfosec.org</title><link>https://maritimeinfosec.org/tags/smartport/</link><description>Smartport - Tag - Maritimeinfosec.org</description><generator>Hugo -- gohugo.io</generator><language>en-US</language><copyright>Copyright Maritimeinfosec.org 2018-2026</copyright><lastBuildDate>Wed, 30 Jul 2025 14:43:38 +0000</lastBuildDate><atom:link href="https://maritimeinfosec.org/tags/smartport/" rel="self" type="application/rss+xml"/><item><title>Addressing State-Linked Cyber Threats to Critical Maritime Port Infrastructure</title><link>https://maritimeinfosec.org/addressing-state-linked-cyber-threats-to-critical-maritime-port-infrastructure/</link><pubDate>Wed, 30 Jul 2025 14:43:38 +0000</pubDate><author>Olivier JACQ</author><guid>https://maritimeinfosec.org/addressing-state-linked-cyber-threats-to-critical-maritime-port-infrastructure/</guid><description><![CDATA[<div class="featured-image">
                <img src="/images/wp-content/uploads/2025/08/1753885390516.jpeg" referrerpolicy="no-referrer">
            </div><p>As part of your healthy summer reading, have you also gone through the CCDCOE paper, &ldquo;<a href="https://ccdcoe.org/library/publications/addressing-state-linked-cyber-threats-to-critical-maritime-port-infrastructure/" target="_blank" rel="noopener noreferrer "><em>Addressing State-Linked Cyber Threats to Critical Maritime Port Infrastructure</em></a>&rdquo;?</p>
<p>No?</p>
<p>Then let me offer a brief personal reflection on and around the topic of port cybersecurity.</p>
<p>In this fine month of July 2025, the <em>NATO Cooperative Cyber Defence Centre of Excellence</em> (CCDCOE) published a <em>Policy Brief</em> entitled &ldquo;<em>Addressing State-Linked Cyber Threats to Critical Maritime Port Infrastructure</em>&rdquo;.</p>]]></description></item><item><title>Cyber risks associated with satellite positioning systems</title><link>https://maritimeinfosec.org/cyber-risks-associated-with-satellite-positioning/</link><pubDate>Mon, 20 Apr 2020 17:18:19 +0000</pubDate><author>Olivier JACQ</author><guid>https://maritimeinfosec.org/cyber-risks-associated-with-satellite-positioning/</guid><description><![CDATA[<h3 id="context">Context</h3>
<p>Today, the relatively low cost (a few tens of euros for a basic receiver), the miniaturization of hardware, and the widespread availability of GPS receivers have led many to assume that this global infrastructure will always be available. These advantages have also enabled the rapid expansion of GPS usage across many sectors where it was previously absent: healthcare, pet tracking, sports, agriculture, domestic robotics such as lawn mowers, photography, and even <a href="https://cranetechsolutions.com/GPS-guidance/" target="_blank" rel="noopener noreferrer ">port cranes</a> (see also <a href="http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.687.6757&amp;rep=rep1&amp;type=pdf" target="_blank" rel="noopener noreferrer ">this article</a>). As a result, it is now difficult to estimate how many GPS receivers are currently deployed worldwide.</p>]]></description></item><item><title>According to Lloyd’s, a cyberattack on Asian ports could cost $110 billion</title><link>https://maritimeinfosec.org/according-to-lloyds-a-cyberattack-on-asian-ports-could-cost-110-billion/</link><pubDate>Mon, 20 Apr 2020 16:44:26 +0000</pubDate><author>Olivier JACQ</author><guid>https://maritimeinfosec.org/according-to-lloyds-a-cyberattack-on-asian-ports-could-cost-110-billion/</guid><description><![CDATA[<figure>
</figure>

<p>According to a report published by Lloyd’s of London in collaboration with <a href="https://irfrc.ntu.edu.sg/Research/cyrim/Pages/Home.aspx" target="_blank" rel="noopener noreferrer ">CyRiM</a> (see <a href="https://vimeo.com/369775013" target="_blank" rel="noopener noreferrer ">the video here</a> and <a href="https://www.lloyds.com/~/media/files/news-and-insight/risk-insight/2019/shen-attack/cyrim_shenattack_finalreport.pdf" target="_blank" rel="noopener noreferrer ">the full PDF report here</a>), and relayed by the news agency <a href="https://www.reuters.com/article/us-lloyds-of-london-cyber-ports/cyber-attack-on-asia-ports-could-cost-110-billion-lloyds-idUSKBN1X900G" target="_blank" rel="noopener noreferrer ">Reuters</a>, a cyberattack targeting Asian ports could result in losses of up to 110 billion dollars. This amount is roughly equivalent to half of the total economic losses caused by natural disasters in 2018.</p>
<p>It is worth recalling that Lloyd’s specializes in commercial risk insurance. Such risks are generally less insured in Europe and Asia than in the United States.</p>]]></description></item><item><title>Cyber threats in the maritime sector: have all scenarios really been considered?</title><link>https://maritimeinfosec.org/cyber-threats-in-the-maritime-sector-have-all-scenarios-really-been-considered/</link><pubDate>Mon, 20 Apr 2020 14:44:21 +0000</pubDate><author>Olivier JACQ</author><guid>https://maritimeinfosec.org/cyber-threats-in-the-maritime-sector-have-all-scenarios-really-been-considered/</guid><description><![CDATA[<p>The Bordeaux-based maritime insurer Adam Assurances has published a study on cyber risks affecting the maritime sector (available <a href="https://adamassur.hypotheses.org/2768" target="_blank" rel="noopener noreferrer ">here</a> as a blog article and <a href="https://f.hypotheses.org/wp-content/blogs.dir/4944/files/2020/04/Te%CC%81le%CC%81charger.pdf" target="_blank" rel="noopener noreferrer ">here</a> in PDF format).</p>
<p>After recalling the digital transformation underway across the maritime industry and the growing dependency that accompanies it, the insurer reviews several cyber incidents that have already affected the sector (MSC, COSCO, Maersk, among others).</p>
<p>Building on the key findings of the CyRiM study (see <a href="/according-to-lloyds-a-cyberattack-on-asian-ports-could-cost-110-billion/" rel="">this article from November 2019 discussing it</a>, the report then examines the Shen Attack scenario described in that analysis. Applied to the maritime sector, the scenario estimates that a large-scale cyberattack could impact up to 15 ports in Asia.</p>]]></description></item><item><title>The UK Department for Transport publishes an update to its port security guidance</title><link>https://maritimeinfosec.org/the-uk-department-for-transport-publishes-an-update-to-its-port-security-guidance/</link><pubDate>Mon, 03 Feb 2020 23:16:17 +0000</pubDate><author>Olivier JACQ</author><guid>https://maritimeinfosec.org/the-uk-department-for-transport-publishes-an-update-to-its-port-security-guidance/</guid><description><![CDATA[<p>Following an initial publication in 2016, the UK Department for Transport has recently released an <a href="https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/859925/cyber-security-for-ports-and-port-systems-code-of-practice.pdf" target="_blank" rel="noopener noreferrer ">updated version of its guidance</a> on good practices titled <em>Cyber Security for Ports and Port Systems</em>.</p>
<p>This 71-page guide, which can be compared to <a href="/enisa-publishes-a-report-on-cybersecurity-good-practices-for-port-systems/" rel="">the work published by ENISA</a> at the end of last November, brings together a set of best practices aimed at improving the management of cyber risks affecting port systems.</p>
<p>The document is relatively comprehensive and covers topics such as risk analysis, the implementation of security policies, the distribution of cybersecurity roles within port organizations, and the protection of industrial systems.</p>]]></description></item><item><title>ENISA publishes a report on cybersecurity good practices for port systems</title><link>https://maritimeinfosec.org/enisa-publishes-a-report-on-cybersecurity-good-practices-for-port-systems/</link><pubDate>Fri, 31 Jan 2020 17:45:00 +0000</pubDate><author>Olivier JACQ</author><guid>https://maritimeinfosec.org/enisa-publishes-a-report-on-cybersecurity-good-practices-for-port-systems/</guid><description><![CDATA[<div class="featured-image">
                <img src="/images/wp-content/uploads/2019/11/hamburg-3021820_640.jpg" referrerpolicy="no-referrer">
            </div><p>On November 26, 2019, ENISA (the European Union Agency for Cybersecurity) published a report titled &ldquo;<a href="https://www.enisa.europa.eu/publications/port-cybersecurity-good-practices-for-cybersecurity-in-the-maritime-sector/at_download/fullReport" target="_blank" rel="noopener noreferrer ">Port Cybersecurity – Good practices for cybersecurity in the maritime sector</a>&rdquo;.</p>
<h2 id="context">Context</h2>
<p>Like the rest of the maritime sector, ports are undergoing rapid digital transformation and increasingly evolving toward the concept of the <em>smart port</em>. The objective is to improve efficiency across logistics, safety, and financial performance.</p>
<p>Many technological trends are involved in this transformation, including IoT, blockchain (particularly for logistics), big data, cloud computing, automation, artificial intelligence, and 5G. While these technologies can improve operational capabilities, they also increase the potential exposure of port infrastructures to cyber threats.</p>]]></description></item><item><title>The Ryuk ransomware causes more than 30 hours of operational disruption for a maritime operator</title><link>https://maritimeinfosec.org/ryuk-ransomware-causes-more-than-30-hours-of-operational-disruption-for-a-maritime-operator/</link><pubDate>Thu, 09 Jan 2020 00:49:38 +0000</pubDate><author>Olivier JACQ</author><guid>https://maritimeinfosec.org/ryuk-ransomware-causes-more-than-30-hours-of-operational-disruption-for-a-maritime-operator/</guid><description><![CDATA[<div class="featured-image">
                <img src="/images/wp-content/uploads/2019/12/dock-1277744_640.jpg" referrerpolicy="no-referrer">
            </div><p>The website of the U.S. Coast Guard (which is involved in cyberspace issues, as mentioned in this article) <a href="https://www.dco.uscg.mil/Portals/9/DCO%20Documents/5p/MSIB/2019/MSIB_10_19.pdf?ver=2019-12-23-134957-667" target="_blank" rel="noopener noreferrer ">reports</a> that a U.S. maritime operator was impacted by the &ldquo;Ryuk&rdquo; ransomware.</p>
<p>This malicious code is not new. It first appeared <a href="https://research.checkpoint.com/2018/ryuk-ransomware-targeted-campaign-break/" target="_blank" rel="noopener noreferrer ">in the summer of 2018</a> and has already affected numerous companies, such as <a href="https://www.letelegramme.fr/france/donnees-de-sante-les-zones-d-ombre-de-la-cyberattaque-contre-eurofins-02-08-2019-12352408.php" target="_blank" rel="noopener noreferrer ">Eurofins in the summer of 2019</a> or <a href="https://www.lemagit.fr/actualites/252474790/Prosegur-un-specialiste-de-la-securite-physique-frappe-par-une-attaque-logique" target="_blank" rel="noopener noreferrer ">Prosegur more recently</a>. As noted by CheckPoint, the malware is not particularly sophisticated from a technical perspective, but it specifically targets large companies and organizations with significant financial resources that may prefer to pay a ransom (which is not recommended and does not always work, particularly in the case of Ryuk) rather than lose several days of operations. As early as January 2019, it had already generated €3 million for its operators (source: Le Monde). In March 2019, the French cybersecurity agency ANSSI published both <a href="https://cert.ssi.gouv.fr/alerte/CERTFR-2019-ALE-003/" target="_blank" rel="noopener noreferrer ">an alert bulletin</a> and <a href="https://www.cert.ssi.gouv.fr/uploads/CERTFR-2019-ACT-005.pdf" target="_blank" rel="noopener noreferrer ">a news bulletin</a> about this malware.</p>]]></description></item><item><title>Major risk scenarios affecting maritime information systems</title><link>https://maritimeinfosec.org/major-risk-scenarios-affecting-maritime-information-systems/</link><pubDate>Mon, 28 Oct 2019 21:37:33 +0000</pubDate><author>Olivier JACQ</author><guid>https://maritimeinfosec.org/major-risk-scenarios-affecting-maritime-information-systems/</guid><description><![CDATA[<p>Even a brief and high-level risk analysis makes it possible to identify several major risk scenarios that could affect the maritime sector. The list below is not exhaustive, but it provides an overview of some of the most relevant concerns.</p>
<p>For vessels, these scenarios may include:</p>
<ul>
<li>attempts to spoof or jam positioning or communication systems, either directly targeting the vessel or affecting its surrounding environment</li>
<li>malfunctions or loss of availability of ECDIS navigation systems, even though these systems are often deployed with redundancy</li>
<li>the transmission of false safety information to vessels (GMDSS alerts, AIS data, weather information, etc.)</li>
<li>intrusions targeting onboard industrial control systems, including propulsion, navigation, or cargo management systems</li>
<li>the remote takeover of a vessel or part of its systems</li>
<li>the partial or complete encryption of onboard information systems through ransomware attacks</li>
</ul>
<p>Ports are also exposed to similar risks, including:</p>]]></description></item><item><title>The Port of Singapore inaugurates its maritime cybersecurity SOC</title><link>https://maritimeinfosec.org/the-port-of-singapore-inaugurates-its-maritime-cybersecurity-soc/</link><pubDate>Sun, 02 Jun 2019 12:34:34 +0000</pubDate><author>Olivier JACQ</author><guid>https://maritimeinfosec.org/the-port-of-singapore-inaugurates-its-maritime-cybersecurity-soc/</guid><description><![CDATA[<p><a href="/singapore-port-authority-sets-up-a-maritime-cybersecurity-operations-center/" rel="">As mentioned last year</a>, the Port of Singapore authorities inaugurated their Maritime Security Operations Center (MSOC) on May 16, 2019. Singapore is a major global transshipment hub, particularly for container traffic.</p>
<figure>
</figure>

<blockquote>
<p>“It is therefore important that we protect our maritime and port infrastructure to prevent any major disruption to port operations and the delivery of services,”<br>
said Niam Chiang Meng, Chairman of the Maritime and Port Authority of Singapore.</p>]]></description></item><item><title>Maritime information systems</title><link>https://maritimeinfosec.org/maritime-information-systems/</link><pubDate>Fri, 26 Oct 2018 14:08:42 +0000</pubDate><author>Olivier JACQ</author><guid>https://maritimeinfosec.org/maritime-information-systems/</guid><description><![CDATA[<div class="featured-image">
                <img src="/images/wp-content/uploads/2018/10/Capture-d%e2%80%99%c3%a9cran-du-2018-10-24-07-12-41-e1540547836953.png" referrerpolicy="no-referrer">
            </div><p>In this article, I explain in more detail what a maritime information system is, attempting to classify them as clearly as possible.</p>
<p>Maritime information systems can refer to different types of infrastructure:</p>
<ul>
<li>ships:
<ul>
<li>merchant vessels</li>
<li>warships</li>
<li>recreational vessels</li>
<li>fishing vessels</li>
<li>scientific / hydro-oceanographic / fisheries research vessels</li>
<li>barges</li>
</ul>
</li>
<li>ports and naval infrastructures:
<ul>
<li>container loading/unloading systems, <em>smartports</em>, logistics systems</li>
<li><em>Port</em> and <em>Cargo Community Systems</em></li>
<li>cranes and gantries</li>
<li>dock and basin management systems</li>
<li>locks</li>
<li>pipelines</li>
</ul>
</li>
<li>other onshore facilities:
<ul>
<li>maritime informatics of signal stations, MRCC (Maritime Rescue Coordination Centers), ship command and management centers</li>
</ul>
</li>
<li>offshore installations:
<ul>
<li>drilling platforms</li>
<li>Marine Renewable Energies (MRE): wind turbines, tidal turbines&hellip;</li>
</ul>
</li>
</ul>
<p>Next, to make things easier to understand, I tend to divide systems into two major families: &ldquo;IT&rdquo; systems (<em>Information Technology</em>), which are fairly similar to what can be found in other sectors, and &ldquo;OT&rdquo; systems (<em>Operational Technology</em>), which, to simplify, could be described as “operational systems”, more specific to the maritime information domain.</p>]]></description></item></channel></rss>