new cyber threats for hyper-connected ships

The Five Cyber Attack Vectors You Need to Consider

01

Third Party ‘Push’ Access

Updating devices, once a slow but secure manual process, has been revolutionized by maritime hyper-connectivity. With speed and ease, however, come new cyber vulnerabilities for malicious updates to be automatically pushed through unnoticed.

02

New Digital Devices

While more technology can greatly improve the safety, efficiency, and sustainability of a vessel, it creates previously unconsidered cyber vulnerabilities that demand overhauled safeguards for devices and networks.

03

Connected OT

As maritime OT devices progress into the realm of connected technology, new protocols and access methods open doors to system vulnerabilities. With increased connectivity comes an urgent need to rethink system protection.

04

Crew Web Usage

As the vast majority of shipping companies provide onboard crew internet connectivity through satellite networks, new attack vectors like phishing and malware from compromised apps and websites arise. This requires new defenses, like crew network isolation and constant network security monitoring to ensure the protection of a vessel’s essential systems.

05

Cloud Services

Benefactors of maritime hyperconnectivity have jumped on the opportunity of cloud service implementation. This enhanced convenience, however, destroys the ‘internal-external’ perimeter of the past with vulnerable cloud technologies that demand overhauled cybersecurity measures for proficient protection.

01

Network Access Controls

To address the growing diversity of devices and users, we implement enhanced network segregations, access controls, and comprehensive monitoring of an expanded range of network protocols, mainly focusing on Operational Technology (OT). This is also mandated by new maritime cybersecurity regulations.

02

Device and Application Controls

New attack surfaces introduced with hyper-connectivity and the service it enables cannot be solved by network monitoring only. Devices must be scanned for vulnerabilities, and their usage must be monitored, as compromised devices can produce seemingly legitimate traffic with abnormal patterns.

03

Crew Monitoring

With limited connectivity, segregating the crew network was usually sufficient as there was little activity from crew devices. However, hyper-connectivity opens the door for new risks. We recommend paying specific attention to crew usage because social engineering methods are so commonly used for exploitation.

  • Create a comprehensive map, monitor, and conduct vulnerability checks for all maritime assets, including Information Technology (IT) and OT assets.
  • Implement real-time anomaly detection at an individual asset level.
  • Conduct training and awareness programs for the crew to enhance their cybersecurity knowledge.
  • Implement real-time usage monitoring to identify and mitigate potential threats.

The Importance of Assessing Cybersecurity Risks Before Enhancing Connectivity

Enjoy Responsibly.

With the proper protection, you can take full advantage of Starlink, OneWeb, and other Low Earth Orbit (LEO) services that revolutionize maritime connectivity, offering ships reliable internet access anywhere on the globe. From enhancing crew welfare to optimizing operational efficiency, these services redefine maritime communication, ensuring seamless connectivity and improved safety at sea.