MARITIME CYBER SECURITY Archives - Page 32 of 40 - SHIP IP LTD

ABSG Consulting Inc. (ABS Consulting), a subsidiary of ABS focused on safety and risk management, and American Steamship Owners Mutual Protection and Indemnity Association, Inc. (the American Club) have joined forces to provide education, training and insurance guidance that address maritime cyber security.

As digital transformation in the maritime industry brings both opportunities and new challenges, owners and operators are relying more on smart technologies and operational data to drive decisions and run their businesses. Comprehensive cyber security programs are not only necessary to protect operations but are also critical to protect the overall safety of crew and the environment. More frequent cyber attacks, increased digitalization and emerging global regulatory focus are adding to immediate demands to address and reduce cyber risk across the industry’s value chain. Cyber security has become a business imperative and new measures will have an impact on how maritime vessels and facilities will be covered by insurers.

 

“The safety and security of our members is a priority. Having a better understanding of the tools available, the programs that can be implemented and the integration of these in the marine industry will help us provide better services to shipowners and charterers globally,” says Dr. William Moore, Director of Loss and Prevention at the American P&I Club. The work we are going to do with ABS Consulting is going to help us identify how to enhance our policies, and the offerings we need to incorporate to improve the coverage and services we offer to our members.”

 

“Collaborating with the American Club to build education programs for their members and industry will give us a better understanding of the real challenges we are collectively facing,” says Ian Bramson, Global Head of Cyber Security of ABS Group. “This alliance enables us to develop the tools, training and services that support compliance and help ship owners and operators put protections in place to secure their vessels – from the design and construction phases through continuous operation over their service life.”
Source: tankeroperator


ABSG Consulting Inc. (ABS Consulting), a subsidiary of ABS focused on safety and risk management, and American Steamship Owners Mutual Protection and Indemnity Association, Inc. (the American Club) have joined forces to provide education, training and insurance guidance that address maritime cyber security.

As digital transformation in the maritime industry brings both opportunities and new challenges, owners and operators are relying more on smart technologies and operational data to drive decisions and run their businesses. Comprehensive cyber security programs are not only necessary to protect operations but are also critical to protect the overall safety of crew and the environment. More frequent cyber attacks, increased digitalization and emerging global regulatory focus are adding to immediate demands to address and reduce cyber risk across the industry’s value chain. Cyber security has become a business imperative and new measures will have an impact on how maritime vessels and facilities will be covered by insurers.

“The safety and security of our members is a priority. Having a better understanding of the tools available, the programs that can be implemented and the integration of these in the marine industry will help us provide better services to shipowners and charterers globally,” says Dr. William Moore, Director of Loss and Prevention at the American P&I Club. The work we are going to do with ABS Consulting is going to help us identify how to enhance our policies, and the offerings we need to incorporate to improve the coverage and services we offer to our members.”

“Collaborating with the American Club to build education programs for their members and industry will give us a better understanding of the real challenges we are collectively facing,” says Ian Bramson, Global Head of Cyber Security of ABS Group. “This alliance enables us to develop the tools, training and services that support compliance and help ship owners and operators put protections in place to secure their vessels – from the design and construction phases through continuous operation over their service life.”

About the American Club
American Steamship Owners Mutual Protection and Indemnity Association, Inc. (the American Club) was established in New York in 1917. It is the only mutual Protection and Indemnity Club domiciled in the entire Americas and its headquarters are in New York, USA. The American Club has been successful in recent years in building on its U.S. heritage to create a truly international insurer with a global reach second-to-none in the industry. Day-to-day management of the American Club is provided by Shipowners Claims Bureau, Inc. also headquartered in New York. The Club is able to provide local service for its members across all time zones, communicating in a large number of different languages, and has subsidiary offices located in London, Piraeus, Hong Kong, Shanghai and Houston, plus a worldwide network of correspondents. The Club is a member of the International Group of P&I Clubs, a collective of 13 mutuals which together provide Protection and Indemnity insurance for some 90% of all world shipping.

P&I Insurance
Protection and Indemnity insurance (commonly referred to as “P&I”) provides cover to shipowners and charterers against third-party liabilities encountered in their commercial operations; typical exposures include damage to cargo, pollution, death/injury or illness of passengers or crew or damage to docks and other installations. Running in parallel with a ship’s hull and machinery cover, traditional P&I cover distinguishes itself from usual forms of marine insurance by being based on the not-for-profit principle of mutuality where Members of the Club are both the insurers and the assureds.

About ABS Group
ABSG Consulting Inc. (ABS Consulting) is part of ABS Group of Companies, Inc., a wholly owned subsidiary of ABS, one of the world’s leading marine and offshore classification societies. Through its operating subsidiaries, ABS Group provides data-driven risk and reliability solutions and technical services that help clients confirm the safety, integrity, quality and efficiency of critical assets and operations. Headquartered in Spring, Texas, ABS Group operates with more than 1,000 professionals in over 20 countries serving the marine and offshore, oil, gas and chemical, government and industrial sectors.

Source:
en.portnews.ru

In the Spring Edition of ITNOW, I wrote an article on why we should be moving away from traditional cyber security and focussing on cyber mission assurance and cyber resiliency techniques. This meant framing cyber security in a manner that focussed on the outcomes the organisation needs to achieve with the preparedness to expect, and the ability to respond and recover in response to an adverse cyber effect.

NIST SP 800-160 defines cyber resiliency as: ‘the ability to anticipate, withstand, recover from and adapt to adverse conditions, stresses, attacks, or compromises on systems that use or are enabled by cyber resources.’

What do we mean by cyber safety?

Cyber Safety is a relatively new term but for this article The Royal Academy of Engineering, in their March 2018 document ‘Cyber Safety and Resilience’, defines cyber safety as ‘the ability of digital systems to maintain adequate levels of safety during operation, including in the event of a cyberattack or accidental event, protecting life and property’.

What this means is we have to understand and incorporate into our risk assessment, a consideration of what the potential impact is of a cyber event on the safe and secure operation of a safety-critical system, and therefore what controls and mitigations we need to introduce to ensure that the risk is as low as reasonably practical (ALARP).

What this approach doesn’t cover is recognising the overlaps between cyber security and Safety. We know all too well that we need to adopt an approach of layered security, or defence-in-depth, to protect and defend our systems; making it hard for our adversaries to achieve their goals. It would be wrong of us, however, to believe that we can stop every single attack. It is for this reason why our systems have to be resilient and have to be able to continue mission-essential functions during periods of attack. This means ensuring that these systems remain safe to operate and can continue their safety-critical functions. Starting at the higher level of abstraction makes it easier to spot the similarities of H&S to cyber security and therefore identify cost and resource savings.

So, what is new?

A key question you might ask is whether there is anything new by considering safety as part of the totality of cyber risk. The answer is quite simple: Yes. My major concern with current cyber security approaches is that they focus almost entirely on the risks to information, and therefore the risks this presents to the organisation (business objectives):

  • What is the risk to the confidentiality, integrity, and availability of the information? My perspective is that very few organisations ask the (additional) key questions:
  • What is the risk to the system itself and the wider environment? (I.e. Is it the system itself which is the target, rather than it information it processes?)
  • What is the risk to the people using the system or those who are reliant on its undisrupted operation?

With the rapidly increasing prevalence of the internet of things and cyber-physical systems, this consideration needs to be considered by all industrial sectors. Let’s not forget that it was the compromise of programmable logic controls by Stuxnet that caused a series of centrifuges to rotate rapidly outside of their set parameters resulting in their physical destruction. If that effect can be achieved on a standalone system, then what can happen on a networked system?

What is important is that I am not suggesting that organisations need to conduct considerably more work to understand the safety considerations of their systems, but instead they need to understand the potential hazards that may be introduced should safety-critical functions be disrupted due to a cyber event. Once these hazards have been identified they can be assured through existing cyber security standards and frameworks. The key is we need to ensure that our cyber systems are not just ‘Secure to Operate’ but also ‘Safe to Operate’.

For the purpose of this article, I’ve made the broad assumption that organisation have taken a system-level approach to understanding the overall threats to the organisation (System) rather than focussing on a component-driven approach and building up (further advice on this is available from the National Cyber Security Centre (NCSC). Starting at the higher level of abstraction makes it easier to spot the similarities of H&S to cyber security and therefore identify cost and resource savings.

Why should an organisation care?

I’d urge you to read a short article written by Nick Richards in Tripwire during 2018 ‘Why Cyber security is the New Health and Safety’ Nick argues that in order to prevent serious damage that could be caused by a cyber-attack, including the risks to individual safety, organisations should pay as much attention to cyber-security as they do to Health and Safety (H&S).

The ultimate aims of cyber-security and H&S are aligned. They are all designed to prevent loss to the organisation, its assets, and its personnel. There is another point to make which is that all assurance teams have an obligation to work together since all are trying to prevent the same types of losses albeit through different causes.

What happens if a building management system is compromised during a period when H&S is vital? The consequences of a ‘hack’ on this system which causes security doors and barriers to fail closed when they should fail open could be catastrophic. Ultimately, the H&S consequences directly relate to IT and mitigations should be employed with the input of both specialist functions.

It wouldn’t be an article on safety without mentioning the HSE

The TRITON malware, designed to disable safety-critical functions within the industrial setting, was discovered during 2017 within a Saudi Arabian petrochemical plant. Although the malware was discovered and contained before it was able to do any actual damage. One aspect which may have enabled this is the convergence of IT and operational technology (OT). I’m not going to speculate on what vulnerabilities may have afforded access to the attackers in this instance, instead I’m going to say something that should be obvious. We need to understand the risks posed by the convergence of these different technologies; that are beyond the scope of this article.

The NCSC recognise that there is a need to apply an integrated approach which adapts and applies best practice from both the safety and security communities. The 14 principles within the NCSC Cyber Assessment Framework (CAF) provides useful guidance for ‘organisations managing cyber-related risks to public safety’ (one of the three broad areas where NCSC believe the guidance is useful).

We can’t talk about safety without mentioning the Health and Safety Executive (HSE). Back in March 2017, the HSE published its guidance OG86 ‘Cyber Security for Industrial Automation and Control Systems (IACS)’. Although this guidance is primarily aimed at HSE Inspectors, particularly around applying a consistent approach to regulation, this document is freely available to all organisations and provides useful guidance on how compliance might be achieved. If you know me, you know how much I hate a compliance-based approach as it encourages a ‘do-minimum’ mentality, but I fully support that this is guidance that takes us in the right direction.

International Maritime Organisation (IMO) resolution on cyber risk management

What has prompted me to write this article is the imminent enforcement of the International Maritime Organisation Resolution MSC.428(98) – ‘Maritime Cyber Risk Management in Safety Management Systems’. If you haven’t guessed from the title, what this resolution requires is that organisations within the maritime industry ensure that cyber risk is appropriately included within their respective safety and environmental management systems (SEMS). I’m not intending to go into the detail of the resolution, it is easily searchable on the IMO website. Instead, I want to focus on the core message.

We need to be able to ensure that we can safeguard shipping from cyber-attacks and have processes in place to improve resiliency for when these are successful. The IMO resolution provides a massive step forward as it allows shipping companies to simply complement existing safety and security management practices already established by the IMO with cyber risk management practices.

What we do need to remember is a ship may be in service for some decades and therefore will have been designed and built during a period when the cyber threat was different. That does not preclude the organisation, however, from having the appropriate policies and processes in place to respond to a cyber-event.

The resolution is an excellent step forward to ensuring that maritime organisations consider the impacts that cyber events could, and would likely have, on safety. The resolution, however, is not prescriptive on how this should be achieved but it does provide guidance on how a maritime organisation should approach the assessment of cyber risk. Interestingly, the supporting document MSC-FAL.1/Circ.3 maps some of the considerations, which are not exhaustive, to the NIST Cyber Security Framework function areas (identify, protect, detect, respond, recover).

You might sense a bit of repetition in this article as this takes me back to an earlier point. I am not suggesting that organisations that already have cyber risk management processes have to conduct a significant amount of further work. Existing methodologies can be used to help assess the impacts that a cyber event can help on safety. This is possible through the use of ISO27001 and the NIST CSF, as well as other frameworks, to ensure that systems are both designed and operate in a manner that is safe and secure. They just have to be conducted and viewed through a safety lens; i.e. what would prevent that system from operating safety?

But another question I have is: Has cyber been considered as apart of the SEMS for the other sectors, namely rail, aviation, automotive? If the answer is they haven’t, then maybe they need to.

What is the takeaway?

Organisations need to ensure that both cyber security and cyber safety risks are understood, documented, and ensure that processes are in place to manage these at a level which is ALARP for both H&S and security. The mitigations should be planned jointly to maximise effectiveness. The message is simple. Gone are the days of considering cyber security and H&S separately. We must ensure that we follow an integrated approach that ensures that our systems are both secure and safe to operate.
Source: bcs


Nippon Kaiji Kyokai (“ClassNK”) joined the Maritime Transportation System Information Sharing and Analysis Center (MTS-ISAC) as part of a growing list of maritime community partners. This is an innovative relationship between the two nonprofit organizations aimed at strengthening vessel and shoreside cyber risk management. The partnership provides ClassNK with actionable insights from community-sourced cyber threat intelligence to reinforce ClassNK’s Cyber Security Guidelines to help prevent cyber incidents from negatively impacting the safety and security of maritime operations. ClassNK is the first classification society and the first non-U.S. organization to formally join the MTS-ISAC, helping broaden the reach of the MTS-ISAC’s efforts to support the maritime community.

Both vessel and shoreside cybersecurity efforts will be under increasing scrutiny starting in 2021. The International Maritime Organization (IMO) has a deadline of January 1, 2021 for Maritime Cyber Risk Management to be addressed in Safety Management Systems. Meanwhile, the U.S. Coast Guard will be inspecting Maritime Transportation Security Act of 2002 regulated facilities for cyber risk management efforts for the first time starting with annual inspections occurring on or after October 1, 2021. Both of these organizational efforts have signaled to maritime stakeholders that cybersecurity is a priority that must be addressed to ensure safe and secure MTS operations.

Hirofumi Takano, Executive Vice President at ClassNK, explains, “We have been working with the International Association of Classification Societies (IACS), maritime stakeholders and cyber security professionals to understand and promote cybersecurity best practices across the maritime transportation system (MTS). By joining the MTS-ISAC, we will have increased visibility to current, real-world examples of cyber threats targeting MTS stakeholders. This provides us an opportunity to reinforce how, and periodically update, ClassNK’s Cyber Security standards to provide our stakeholders with the latest security recommendations to protect their assets from cyber threats. With IMO 2021 right around the corner, this relationship is perfectly timed to add increasing value to our stakeholders, and we are excited to be a part of the active and growing MTS-ISAC community. We hope ClassNK stakeholders will quickly understand the value of this partnership.”

“We are excited that ClassNK is bringing a proactive, classification society perspective into the MTS-ISAC community,” adds Scott Dickerson, the MTS-ISAC’s Executive Director. “The MTS community’s resiliency is improved when we can quickly address cyber risks with meaningful cybersecurity controls. ClassNK joining the MTS-ISAC is a perfect example of how community partnerships provide win-win situations while reinforcing to stakeholders how the implementation of guidelines and recommended security controls can reduce their exposure to risks the community is actively seeing. The MTS-ISAC’s Board of Directors understands the importance of cyber risk prevention efforts and are supportive of the inclusion of class societies into our information sharing ecosystem as a key component to building a stronger culture of community cybersecurity.”

The MTS-ISAC, which was formed in February of this year, has seen rapid adoption of its Cybersecurity Information Sharing Services, and has produced a number of maritime cybersecurity advisories sourced from member shared information. The MTS-ISAC strives to incorporate best practices into their intelligence products so that MTS critical infrastructure stakeholders can be better protected. While ClassNK is the ISAC’s first international member, it anticipates additional international stakeholders to be joining the community.

Source:
hellenicshippingnews.com

Violent attacks against ships and their crews have risen in 2020, with 77 seafarers taken hostage or kidnapped for ransom since January, reveals the ICC International Maritime Bureau’s (IMB) latest piracy report.

The Gulf of Guinea off West Africa is increasingly dangerous for commercial shipping, accounting for just over 90% of maritime kidnappings worldwide. Meanwhile ship hijackings are at their lowest since 1993. In total, IMB’s Piracy Reporting Centre (PRC) recorded 98 incidents of piracy and armed robbery in the first half of 2020, up from 78 in Q2 2019.

The increasing threat of piracy adds to hardships already faced by hundreds of thousands of seafarers working beyond their contractual periods due to COVID-19 restrictions on crew rotations and international travel.

“Violence against crews is a growing risk in a workforce already under immense pressure,” says IMB Director Michael Howlett. “In the Gulf of Guinea, attackers armed with knives and guns now target crews on every type of vessel. Everyone’s vulnerable.”

So far this year, 49 crew have been kidnapped for ransom in the Gulf of Guinea and held captive on land for up to six weeks. Rates are accelerating, with 32 crew kidnapped in the past three months alone. And incidents are happening further out to sea: two-thirds of the vessels were attacked on the high seas from around 20 to 130 nautical miles off the Gulf of Guinea coastline.

IMB PRC urges vessels to report any attacks promptly. It can then liaise with coastal agencies, international navies and vessel operators, encouraging a quick response to deter piracy and armed robbery and improve the security of seafarers. IMB PRC also broadcasts to shipping via GMDSS Safety Net Services and email alerts to Company Security Officers.

“We need to change the risk-to-reward ratio for pirates operating within the Gulf of Guinea. Without an appropriate and proportionate deterrent, pirates and robbers will get more ruthless and more ambitious, increasing the risk to seafarers,” says Howlett.

In one recent case commended by IMB, the Nigerian Navy responded promptly to a distress call from a fishing vessel boarded and hijacked by armed assailants in Ivory Coast waters. As a result the crew were saved and the ship was prevented from being used as a possible mother vessel to carry out further attacks.

In another incident, a product tanker was attacked while underway around 127 nm off Bayelsa, Nigeria. Eight armed pirates kidnapped ten crew as well as stealing cash, personal valuables, and ship’s property. IMB PRC contacted regional and international authorities, and a Nigerian Navy Security Vessel was dispatched. A nearby sister vessel helped the four remaining crewmembers to sail the tanker to a safe port. The kidnapped crew were released three weeks later.

Singapore Straits

The Singapore Straits saw 11 incidents in the first half of 2020, raising the risk of collisions in this busy shipping channel, especially at night. Although most are opportunistic – low-level attacks that are aborted once the alarm is sounded –­­­­­­­ two reports in May 2020 indicated crew were threatened with knives, taken hostage and injured.

There were ten attacks in Indonesian anchorages and waterways in Q2 2020, up from five in Q1 2020.

Americas – Call for more reporting

IMB is recording more incidents in new areas of Latin America, but says many attacks go unreported, making the problem more difficult to tackle.

The four attacks that were reported in Mexico all targeted offshore vessels and happened within a span of 11 days in April. One anchored accommodation barge was boarded by six people wearing face masks and armed with automatic weapons and pistols. They attempted to enter and opened fire, leading to an injured crewmember and three damaged windows. The Master raised the alarm, sent a distress message, informed the Chief Security Officer, and the crew mustered in the citadel. The incident was reported to the Marine Control and a naval boat was dispatched, but the attackers escaped with the barge’s high value project equipment.

Incidents continue to be reported off Callao Anchorage, Peru, while vessels off the coast of neighbouring Ecuador have recorded incidents each year since 2017, with at least three container ships attacked while underway in Q2 2020. In one case, two crew were taken hostage for the duration of the robbery and in another the perpetrators fired on the ship when they were unable to gain access.

Somalia

No incidents were reported off Somalia. Vessels are urged to continue implementing Best Management Principles (BMP5) recommended practices while transiting these waters. The Somali pirates still maintain the capability for carrying out attacks.

IMB Piracy Reporting Centre

Since 1991, the IMB PRC’s 24-hour manned center remains a single point of contact to report the crimes of piracy and armed robbery. The Centre not only assists ships in a timely manner, it also provides the maritime industry, response agencies and governments with transparent data received directly from the Master of the vessel under attack, or its owners.

Source: iccwbo


The Port of Beaumont was awarded $533,913 in federal funding by the U.S. Department of Homeland Security’s Federal Emergency Management Agency (FEMA) Port Security Grant Program (PSGP), the port announced July 15. The grant will reportedly fund a portion of three major security projects designed to upgrade the port’s video surveillance capabilities and cybersecurity program.

In total, the 2020 Port Security Grant Program awarded $100 million to eligible applicants including port authorities, facility operators, and state and local government agencies, to help protect port infrastructure from terrorism, enhance maritime domain awareness, improve port-wide maritime security risk management, and maintain or reestablish maritime security mitigation protocols that support port recovery and resiliency efforts. Southeast Texas was the beneficiary of six PSGP grants totaling $3.3 million.

“The Port Security Grant program is vital to supporting the National Preparedness System to ensure the nation has the capabilities to prevent, protect against, mitigate, respond to, and recover from natural and technological hazards along with terrorist and cyber-attacks,” says Director of Securities, Facilities and Regulatory Compliance Randal Ogrydziak. “The Port of Beaumont’s three Port Security Grant projects will greatly enhance the port’s physical, video surveillance and cybersecurity.”

The Port of Beaumont’s three projects are expected to be complete by summer 2021.

Source: beaumontbusinessjournal


Global market leader for commercial maritime software Veson Nautical has formally launched VIP Data Lake, the newest module of its innovative cloud solution, the Veson IMOS Platform (VIP).

One of VIP’s optional Data Solutions, Data Lake offers a cloud-native, scalable solution that allows users to interact with and download large amounts of data in a highly efficient manner. The module was first announced at Veson’s ONCOURSE user conference, which took place virtually last month.

Bill McConnell, Product Manager at Veson Nautical, commented:

“In a single day, the maritime shipping industry generates roughly 120 million data points related to contracts, vessel movement, cargo locations, and more. Without a proper solution, organizations are not able to effectively analyze their historical data. The Data Lake solution solves that problem by making data in the VIP operational database available on an ongoing basis, in a format compatible with leading data reporting and analytics tools.”

VIP Data Lake is designed handle vast quantities of data at one time, and is compatible with data warehouse, business intelligence and data analytics solutions. By increasing simplifying full access to historical operational data snapshots, Veson seeks to empower its clients to unlock powerful insights and make better, data-driven decisions.

Ben Thurecht, CTO at Veson Nautical, commented:

“Many of the conversations we have with our client base center around accessing, securing, and integrating data into downstream applications. VIP Data Lake allows clients to gain rapid access to all of the data stored in VIP, refreshed on either a daily or hourly basis. That data can then be downloaded and ingested into downstream systems, such as a custom data warehouse solution or a third party application. This allows our customers to retrieve and work with larger quantities of data easier than ever before, which in turn opens up a world of opportunity for extracting valuable insights and supporting decisions with data”

VIP Data Lake joins 16 other modules on the Veson IMOS Platform as an optional Data Solution in the market-leading end-to-end system. The module is available today.

Source: seawanderer


German container shipping line Hapag-Lloyd on Wednesday reported preliminary results for the first half of 2020 showing core profits above those of the same 2019 period and upholding its guidance for full year earnings.

However, the company said in an ad hoc announcement that the forecast was subject to “high uncertainty” due to risks related to the coronavirus crisis and its impact on the macroeconomy and global shipping.

Hapag Lloyd achieved a 20.3% year-on-year rise in earnings before interest, tax, depreciation and amortization (EBITDA) to 1.15 billion euros ($1.31 billion) and a 28.5% increase in earnings before interest and tax (EBIT) to around 500 million euros in the six months, it said.

Full-year EBITDA should be 1.7 to 2.2 billion euros and EBIT 0.5-1.0 billion euros, it reiterated.

Analysts see a chance that container shipping companies, helped by cost discipline and the resumption of Chinese business activities, can prevent a steep decline in freight rates and benefit from a tentative recovery later in 2020.

Hapag-Lloyd has added several hundred million euros to its 1.1-1.2 billion euro reserve, allowing its operations to continue unhindered for 12 to 18 months should demand problems outside China linger, chief executive Rolf Habben Jansen said in May. Final first half figures will be published on August 14.

Source: maritimeprofessional


ClassNK reports that it has joined the Maritime Transportation System Information Sharing and Analysis Center (MTS-ISAC), a US-based non-profit formed in February 2020 to promote cybersecurity information sharing throughout the maritime community.

The MTS-ISAC has already produced a number of maritime cybersecurity advisories sourced from member shared information, aiming to share members’ best practices so that critical infrastructure stakeholders can be better protected. ClassNK is the group’s first non-US member, though it expects to add further additional international stakeholders to the community in the future.

The partnership provides ClassNK with additional community-sourced cyber threat intelligence to reinforce its own Cyber Security Guidelines, something the class society has been keen to do in advance of the IMO’s January 1, 2021, deadline for Maritime Cyber Risk Management to be addressed in Safety Management Systems.

In addition, the US Coast Guard will begin inspecting facilities regulated under the Maritime Transportation Security Act of 2002 for cyber risk management efforts for the first time next year, starting with annual inspections occurring on or after October 1, 2021.

“We are excited that ClassNK is bringing a proactive, classification society perspective into the MTS-ISAC community,” said Scott Dickerson, the MTS-ISAC’s Executive Director.

“The MTS community’s resiliency is improved when we can quickly address cyber risks with meaningful cybersecurity controls. ClassNK joining the MTS-ISAC is a perfect example of how community partnerships provide win-win situations while reinforcing to stakeholders how the implementation of guidelines and recommended security controls can reduce their exposure to risks the community is actively seeing.”

“The MTS-ISAC’s Board of Directors understands the importance of cyber risk prevention efforts and are supportive of the inclusion of class societies into our information sharing ecosystem as a key component to building a stronger culture of community cybersecurity.”

Source: smartmaritimenetwork


Ransomware attackers who hacked leading Australian maritime logistics business Toll Group’s corporate server files in May 2020 have published stolen data on the Dark Web, the company has revealed. The hackers used Nefilim ransomware to steal sensistive dat  including Toll employee names, home addresses, age, birthdates, and payroll details including salary, superannuation, and tax file numbers.

While it’s not illegal to visit the Dark Web, it provides access to illegal activities. Web sites that exist on the Dark Web are encrypted most commonly through the Tor encryption tool and most Dark Web users access those sites using the Tor browser.

The Dark Web allows users to remain anonymous through encryption. This is attractive to anyone involved in illegal activity, such as child pornography, sex trafficking, illicit drugs, or counterfeit goods. The hackers who scolded Toll did so easily because of  its lack of security measures. “Toll Group failed to secure their network even after the first attack (in January),” read the post, screen grabbed by Data Breach Today. “We have more than 200 GB of archives of their private data.”

Toll have refused ransom demands by the unknown hackers so far. 

The first attack, which took place in January and has since been attributed to a Russian criminal group, a Toll spokesperson has said there has been a second unrelated attack. The second security breach, which took place in May was in concert with a spate of attacks on other industries in Australia. Australia’s trade and diplomatic relationships with China have worsened over issues regarding the COVID-19 pandemic and as yet unattributed cyber attacks on Australian institutions and businesses.

A recent joint cyber security survey by the international maritime  association BIMCO found the “attack surface” or human element to be a major factor in maritime shipping  industry breaches. 

The survey noted that training in the maritime industry was important to prevent seafarers and dockers opening emails containing malware or inserting infected USB sticks into company computers.

Maritime organisations would stop doing business with a third-party supplier due to a lack of cyber-security protections, according to an industry survey.

More than three-quarters (77%) of respondents to the 2020 Safety at Sea and BIMCO Maritime Cyber Security survey said they would cancel a contract with a third-party supplier over concerns with their cyber-security practices, or if it was found to be the cause of a cyber incident in the respondent’s own organisation. Furthermore, 26% admitted they had previously recommended not doing business with a third-party supplier due to concerns over poor cyber security practices. The survey found 68% reported phishing incidents where email attachments or web links led to breaches. Contractors or third parties were also a liability.

What is susceptible to attack at sea is navigation control and propulsion, automatic identification system (AIS), electronic chart display and information system (ECDIS), or radar. In ports, ships’ cargo handling or container tracking could be compromised.

The International Maritime Organisation has given ship-owners and managers until January 2021 to incorporate cyber risk management into their respective ship management systems.

Toll said it had further strengthened its systems and operations across its global network have resumed as normal.
While maritime companies are expanding their assessments into cyber security weaknesses across their supply chain, many of their measures remain firmly focused on reducing human error.

“Cyber-security training is seen by many as a first line of defence, especially against the most common types of cyber incidents,” said Jakob P. Larsen, Head of Security at BIMCO. “Eighty-eight percent of respondents indicated that their company offers some sort of cyber training, either internally provided (58%) or externally provided (30%).

BIMCO


Company DETAILS

SHIP IP LTD
VAT:BG 202572176
Rakovski STR.145
Sofia,
Bulgaria
Phone ( +359) 24929284
E-mail: sales(at)shipip.com

ISO 9001:2015 CERTIFIED