Subex, a provider of Internet of Things (IoT) and Operational Technology (OT) cybersecurity solutions, and SkyLab, a specialist in 5G Multi-Access Edge Computing (MEC) and Industrial IoT have announced a partnership to offer IoT and OT cybersecurity solutions and services to the maritime sector.

According to Subex’s research, shipping companies around the globe were attacked almost 1.5 million times in the last 30 days. Of these, over 64,000 attacks were highly sophisticated and carried out using complex malware and breach tactics. Social engineering, deception, and traffic manipulation were all used to create breaches and enable intrusion into core and peripheral infrastructure.

Targets for these attacks include datacenters, command and control infrastructure, navigation systems, power, and life support systems among others. The increase in volume also increases the chances of a successful breach. Thus, the industry continues to be at risk.

In addition to the rising threat to maritime infrastructure, there is also the secondary threat of potentially significant losses caused by the loss of shipping days, delays in transit of goods, damage to critical infrastructure, loss of either customer or commercially sensitive data and ransom demands. In one incident off the coast of the United States, hackers tried to take over the navigation systems of a ship and ram the vessel into a port. It was with much difficulty that the crew was able to gain control and prevent a catastrophe.

The International Maritime Organization (IMO), the United Nations specialized agency with responsibility for the safety and security of shipping and the prevention of pollution by ships, has also recognized the importance and urgency required to tackle the challenges posed by cybersecurity risks. IMO has issued MSC-FAL.1/Circ.3 Guidelines on maritime cyber risk management and adopted resolution MSC.428(98) encouraging administrations to ensure that cyber risks are appropriately addressed in existing safety management systems before the first annual verification of the company’s Document of Compliance after January 1 2021.

Through their partnership, Subex and SkyLab will be jointly offering cybersecurity solutions and services including Security Operations Center services to improve overall maritime cybersecurity posture and cyber–resilience.

 

Source: hstoday


Digital threats are becoming more complex. The access, connectivity, and networking of IT (Information Technology) and OT (Operational Technology has led to increased cyber security threats and risks for many maritime operations. It’s more important than ever to stay ahead of these threats before they cause damage to your organization.

Vulnerability Management should be an inherent part of your company’s safety and security culture – ensuring the safety, security, and protection of the ship, the crew, the cargo, and the marine environment. An investment in our platform will help your operation runs smoothly and on time.


Noting this threat, shipping companies are reminded of the importance of applying BMP 5 to ensure that the voyage is fully risk assessed and that ships are hardened against the security threats in the region. Similarly, it is recommended that ships rerouting southwards should route north-east of Socotra before turning South and that where possible, should maintain a safe distance from the Somali coastline in accordance with the risk assessment.

Furthermore, it is stressed that all ships in the region should register with MSCHOA and report to UKMTO as outlined in BMP 5, to ensure they are visible to the military assets deployed in the region which can assist in cases of piracy, and to ensure that they will be alerted to any threats or incidents.

 

Source: bimco


This partnership aims to help boost the overall cybersecurity posture of the maritime industry as ships, offshore and onshore maritime assets, communication channels and shipping infrastructure will now receive the highest levels of cybersecurity protection, threat risk management support, solutions, and services.

According to Subex’s research conducted using data from its global honeypot, shipping companies around the globe were attacked almost 1.5 million times in the last 30 days. Of these, over 64,000 attacks were highly sophisticated and carried out using complex malware and breach tactics. Social engineering, deception, and traffic manipulation were all used to create breaches and enable intrusion into core and peripheral infrastructure.

Targets for these attacks include data centers, command and control infrastructure, navigation systems, power, and life support systems among others. The increase in volume also increases the chances of a successful breach.

In addition to the rising threat to maritime infrastructure, there is also the secondary threat of potentially significant losses caused by the loss of shipping days, delays in transit of goods, damage to critical infrastructure, loss of either customer or commercially sensitive data and ransom demands. In one incident off the coast of the United States, hackers tried to take over the navigation systems of a ship and ram the vessel into a port. It was with much difficulty that the crew was able to gain control and prevent a catastrophe.

Through this partnership, Subex and SkyLab will be jointly offering cybersecurity solutions and services including Security Operations Centre services to improve overall maritime cybersecurity posture and cyber–resilience.

Vinod Kumar, managing director & CEO, Subex, said: “This alliance combines Subex’s deep expertise in cybersecurity and SkyLab’s strengths in 4G/5G mobile edge computing and core networking technologies to reliably accelerate, monitor and inspect traffic whilst adapting to dynamic connectivity conditions at sea.  This association will help secure the industry and ensure compliance to standards whilst offering reliable protection to both critical and non-critical systems.

“We are delighted to partner Subex in addressing one of the core concerns of the shipping industry – cybersecurity. Together, we endeavour to empower reliable, secured, and cyber-resilient shipping lanes globally by partnering maritime stakeholders, and enable them to secure of their operations, assets, people as well as data,” said Stephen Ho, group chief operating officer, SkyLab.

Caption: The partnership between Subex and SkyLab aims to boost cybersecurity in the maritime industry

 

Source: thedigitalship


The enduring feature of cyber threats is their ability to adapt and evolve, with new lines of attack developed as barriers are put in place, and strategies to expose vulnerabilities constantly emerging. A June 2020 White Paper** from the British Ports Association and cyber risk management specialists Astaara suggests that reliance on remote working during the COVID-19 crisis coincided with a fourfold increase in maritime cyber attacks from February onwards, for example.

In fact, cyber security was ranked as the second highest risk for shipping in 2019, behind natural disasters, according to a survey of over 2,500 risk managers conducted by Allianz. Given that, according to IBM, companies take on average about 197 days to identify and 69 days to contain a cyber breach, it is clear that an attack on a vessel’s critical systems could threaten the safety of a ship as well as the business of shipping. The fact that a 2019 Data Breach Investigations Report from Verizon indicates that nearly one-third of all data breaches involve phishing provides one indicator that, where cyber vulnerabilities exist, the ‘human element’ can badly expose them.

 

Source: rivieramm


Maritime digital transformation is in its most rapid and turbulent era. Such a transformation offers substantial advantages and benefits, but with commensurate risks in the cyber domain.

On June 16, 2017, the International Maritime Organization (IMO) adopted Resolution MSC.428(98) that “encourages administrations to ensure that cyber risks are appropriately addressed in existing safety management systems (as defined in the ISM Code) no later than the first annual verification of the company’s Document of Compliance (DOC) after 1 January 2021.” The same year the IMO developed related guidelines (MSC-FAL.1/Circ.3). While the resolution is a formal acknowledgement of the importance of cybersecurity by the UN agency, the guidelines highlighted that effective cyber risk management should start at the senior management level.

But even smart and elaborate risk management will not be effective until appropriate cyber awareness arises among all those engaged in the maritime world. The human element is the most valuable but also the most vulnerable in maritime cybersecurity. While modern technology affords a measure of protection against direct hacking, social engineering has become the most prevalent vector for cybercrime.

There is a popular opinion that the direct targeting of senior leaders (known as whaling attacks, or CEO fraud), is the most probable scenario for a lucrative cyberattack. In cases of success, offenders can get access to sensitive data or even entire networks and affect many processes within the system. In some cases, attackers could even get options to direct groups of ships. On the other hand, such a “whaling attack” is a complicated process with disputable chances of success. The obligation senior executives have toward cyber risk management is fast becoming a standard assumption. These leaders are becoming more and more aware of these hazards and are better maintaining prudent behavior to reduce cyber risks to themselves personally. Much simpler is the method of attempting to socially engineer other types of maritime workers, who at first sight appear less significant than executives, but who also enjoy broad access to maritime systems and networks.

There are two main groups that can be distinguished as desirable targets. The first group includes crewmembers onboard commercial vessels and naval ships, especially those who have direct access to the ship’s control systems or important elements of shipboard systems, like communications, engines, or cargo handling equipment and storage areas. The second group includes shore-based personnel, including technicians and advisors, third party contractors, especially those who have remote access to seaborne networks and contacts.

There are three critical areas attractive to attackers, including navigational systems and sensors, cargo handling and storage, and propulsion and power. In most cases the latter two elements require direct physical access to effectively access critical systems. In contrast, navigational systems are perhaps among the most advanced networked and digitally accessible systems onboard.

If cyber intruders got access to ECDIS (the Electronic Chart Display and Information System), they would be able to attempt offensive options such as jamming  or corrupting signals received from external sensors (GPS, AIS, Radar/ARPA, Navtex), gathering critical hydrographic information, and tampering directly with the Electronic Navigational Chart (ENC). While official ENCs often feature highly protected data, unauthorized access to the ENC’s manual correction option can be disruptive. Hackers could also go for the simpler option of disabling the operating systems of the ECDIS workstations, where in the majority cases this is a commonplace Windows operating system, and not necessarily the latest version. With the highly integrated bridge navigational systems of modern chemical tankers and passenger ships, attackers could even target the ship’s auto-steering algorithm.

Unauthorized access to such an important navigational system can be obtained with malware accepted by equipment operators via their email client and personal social media profiles. Today, with the internet widely available onboard modern commercial vessels, shipboard personnel can freely use their personal mobile devices or laptops for web access and private communications. At the same time, cybersecurity hygiene and best practices are often neglected, and the same personal devices can be used for operational data storage and transfer, including transferring data to and from ECDIS workstations.

Imagine a scenario where a chemical tanker was chosen as a target by a hacking group. Information regarding the vessel’s static and dynamic (course/speed/position) data, crew composition, type and quantity of cargo, destination, captain’s name, and other items of interest could be collected from the web. Attackers could search and exploit the social media networks of crewmembers, preferably the targeted vessel’s bridge team member. The task is made easier by social media networks and websites focused on professional groups and employment.

During the second stage, the stage of evaluation, the opted profile is carefully examined by the offenders for weakpoints. Nowadays, the majority of social media users are registered across several platforms, such as those focused on personal and professional connections, as well as entertainment preferences. Therefore adversaries can gain information not only about the mariner’s place of service but also about their family, hobbies, places visited, and other information that could be relevant to designing a socially engineered attack.

Their objective will be to obtain unsanctioned admittance into the vessel’s systems. The targeted person can either be blackmailed or contacted by a fake profile of a trusted contact with the aim of dispatching malware via the victim’s access. An untrained and unaware navigational officer could install the malicious software to the navigational computer, under the guise of ‘colleague’s friendly tip.’

A socially engineered attack can be made to seem more credible when shore personnel, such as technicians or support desk members, are targeted. With almost the same measures in searching, evaluating, targeting, and hacking, perpetrators can infiltrate and attack even larger groups of ships due to how shore professionals often have access and jurisdiction over many vessels.

More nefarious intentions could include causing a chemical spill, setting a ship on a collision course with a naval ship or a passenger vessel, or damaging critical shore-based infrastructure. In respect of these scenarios, maritime cyber threats should be considered as a matter for the International Ship and Port Facility Security Code (ISPS), and not only the International Safety Management Code (ISM). The ISPS code consolidates various constructive requirements so that it can achieve certain objectives to ensure the security of ships and ports.

There are some important requirements under the ISPS. The security-related information exchanges among the appropriate contracting agencies, both government and private, include collecting and assessing the obtained information and further distributing it. Correspondingly, definitions are included for the relevant communication protocols for vessels and port facilities for uncomplicated exchanges of information. Another important element is attempting to prevent any unauthorized access on a vessel, port facility, or other important restricted areas. Even if unsanctioned entry is not a threat, it is always regarded as a potential danger.

The ISPS also regulates provisions of different options for alarm-raising in case a security-related incident is encountered or potential danger is evaluated. It seems logical enough to apply similar requirements for maritime cybersecurity. There are several main tasks to consider: cybersecurity information collecting, evaluation and exchange between concerned parties; prevention of unauthorized access; malware and spyware installation or transfer; and appropriate training of personnel.

Eventually, regulation should be introduced regarding the human element. Specifically, trainings and exercises should be introduced for vessels’ crew and port facilities’ staff to ensure their awareness with the security plan and that there will be no delay in procedure execution in case of a real threat. Advanced cybersecurity training and education should be encouraged, especially for critical staff like watchkeeping officers or engineers. The purpose of such an education would be to gain knowledge and develop skills in cybersecurity in order to anticipate threats at early stages. Trained personnel should also be ready to prevent unauthorized access to critical equipment and systems and be vigilant for particular malfunctions that could be caused by illicit infiltration. In cases of potential penetration, staff should be skilled enough to insulate affected areas of the system without losing control of the vessel. Their proficiencies should include the ability to manage a transition to emergency manual control and utilizing classic techniques in seamanship and communication.

Maritime security, through cybersecurity, will become a much more complex endeavor. It will require a considered combination of the human element, technical innovation, management procedures, security protocols, and classical maritime know-how. Considering the lack of cyber-awareness among some mariners, a transfer of malware from a personal device to a ship’s navigational system is just a matter of time. The international maritime community should accelerate and strengthen efforts to develop adequate measures to withstand future challenges in the maritime cyber domain.

Leonid Vashchenko is a professional mariner, currently serving as a chief officer on board ocean-going commercial vessels. He holds a Masters Degree in Marine Navigation from the National University “Odessa Maritime Academy,” Ukraine, and is a active member of the Nautical Institute, London. His views are his own and do not necessarily represent the official views or policies of the organization or companies he is employed with.

 

Source: cimsec


The maritime transport industry is increasingly reliant on computing and communication technologies, and the need for cyber risk management of critical systems and assets on vessels is becoming critically important. In this paper, a comprehensive cyber risk assessment of a ship is presented. An experimental process consisting of assessment preparation activities, assessment conduct and results communication has been developed. The assessment conduct relies on a survey developed and performed by interviewing a ship’s crew. Computational vulnerability scanning of the ship’s Electronic Chart Display and Information System (ECDIS) is introduced as a specific part of this cyber security assessment. The assessment process presented has been experimentally tested by evaluating the cyber security level of Kobe University’s training ship Fukae-maru. For computational vulnerability scanning, an industry-leading software tool has been used, and a quantitative cyber risk analysis has been conducted to evaluate cyber risks on the ship.

 

Source: cambridge


Vessels worldwide are now facing compliance with IMO 2021 cyber security regulations.  These are the first of what could be additional cyber security regulations for regulated vessels and facilities. International Maritime Security Associates (IMSA), the developers of the award-winning ARMS software platform, have developed a suite of cyber security tools and services for the maritime industry.  The company has recently launched the capability to conduct basic shipboard network vulnerability assessments without sending personnel onboard.

“This capability is necessary in today’s current COVID environment.” Comments Corey Ranslem, CEO of IMSA. “We know it isn’t always easy, practical or cost effective to send people onboard a vessel to conduct a cyber security assessment, so we’ve developed this amazing remote assessment tool.  Through this tool, our cyber specialists can conduct a remote assessment at about half the cost of sending personnel onboard. This tool helps our global clients with IMO 2021 cyber security compliance along with protecting passengers, crew, and cargo.”

This unique tool is part of a larger suite of cyber security tools IMSA has developed to support vessels and maritime facilities with expanding their cyber security defenses.  Some of these cyber security tools are part of the ARMS software platform. Through ARMS, IMSA can monitor a vessel’s critical systems and networks remotely in real-time through their state-of-the-art SOC (Security Operations Center).  This capability protects vessels from real-time threats to IT, OT, and other critical network systems.

“IMSA is continually enhancing the levels of protection we provide our clients.” Says Ranslem.  “Through ARMS and our 24/7 operations center we provide a variety of client focused services to ensure the safety of your voyage and critical systems.”

 

Source: maritime-executive


There are growing signs that a military crisis could erupt across the Taiwan Strait this year as China flexes its military muscle to strongarm Taipei into accepting unification.

ASPI’s Peter Jennings notes that Beijing is also seeking to test the mettle of the new US administration.

It’s vital that the United States stand firm against any Chinese provocation. A failure to defend Taiwan would be an abdication of US international leadership. It would seriously damage America’s credibility in the Indo-Pacific and would invite China and others to become ever more aggressive. Thankfully, all indications suggest that President Joe Biden is set to continue strengthening Washington’s relationship with Taipei.

Jennings argues that it’s equally important for Australia to stand with the US in any Taiwan Strait crisis. If China decides that military adventurism, timed to exploit the ongoing Covid-19 pandemic and political turmoil in the US, is a way to further its goal of ending America’s strategic primacy in the Indo-Pacific, the worst thing Australia could do is look the other way.

Principles matter. As Australia enjoys all the benefits of a free and open society in a stable and functioning democracy, our principles and values must extend to supporting the survival of Taiwan as a vibrant democracy of 24 million people with a successful market economy. The examples of Hong Kong and Xinjiang suggest a dark future for the Taiwanese people if China decides to force unification with the mainland.

Taipei’s success provides a powerful alternative to Beijing’s promotion of authoritarianism with Chinese characteristics as a model for development. Ideological competition is intensifying as Xi Jinping pushes for a Chinese-led ‘community of common destiny’ as a basis for the future global order. It’s just as vital for Western democracies to win this new ideological battle as it was for us to resist Soviet communism during the Cold War. To turn away from a fellow democracy under threat from an aggressive authoritarian neighbour would make a mockery of the values we advocate and lower our credibility in the eyes of many developing countries.

China has a geostrategic agenda that goes beyond forcing unification on the Taiwanese people. Taiwan is a means to a Beijing-dominated regional order that would dramatically worsen our strategic outlook.

A Chinese-controlled Taiwan would ease the challenges for Beijing in projecting naval power across the Indo-Pacific and weaken the ability of the US to maintain a forward presence in the western Pacific. From ports and air bases in Taiwan, the People’s Liberation Army could support the extension of its maritime militia and coast guard northwards through the Ryukyu Islands and against the Senkaku Islands. That would make it more difficult for Japan to protect its southern islands and give Beijing added coercive leverage against Tokyo in a crisis, including by interfering with Japan’s maritime commerce.

From Taiwan, the PLA could also pivot south, effectively enveloping the Philippines and giving Beijing easier access to the resource-rich Benham Rise. China has already sent oceanographic vessels there and challenged Manila’s sovereignty over those waters. Chinese control of Taiwan would also strengthen Beijing’s ability to control the South China Sea by blocking the Luzon Strait and the Balintang and Babuyan channels, cutting off the traditional access paths used by US naval vessels.

Control of Taiwan would make it easier for the PLA to reach Guam using long-range missiles and airpower, extending its anti-access capabilities beyond the first island chain. It would also enable the PLA to operate Type 096 ballistic-missile submarines further out into the middle sea between the first and second island chains, bringing more of the US within reach of JL-3 nuclear-armed submarine-launched ballistic missiles.

Taiwanese strategic analyst Eli Huang argued in 2017 that China had big plans for regional dominance extending well beyond the Taiwan Strait. Its development of large aircraft carriers and advanced aviation vessels for amphibious operations reinforces a power-projection capability that is increasing. Access to forward bases, whether through direct military conquest, such as the seizure of Taiwan and the militarisation of the South China Sea, or by exploiting its Belt and Road Initiative to gain access to commercial ports that could support Chinese naval vessels, would further extend that reach.

If China were to provoke a crisis over Taiwan, whether this year or in a future year, some would no doubt argue that it’s not Australia’s business and that supporting a US response would increase the risk of devastating Chinese military, political and economic retaliation against us. To accept that argument as policy would mark the end of our strategic alliance with the US, leaving us more exposed to Chinese coercive pressure and political warfare, or even a direct military threat.

As Kim Beazley stated in 2020:

Australia cannot be defended without the alliance with the United States. It’s as simple as that. If you know the math. If you know the capability. And if you know what we can actually spend—and I’d still say that at 2.3% of GDP—to contemplate a situation without them, you can forget it.

The loss of the US alliance would be catastrophic for our security, and a hegemonic China with grand imperial ambitions would force us to confront an ugly strategic choice. Acting alone, we’d need  significant boosts to our defence spending to achieve a degree of self-sufficiency beyond the traditional levels of ‘self-reliance’ that past defence white papers have alluded to. That could include developing military capabilities normally not considered for our defence force to deter a nuclear-armed adversary. We may well see an intensification of the political and economic pressure Beijing applied to Australia for much of 2020.

A military crisis across the Taiwan Strait would be a serious test of our national resolve, the strength of our most vital strategic relationship and our commitment to the values we stand for. The outcome of such a crisis would shape the strategic environment of the Indo-Pacific region for decades.

 

SHIP IP LTD – Remote internal/external Vulnerability &

Penetration Testing

TRUST OUR NETWORK – WE GUARANTEE BEST PRICES!

READ MORE

Maritime Vulnerability and Penetration Testing

 

Source: aspistrategist


Make a difference and join an enthusiastic team looking to make a difference in the lives of today’s military!  CACI is looking for a Senior Cyber Security Information System Security Officer (ISSO) with strong interpersonal and communication skills as well as a record of accomplishment in successful project execution.

 

Serve as a Senior ISSO and Senior Cyber Security Engineer supporting the Navy, USMC and Air Force projects assisting with project certifications and accreditation packages.  Act as the Norfolk cyber liaison for CACI, Government and Military Information Assurance Teams.

 

The project is within CACI’s Healthcare Delivery Systems portfolio.

More About the Role:

  • Full accountability for the execution and delivery of multiple projects as related to testing, and security of network environments and administration
  • Managing client, customer relationships
  • Prepare and deliver customer deliverables and scope execution requirements established by customer
  • Managing risks and issues and taking corrective measurements

You’ll Bring These Qualifications:

  • A minimum of 7+ years of relevant experience
  • Master’s Degree in Computer Science, IT Information Security, Information Systems, Engineering, Physics, Network Security or Engineering preferred
  • Expertise in the areas of vulnerability and risk management
  • Provide management level support to the Theater Medical Information Systems Program-Maritime (TMIP-M).
  • Serve as the Information Systems Security Officer (ISSO) and support the Naval Information Warfare Center (NIWC) Program Management Team in regard to ensuring all TMIP installations are compliant with DOD Cyber requirements.
  • Secure multiple Accreditations (ATO’S) for TMIP applications.
  • Support the development of all deployment based procedures to ensure all TMIP Systems are compliant.
  • Risk Management Framework Expert
  • Create, develop and improve processes and deployment based procedures
  • Advanced knowledge of DoD Cybersecurity policies, procedures and practices including the RMF and NIST SP 800-53.
  • Advanced knowledge of Cybersecurity, Information Technology and Network Architecture.
  • Advanced knowledge in the Information Assurance disciplines of Cybersecurity Testing, Evaluation, Validation and Verification of traditional and non-traditional information systems.
  • Advanced knowledge of administrating traditional and non-traditional network systems, components, and other Information Technology associated with military applications.
  • Advanced knowledge of computers, networks, deployment environments (e.g., data center, cloud, etc.), systems and application security threats and vulnerabilities.
  • Advanced knowledge of and skill in using DoD tools and capabilities for vulnerability assessments and compliance reporting (eMASS, ACAS, STIGs, SRGs, SCAP, XCCDF, etc.)
  • Experienced implementing mitigation strategies and methods to resolve problems, and to lead re-testing and re-evaluation of affected systems.
  • Demonstrate skills and abilities in planning, testing, evaluation of moderately complex operating systems (Windows and Linux), and networking hardware. Scope includes the demonstrated ability to implement the appropriate level of test rigor to verify/validate compliance of moderately complex systems
  • Develop Risk Management Framework (RMF) artifacts, plan security assessment execution events, and report to cross-functional teams, IPT Leadership, Program Office personnel, and external Stakeholders
  • Ability to advise team leaders on DOD/DON Security policy and guidelines for complex systems.
  • Ability to summarize and report vulnerabilities and weaknesses verbally and in writing to the appropriate level of leadership
  • Ability to work independently and meeting strict standards
  • Execute RMF processes including the completion of RMF process steps in eMASS, the development of RMF artifacts and the implementation of Security Controls in coordination with development project teams.
  • Design and development of plans, processes, and procedures for information systems leading to authorization and Approval to Operate (ATO) of complex systems IAW Federal and DOD cybersecurity requirements.
  • Security+ Certification – must be obtainable with 90 days of employment
  • Active Secret clearance is required

 

SHIP IP LTD – Remote internal/external Vulnerability &

Penetration Testing

TRUST OUR NETWORK – WE GUARANTEE BEST PRICES!

READ MORE

Maritime Vulnerability and Penetration Testing

 

Source: clearedjobs


Company DETAILS

SHIP IP LTD
VAT:BG 202572176
Rakovski STR.145
Sofia,
Bulgaria
Phone ( +359) 24929284
E-mail: sales(at)shipip.com

ISO 9001:2015 CERTIFIED