Cyber Operators Course (Op) – Module 3

Different Risks and terminology – Script kiddie

Referred to as ‘skiddies’ in the industry, this is typically a teenager with some technical skill, probably sat in a bedroom at their parents home.

They often have an inflated view of their own ability, usually relying on tools that others have written. The most significant issue for the victim is that script kiddies pay little attention to or have little understanding of the law and may even be too young for law enforcement to prosecute their crimes.

Script kiddies will literally play with systems on the internet. An interesting web interface that’s accessible with no authentication will be very attractive to them. Interesting buttons to click on the interface, interesting system diagrams. That button might switch off your dynamic positioning system, but they don’t care; they’re inquisitive. Sounds far-fetched? It’s actually happened.

The best defence against a script kiddie is to ensure that you have dealt with the basics of your security. If you demonstrate even reasonable security defences, they will simply move on to the next organisation that has worse security than yours.

Cyber Operators Course (Op) – Module 3

Different Risks and terminology – Terrorist

A terrorist may have multiple motivations; perhaps to smuggle or steal arms & narcotics. They may also attempt to extort money by holding vessels or cargo to ransom. It may not involve physical attacks, but a loss of control of your vessel could easily be caused by a hacking incident.

Extreme caution should be exercised if a ransom threat is made regarding a cyber attack against your vessel or related systems. In this scenario, you would be well advised to bring in a specialist that can advise whether the threat is casual or serious. Also, specialists can determine if there is an actual compromise the vessel would have to make that could be exploited for the purpose of ransom.

The vast majority of ransom threats are idle, often little more than a random scam attempt. However, genuine ransom attacks have occurred in shipping.

Cyber Operators Course (Op) – Module 3

Different Risks and terminology – Criminal

Internet crime pays dividends. You would do well to forget the term ‘cyber’ at this point and think about what valuable data and commodities you transport.

Cyber crime is well funded and generates significant returns.

Consider delaying a vessel containing a commodity such as oil or LNG. Delaying the vessel through a cyber attack could move a spot price on the market, particularly at a time of high demand.

Crippling of a port could also create significant issues for shipping. Issues of this nature have already occurred to Maersk and COSCO. Theft of cargo can also be facilitated through hacks.

There is no one solution to defending against the cyber criminal. Following internationally recognised guidance from IMO, BIMCO and ISO27001 will better prepare a business.

One would also be well advised to carry out a role playing session with senior executives, simulating a cyber incident. From this, an incident response ‘playbook’ can be created that will significantly help in the management of an unfolding breach. Again, specialists can assist with this.

Cyber Operators Course (Op) – Module 3

Different Risks and terminology – What is Hacking?

People hack to gain access to what’s important to others. It can then be sold for money and cause major issues. Did you know that;

97% of all business documents are now created electronically

78% are stored electronically

From the bellow list, take 5 minutes to think about what if stored electronically, and what is stored on paper?

Stability calculations

Cargo Handling

Passage Plan

Emergency Procedures

External contacts

Internal personal data



OT or IT or both?  Connected externally or internal only?

Cyber Operators Course (Op) – Module 6

Communication equipment and security – Crew knowledge of Admin Passwords

Ask if anyone on the crew knows the admin password. If not, who does know it?

Is it written down anywhere? It is often written on a note physically stuck to the terminal! Here are some examples of passwords stuck to computer systems found on vessels:

Review the password if it is supplied to you. Is it at least 10 characters long, does it have uppercase, lowercase, numbers and non-alphanumeric (e.g. !”£$%^ etc) content. However, “Password1!” would not be acceptable.

Is the password ever changed? If so, how often? Once per year would be reasonable, or when key personnel leave.

How is the terminal administrated? Does anyone on the crew know how to fix bugs with it, if it failed at sea?

Cyber Operators Course (Op) – Module 3

Different Risks and terminology – Types of hackers

Black Hats
Individuals with great computer knowledge and expertise but with intentions to cause major damage to the systems they attack.

White Hats
Individuals with good hacking skills but use this to perform defensive activities against hackers. White hats may also be known as security analysts.

Grey Hats
Individuals that perform both offensive and defensive hacking activities.

Suicide Hats
Users who wish to cause damage to a computer system for personal reasons and is not worried about the serious consequences that they may have to face as a result of their damaging activities.

Some of the different Types of Hacks that can be used in the Maritime Industry, include:

DDoS Attacks

Password guessing attacks

Man-in-the-Middle attacks

Identity Spoofing

Interception

Eavesdropping

Backdoor Attacks

Many More…

Cyber Operators Course (Op) – Module 6

Communication equipment and security – Cellular data connections

When closer to shore, mobile data connectivity is often much cheaper and faster than satellite connections. Many vessels have facilities that will automatically switch to the cheapest form of data connection. Mobile data connections on crew mobile phones will also spring in to life as they approach shore.

Cyber Operators Course (Op) – Module 3

Different Risks and terminology – The Deep/Dark Web

The deep Web, sometimes called the invisible Web, is a large part of the Internet that is inaccessible to conventional search engines. Deep Web content includes email messages, chat messages, private content on social media sites, electronic bank statements, electronic health records (EHRs) and other content that is accessible over the internet but is not crawled and indexed by search engines like Google, Yahoo, Bing or DuckDuckGo.

The reasons for not indexing Deep Web content are varied. One reason may be that the content is proprietary, in which case the content can only be accessed by approved visitors coming in through a Virtual Private Network (VPN).



*Above Image source:  www.thedarkweblinks.com

Cyber Operators Course (Op) – Module 6

Communication equipment and security – Cellular data connections

Whilst the detail of cellular network security is beyond the scope of this, there are some basic principles that will be of use to the seafarer and vessel operator:

2G networks are easily spoofed – a hacker can trivially set up a fake cellular base station with <$100 of equipment.

3G networks require ~$5,000 of equipment to successfully spoof.

4G networks can be spoofed, but expensive equipment is currently required



Image from: www.insinuator.net

Cyber Operators Course (Op) – Module 3

Different Risks and terminology – The Deep/Dark Web

It is not known how large the Deep Web is, but many experts estimate that search engines crawl and index less than 1% of all Web content that can be accessed over the internet. That part of the Internet which is crawled and indexed by search engines is sometimes referred to as the surface Web which is what we are used to surfing.

Many of the hacks we have used in this course, and to test ship’s equipment, are readily available to download form the deep web.



*Source: You tube video  www.youtube.com/watch?v=kigKU6eEpOQ