- Operational technology (OT) controlling ship engines, navigation and safety systems are under increasing threat from cyber-attacks
- Asking ethical hackers to test vessel cyber vulnerabilities is often the best way to define suitable cyber defence concepts
- The testing and solutions often need completing within tight schedules during a vessel’s port visit
- The ethical hackers need many hacking tools and deep understanding of the relevant OT and IT systems
The growing global skills shortage in cyber security includes people who can think like hackers to test the vulnerability of cyber systems. These ‘ethical’ or ‘white-hat’ hackers’ are in high demand as industries including maritime face the rising threat of cyber-attacks seizing control of operational technology (OT). Examples of OT in maritime include software enabling engine controls, navigation systems, and safety systems. As in the industrial and energy sectors, vulnerabilities are arising as maritime OT and IT systems become more interconnected with each other and externally through the internet.
Cyber-attacks can lead to health, safety, and environmental risk; damage claims; and reputational loss. Cyber risk threat is also a concern for insurers, and hence for shipowners and others who want complete insurance coverage. Since the wake-up call of the world’s largest container shipping line being hit by the costly NotPetya ransomware attack1, guidelines, recommendations, and regulation to make ships and ports more cyber secure have proliferated.2-6
It is also common in the industry for contracts to require parties to implement cyber security procedures and systems to reduce cyber risk and mitigate consequences should a cyber-attack succeed.7 Such clauses may also cap liabilities so that affordable insurance policies will be available.
The trend is clear; more regulation, more guidelines and best practice, and hence more need to comply by ensuring the robustness of cyber defences.
Often, the best way of defining a suitable defence concept is to subject your vessel to a simulated attack by setting ethical hackers loose on it"
- Head of Cyber Security Maritime
- DNV
“Often, the best way of defining a suitable defence concept is to subject your vessel to a simulated attack by setting ethical hackers loose on it,” said Svante Einarsson, Head of Cyber Security Maritime, DNV. “But is vital that these ‘good hackers’ know the industry context well to have a better idea of where the weaknesses may be and the potential consequences of a successful cyber-attack giving hackers access to OT.”
Identifying vessel cyber vulnerabilities
Having deep industry knowledge of what could go wrong helps to target penetration testing.
Potential OT targets include, among others, engine controls and navigational systems such as the automatic identification system (AIS) that transmits data on a vessel’s position, course, and cargo, and plays a role in avoiding collisions.
Safety in modern vessels and offshore units depends heavily on cyber systems (Figure 1). Cyber security is hence an integral part of the safety challenge accompanying the spread of digitalization that will play an increasingly important role in assisting the industry to decarbonize.8
Figure 1: Safety in shipping depends heavily on cyber systems
Testing vessel cyber vulnerabilities
Armed with this maritime expertise, DNV’s certified ethical hackers begin with passive and active reconnaissance of a ship’s cyber security. They then scan for potential vulnerabilities. If they find any, they try to gain access through penetration testing.
Testing could start simply by walking around a vessel seeking unauthorized access to a computer server cabinet; because it is unlocked, for example. Access-control related information such as passwords may not be kept securely, and the ethical hackers might try tapping into the crew WiFi to find doors into OT control systems. The ethical hackers would then scan for vulnerabilities that could potentially be used to enter and exploit the system to affect operations or access confidential information (Table 1).
Some of the testing can be conducted remotely using the Internet from DNV’s centres of expertise. “Customers frequently need testing and solutions to be completed within very tight schedules during a vessel’s port visit,” observed Mate Csorba, Manager Security Architecture & Verification, DNV.
Commonly found maritime cyber vulnerabilities
DNV’s maritime cyber security specialists regularly find instances of passwords never being changed or being pre-set by IT departments onshore and printed and posted on walls. Some passwords are weak or just factory defaults.
Sometimes, crew members back up data on personal hard disk-drives, or uncontrolled USB sticks are used to transfer loading-condition data to shore. Infected maintenance laptops connected across different systems are another vulnerability. Then there was the firewall mounted in an engine performance monitoring cabinet, but not connected; the onboard firewall with base functions disconnected; and control system devices connected to insecure onboard IT networks.
Keeping software patched and hardened against cyber-attacks sounds obvious. “But we have seen Windows operating system software being updated only during major upgrades, so it is years out of date. Sometimes Windows is installed with standard settings left unchanged,” said Csorba.
Applying standards in ethical hacking
Ethical hacking needs performing in ways that give shipowners, insurers, and other maritime stakeholders the comfort that internationally recognized standards, guidelines, and best practice are being followed.
For example, DNV Recommended Practice (RP) DNV-RP-0496 for managing the cyber security resilience of ships and mobile offshore units in operation outlines a strategy to assess weaknesses in technology, processes, and people (Figure 2) and provides a scheme on how to prioritize different safeguards.
Figure 2: Assessing cyber security in technology, processes, and people
Expecting the unexpected
To have the best defences ready to counter threats, ethical hackers need a large range of hacking tools and deep understanding of the relevant OT and IT systems.
They can draw, for example, on huge, publicly available online databases of vulnerabilities identified worldwide and updated daily, and on industry-standard search tools. That said, they are always aware that threats that have never been encountered before, ‘zero-day vulnerabilities’, can occur.
“You start with the network topology of the integrated OT/IT system and the accompanying asset inventory of hardware and any software running on it, but then don’t know what vulnerabilities you will encounter,” said Csorba. A network topology depicts how a ship’s components interconnect and communicate. Maritime cyber experts such as DNV can also assist in developing network topologies for vessels.
Ensuring cyber secure newbuild and operating vessels
With the huge investment tied up in today’s newbuild vessels, and in the cargos some carry, cyber security rises up the agenda as cyber risk increases and related regulations and de facto regulation (e.g. international standards and guidelines) become more prevalent and stricter.
“We see ethical hacking as a necessary third-party verification step for any critical cyber-enabled infrastructure including vessels,” said Csorba. “By addressing cyber security right from the concept phase, third-party penetration testing activity can be used to validate the effectiveness of the barriers that were initially designed into the integrated system.”
Accurate cyber risk assessment across the maritime value chain is needed to ensure that cyber vulnerabilities in third-party hardware and software are not introduced into vessels. Such assessment is also required to write adequate cyber security requirements into contracts with suppliers and subcontractors.
Ethical hacking can be part of the process leading towards the awarding of DNV class notation Cyber Secure which proves requirements and verification of technical barriers, processes and people awareness based on management of cyber risks on board DNV classed vessels.
Learn more about DNV's maritime cyber security services and solutions
References and further resources:
1 ‘NotPetya offers industry-wide lessons, says Maersk’s tech chief’, W Ashford, computerweekly.com, [online] 7 January 2019
2 ‘Vessel Cyber Risk Management Work Instruction’, US Coast Guard, 27 Oct 2020 ‘MSC-FAL.1/Circ.3
3 ‘Guidelines on maritime cyber risk management’, International Maritime Organization, applicable to in-service vessels since the 1 Jan 2021
4 ‘The Guidelines on Cyber Security Onboard Ships: Version 4’, produced by maritime stakeholder organizations, www.ics-shipping.org, 2021
5 ‘IACS adopts new requirements on cyber safety’, International Association of Classification Societies https://iacs.org.uk/news/iacs-adopts-new-requirements-on-cyber-safety, April 2022
6 ‘Cybersecurity Guidelines for Ports and Port Facilities: Version 1.0’, International Association of Ports and Harbours, iaphworldports.org, 2021
7 ‘BIMCO Cyber Security Clause 2019’, bimco.org
8 ‘Closing the safety gap in an era of transformation', DNV paper, 2021