Cyber Operators Course (Op) – Module 7

Specific Compartment equipment – Hacking Navtex

It’s been modified from the original data to be more human-readable. Source messages look like this:

$CRNRX,007,001,00,TD02,1,135600,27,06,2001,241,3,A,==========================*09

$CRNRX,007,002,00,,,,,,,,,,========^0D^0AISSUED ON SATURDAY 06 JANUARY 2001.*29

$CRNRX,007,003,00,,,,,,,,,,^0D^0AINSHORE WATERS FORECAST TO 12 MILES^0D^0AOFF*0D

$CRNRX,007,004,00,,,,,,,,,,SHORE FROM 1700 UTC TO 0500 UTC.^0D^0A^0D^0ANORT*70

$CRNRX,007,005,00,,,,,,,,,,H FORELAND TO SELSEY BILL.^0D^0A12 HOURS FOREC*16

$CRNRX,007,006,00,,,,,,,,,,AST:^0D^0A^0ASHOWERY WINDS, STRONGEST IN NORTH.^0D*15

$CRNRX,007,007,00,,,,,,,,,,^0A^0A*79

Cyber Operators Course (Op) – Module 7

Specific Compartment equipment – Hacking Navtex

Navtex messages are sent over short wave radio. Technically, it’s based on SITOR-B, probably more familiar to radio hams as AMTOR-B

Again, these messages have no message authentication or verification, so it’s possible for malicious individuals with basic radio expertise to send rogue Navtex messages to cause confusion when shipping.

It may also be possible to cancel a Navtex warning. Unexploded ordnance? What message?

Navtex is also used for distress and urgency messages: there is potential to send out rogue alerts or mask genuine safety messages. What pirates?

Fortunately, generating enough RF power to send Navtex messages over long distance is very involved. However, crews should be alert to message tampering when close to port.

Cyber Operators Course (Op) – Module 7

Specific Compartment equipment – Bridge Operating Systems

From Engine Room Management to RADAR, all your systems will also have an Operating system on it. Without it, the system wouldn’t work correctly. The issue is that there are multiple different operating systems, all able to do different thing, have different features and cost different amounts to buy. This means some have different requirements in terms of hardware and what software they need on them and what security features they hold. Also some software on-board may only support certain Operating systems.

By now you should have a list of all your on-board equipment and their update status.

It is very common for Bridge equipment to use OS considered ‘dated’ by the home user, such as Windows NT, 2000 or XP (Which runs a large proportion of Navigation Software as an example)

Check the terminal vendors software update pages regularly – security fixes are often hidden in the changelog and not easy to find.

Check that the bridge, engine room, crew, Wi-Fi and business networks on board are logically separated

If a device on your vessel is compromised, segregated networks will ensure critical systems are kept safe from the hacker. Do the personal laptops of crew members on the ship network have access to the navigation systems? Have you actually checked to make explicitly sure?

Cyber Operators Course (Op) – Module 7

Specific Compartment equipment – ECDIS security

An ECDIS is usually just a desktop computer. It may have a rugged case, screen and keyboard, but it is fundamentally just a PC.

Just like any computer, it requires updates to be applied, both to the underlying operating system, to its ECDIS software and to the digital charts. If any of those are omitted for any period of time, cyber security vulnerabilities creep in.

ECDIS are increasingly being connected to vessel networks to facilitate online chart updates, integration with other bridge systems and remote maintenance. Security flaws that did not matter so much in the past through a lack of connectivity are now becoming very important.

Even having dual redundant ECDIS on the bridge is no guarantee of availability: during research we discovered similar security flaws on multiple ECDIS brands. A hacker would have little difficulty in compromising both.

Cyber Operators Course (Op) – Module 7

Specific Compartment equipment – ECDIS USB security

The ECDIS system case must be kept in a robust locked cabinet to which only senior personnel have access. It should not be possible for other personnel to access the system case or any of the USB and network ports on it.

A source of several ECDIS security incidents has been from crew charging smartphones from the USB ports. Phones that have not been kept up to date may already be infected with malware.

Many ECDIS have USB ports present on their keyboards, as shown in the example below. Operators frequently report that, despite multiple ‘safe’ USB charging points being made available on the bridge, crew still charge phones from the ECDIS.

With this in mind, seriously consider installing USB port blockers such as the below. Whilst they are not difficult to remove, they do provide a visual deterrent to casual charging.

Cyber Operators Course (Op) – Module 7

Specific Compartment equipment – System updates and hardening

It is imperative that the ECDIS computer is subject to regular updates to its operating system. During vessel security audits, we have discovered ECDIS still running Windows NT, an operating system so old that Microsoft stopped supporting it in 2004! That means that any new security flaws in the software will NEVER be fixed.

Windows XP and Windows 7 are also commonly found on bridge systems. Even as recently as April 2018, Microsoft released 22 vulnerabilities rated ‘critical’. These updates must be applied, as hackers will quickly ‘reverse engineer’ the updates and work out how to exploit the security flaw.

Not all ECDIS are based on Microsoft operating systems. A smaller subset of vendors use Linux based operating systems, which require updating in just the same way.

Whilst downloading updates at sea over satellite can be expensive, the operator should determine how critical a new patch is to their systems. Truly urgent patches, such as the ‘Heartbleed’ flaw from 2014 would merit the expense of patching whilst at sea, though most could likely wait until the next port of call and updating over shore Wi-Fi.

All computers should be subject to ‘hardening’ during installation. This describes the process whereby it is configured to be as secure as possible; it should deliver minimum functionality in order to deliver its role as an ECDIS. For example, one would not expect Microsoft games to be present on an ECDIS, nor would one expect administrator passwords to be blank or simple

The Center for Internet Security publishes free CIS Benchmarks which offer good practice guides and checklists for hardening systems. Their web site is at www.cisecurity.org

Cyber Operators Course (Op) – Module 7

Specific Compartment equipment – Network segregation and bridging

The ECDIS is an ideal candidate for the hacker to ‘bridge’ between the IT and OT networks on the vessel. An ECDIS consumes multiple data feeds, for example:

GPS

ARPA

Log

AIS

Gyro

Chart updates

This image shows the inside of an ECDIS computer case. The smaller wires are serial data feeds from several OT sources. The whole computer is also connected to the vessel IP network, meaning a skilled hacker could use an ECDIS as the route between the IT and OT networks.

OT and IT networks are often joined on board, often for reasons of convenience such as being able to review engine parameters and efficiency from a computer on the vessel business network.

Discuss the following with the operator and on board engineering team:

Where on board are the OT and IT networks joined?

The VDR is another common source of network convergence: the data recorder needs to monitor both sets of networks in order to gather useful telemetry for accident analysis

Cyber Operators Course (Op) – Module 7

Specific Compartment equipment – GPS security

The risks of GPS tampering and spoofing are well known. Numerous reports have been made regarding vessels receiving incorrect position data from their GPS receivers, often in the vicinity of military bases.

GPS is a relatively weak radio signal, so jamming of the signal over an area is not difficult. It is well within the capability of an individual with some basic radio knowledge.

Spoofing of GPS signals is somewhat more complex, requiring expensive equipment, hence why it is experienced primarily around sensitive military environments, perhaps to make missile attacks harder to guide. However, equipment is also within reach of cyber criminals.

Gross GPS position errors should be easy for a crew to detect. Overlaying radar and other cross checks will reveal issues. A crew should quickly detect that they are suddenly 20nm out of position.

Various studies have been carried out by maritime authorities in to the practicality and detection of GPS attacks, showing that they are a very real threat. Some digital bridge systems have the capability to detect these attacks and alert the crew.

Cyber Operators Course (Op) – Module 7

Specific Compartment equipment – Subtle attacks to GPS – How to spot

Subtle attacks to GPS – How to spot

Crews should be alert to the potential for more subtle attacks. A gradually increasing error in position may be far more difficult to detect. This style of attack could be used to draw a vessel in to a position of danger.

GPS data is transmitted from the above deck receiver to the various devices on the OT network that consume it. The data is unencrypted and has the potential to be tampered with.

A GPS sentence might look like this:

$GPGLL,3751.65,S,14507.36,E*77

Or

$GPGLL,4916.45,N,12311.12,W,225444,A

A hack might involve changing the GPS data on the ships network itself, rather than a broader and obvious spoofing of the GPS radio signal. This is far more subtle and much more difficult to detect.

Advanced interrogation:  Can we view the NMEA message if unsure of potential corruption through your system?

Cyber Operators Course (Op) – Module 7

Specific Compartment equipment – Procedural audit advice

Discuss what processes are in place to detect and respond to a GPS incident.

Have any of the crew ever experienced an incident involving GPS?

How often does the OOW cross check position and how do they verify position with non-digital systems?

Are position errors verified only by overlaying radar data on the ECDIS?

How often do the crew practice navigation without digital aids?

What protections are in place on the OT network to prevent tampering with GPS data?