Cyber Operators Course (Op) – Module 9

Good cyber hygiene and training – How far could a hack go?

As an example, you have lost track control so you need to revert to manual control?  Vessels are required to practice manual steering control. It’s one of the very last systems on board that has a genuine manual control, but it is still time consuming to operate manually. Steering instructions are by VHF or telephone from bridge to steering room; this all ties up busy engineering resource that is likely to be required elsewhere on the vessel whilst arriving in port. It is a pain and lends itself to incidents. We have ships engineers on our team who have been there during manual control exercises.

There is also potential to interfere prior to manual control being implemented. Steering control from the bridge can be either automatic (e.g. ECDIS in track control mode), heading – where the rudder maintains a heading, or manual bridge control. Full manual control involves disconnecting the telemotor and moving a lever in the steering room that physically moves valves to control hydraulic rams that operate the rudder. Manual engine control can be challenging, particularly when manoeuvring:

Control is usually direct from the bridge – the engine control levers directly control the engine control systems. These communicate using serial data networks that can be manipulated.

Control can also be managed from the engine control room, through programmable logic controllers (PLCs) and human-machine interfaces (HMIs). Again, these contain serial data communications that can be tampered with.

Cyber Operators Course (Op) – Module 9

Good cyber hygiene and training – How far could a hack go?

Manual control of a ships engine usually involves three sticks: one for the fuel pump, one for start air and one for engine direction. Fuel pump rate does not directly correlate with engine speed – there are many variables that affect this, even air humidity will change how the engine performs for a given lever setting.

Shifting the engine to stop or reverse involves using start air to restart each time. Air tanks usually contain enough air for 10 starts under automatic control, requiring 45 minutes or so to recharge. Under manual control, even a skilled operator will probably only get 5 engine starts. That’s 45 minutes and potentially 5 changes of propeller direction.

Imagine a junior officer trying to deal with failing navigation systems, all bridge sensors offline, steering gear not responding and engine levers inoperative. Manual control is an option but, as an aviation pilot, I know very well how quickly one can become overloaded with information and become incapable of dealing with a situation. Fixation on a single error quickly leads to loss of the wider picture.

Cyber Operators Course (Op) – Module 9

Good cyber hygiene and training – How far could a hack go?

Further, any number of minor incidents or technical dependencies can leave a vessel dead in the water. A colleague remembers a simple overlooked microswitch leading to start air not recharging and the vessel quickly becoming immobile.

Those serial control devices are usually connected to serial networks, hacking of which is not difficult. Similar problems have been known about for years in utilities industrial control systems (ICS). The same serial to IP converters that we’ve compromised in utilities are used on vessels. Compromise any point on the serial network and that ‘manual control’ may not work in the way intended any more.

Better to ensure all crew are prepared as you see it can get much worse….You must speak up if there are crew that don’t believe the ship can be effected.

Cyber Operators Course (Op) – Module 9

Good cyber hygiene and training – Redundancy of systems

Does a dual system create redundancy?  As an example, most vessels will have two ECDIS, or electronic chart systems, for redundancy. Few vessels now carry backup paper charts other than basic ‘get you home’ versions, as they are expensive and hard to keep updated. A colleague remembers collecting chart updates from the ships agent at each port, which he had to cut out and paste on to the chart.

Having two redundant systems sounds like a good idea. However, most of the ECDIS units we’ve tested have been running old operating systems or were missing critical patches and were trivial to compromise. Two easily hacked ECDIS units on board. Great!

Both ECDIS are often updated at the same time, removing the benefit of redundancy. This often has to be done, as otherwise there would be inconsistencies in the charts on each ECDIS.

What systems onboard are dual for redundancy, can we list them, and if they are updated at the same time?

Cyber Operators Course (Op) – Module 9

Good cyber hygiene and training – AI monitoring AI for cyber

To paraphrase Arthur Schopenhauer, experts in their field will often attack those who question their expertise. One doesn’t need to be an expert navigator or ships officer in order to find issues in shipping systems.

Change has been fast on board vessels; digitalisation has come faster than many may have expected.

Talk of autonomous shipping no doubt concerns many mariners – will they be replaced by computers?  It is those experienced seafarers that have the best chance of spotting security issues when at sea.  Will the computer know the other computer has been hacked?

Can you list the IT or OT on board that is monitored for safety by IT…?  Does that create a list for a higher risk assessment or lower?

Cyber Operators Course (Op) – Module 7

Specific Compartment equipment – Bridge Operating Systems

First of all, know your OS.

The ‘OS’ or also known as an Operating System is the software that supports a computer’s basic functions. Without it there would be no User Interface.

Maritime Type Approved Hardware, undoubtedly still uses a ‘standard’ OS such as windows.

Image above: One is Linux, one is Windows.  Many ECDIS systems use XP or VISTA.

Before moving on, you will need to list all the bridge equipment and what OS it uses.  Which OS it uses will affect your cyber solution.  One solution does not fix all.

Cyber Operators Course (Op) – Module 7

Specific Compartment equipment – Bridge Operating Systems

An operating system is the most important piece of software that runs on a computer. It manages the computer’s memory and processes, as well as all of its software and hardware. It also allows you to communicate with the computer without knowing how to speak the computer’s language. Without an operating system, a computer is useless. The main task for an OS is to allow multiple different programs access to the computer’s central processing unit (CPU), memory, and storage. The operating system coordinates all of this to make sure each program gets what it needs.

Operating systems usually come pre-loaded on any computer you buy. This is the same for a ships computer.

Most people use the operating system that comes with their computer, but it’s possible to upgrade or even change operating systems. The three most popular and used operating systems for personal computers are Microsoft Windows, Mac OS X, and Linux. Modern operating systems use a graphical user interface or ‘GUI’. A GUI lets you use your mouse to click icons, buttons and menus. Everything is clearly displayed on the screen using a combination of graphics and text. Remember your phone will also use an Operating System but mobile devices generally aren’t as fully featured as those made for desktop and laptop computers and they aren’t able to run all of the same software. However, you can still do a lot of things with them, like watching movies, browse the Web, manage your calendar, and play games.

Cyber Operators Course (Op) – Module 9

Good cyber hygiene and training – Attitude towards Cyber

So why don’t some ships Officers believe that hacking is possible?

They’ve spent years training and working up the ships hierarchy, gaining significant expertise. They are experts in their field and have dealt with some very difficult situations at sea. They have precise navigation skills, yet only in the last few years have digital controls and navigation systems entered shipping.

It’s not unreasonable for a Captain to assume that, if digital systems started failing, they could fall back to paper charts on the bridge, or manual use of Fixed Firefighting equipment, or `hand pump` on the steering motors.  The problem is hacking doesn’t work like that.

It may not simply `fail` it may be manipulated or give no indication of failure.

Do all your fellow crew understand the reality of this, do you need to report higher if not?

Cyber Operators Course (Op) – Module 9

Good cyber hygiene and training – Knowing you’ve been hacked

A Ponemon data breach report in 2017 showed that it took US organisations an average of 206 days to detect a data breach. That’s a statistic from shore-based organisations, where OT and IT security personnel and expertise is usually readily available.

So how does a ships crew, where perhaps one person on the crew has a small amount of basic IT skill, detect a breach of a vessel?

If you don’t know, you can’t take action. At what point do you decide that the navigation systems are no longer trustworthy? Who makes that decision? The inexperienced third officer? Do they wake the captain?

Who decides to take the vessel out of track control mode? Remember, security isn’t binary – something is a bit odd, but all the digital systems seem to agree with each other. A security incident doesn’t have to involve alarming ransomware taking control of cargo management, it can be much more subtle than that.

Even with years of forensics experience, sometimes investigators struggle to determine the cause of an incident. I remember one case where a human hair in a switch port was causing public IP addresses to be spoofed on the internal network. We didn’t believe it either, until we removed the hair and replaced it several times, at which point the spoofing stopped and started consistently!

So you take action, you assess the incident and decide you need help. You pick up the satphone to HQ. The satphone isn’t working as it uses the same, vulnerable satellite terminal that the hacker exploited. What next?

Cyber Operators Course (Op) – Module 4

Harmful software and procedures to counter – Bots

A bot is a type of malware which allows an attacker to gain complete control over the affected computer. Computers that are infected with a ‘bot’ are generally referred to as ‘zombies’. There are literally tens of thousands of computers on the Internet which are infected with some type of ‘bot’ and don’t even realize it. A botnet is the network of computers that have been infected by particular bot software. The term “botnet” is short for “robot network”.

Essentially once you are infected, the Bot or Zombie looks to affect others.