720
Oneofthemostcommonanddangerousthreats–
ransomware attacks, evolved in the last years. The
current trends show three disturbing trends which
can be observed in a variety of organizations,
includingMaritime.First–VictimShaming‐attackers
use multi‐extorsion technics to ensure organizations
payaransomdemand.
Releasingsamplesofvictimsʹ
data on the darknet, including details on the total
amountofdatatryingtoshamevictimsintopayment.
So far, criminals have encrypted organizationsʹ files,
andnowtheyleverageleaksitesandthreatenfollow‐
on DDoS attacks. The second trend is using
Ransomware‐as‐a‐Service
forransomwarecampaigns
whichquicklylowersthetechnicalskillsrequiredfor
such attacks. And the third aspect is the numerous
and extensive use of Zero‐Days vulnerabilities in
ransomwareattacks[20].
At the 2022 Cyber‐SHIP Lab conference,
researchers from the University of Plymouth
presentedasimulatedattackonPortof
NewYorkand
NewJersey.ItisthelargestportontheUnitedStates
East Coast and the third largest in the US. The
simulatedattackstartedwithsendingafakephishing
emailregardinganurgentelectronicchartupdateand
finishedwiththetargetedvesselʹscompleteblockage
of the
fairway. Malware hidden in the update
managed to take control of the shipʹs engine and
rudder and disabled any control signals from the
shipʹsbridgeatthedesignatedgeographicalposition.
Simulation shows that in case of such attacks, crew
members were utterly helpless, and in one minute
and thirty
seconds, the traffic in one of the most
sensitive points of the fairway was blocked. The
expected losses have been estimated at 180 million
dollars in the first six hours [21]. That was only a
simulated incident; however, the Ever Given
container ship Suez Canal grounding incident [22]
shows the
impact of such an incident on the
worldwideeconomy.
4 CONCLUSIONS
TheongoingconflictinUkraineandthecyberattacks
carried out as part of it show the meaning of cyber
security and cyber resilience in the nowadays
worldwide economy. Numerous cyber incidents in
MaritimeEnvironment[16],[17],[19],[23]–[28]clearly
show
how much has to be done to achieve desired
resiliency level. Activity of the APT nation‐state or
state‐sponsored groups observation is constantly
increasing,andduetothecomplexityoftheMaritime
Environment, threats to the maritime industry
continuetogrow.
REFERENCES
[1]ʺCrowdStrike 2023 Global Threat Report | Executive
Summary,ʺ crowdstrike.com.
https://www.crowdstrike.com/resources/reports/global‐
threat‐report‐executive‐summary‐2023/ (accessed June
14,2023).
[2]ʺM‐Trends 2022: Cyber Security Metrics, Insights and
Guidance From the Frontlines,ʺ Mandiant.
https://www.mandiant.com/resources/blog/m‐trends‐
2022(accessedJune14,2023).
[3]K.Monica,S.James,andS.Max,ʺTheCyber
Operations
during the 2022 Russian invasion of Ukraine: Lessons
Learned (so far),ʺ Jul. 2022. [Online]. Available:
https://eccri.eu/wp‐
content/uploads/2022/07/ECCRI_WorkshopReport_Versi
on‐Online.pdf
[4]ʺ2021 Cyber Trends and Insights in the Marine
Environment (CTIME) Report,ʺ Aug. 2022. Accessed:
June 14, 2023. [Online]. Available:
https://safety4sea.com/uscg‐cyber‐trends‐and‐insights‐
in‐the‐marine‐environment/
[5]B.
Svilicic,K. Junzo, M. Rooks, and Y.Yano,ʺMaritime
Cyber Risk Management: An Experimental Ship
Assessment,ʺJ.Navig.,vol.72,pp.1–13,Feb.2019,doi:
10.1017/S0373463318001157.
[6]M.Maynes,ʺOnesimpleactionyoucantaketoprevent
99.9 percent of attacks on your accounts,ʺ Microsoft
Security Blog, August 20, 2019.
https://www.microsoft.com/en
‐
us/security/blog/2019/08/20/one‐simple‐action‐you‐can‐
take‐to‐prevent‐99‐9‐percent‐of‐account‐attacks/
(accessedJune14,2023).
[7]D. Freeze,ʺMulti‐Factor Authentication Is (Not) 99
Percent Effective,ʺ Cybercrime Magazine, February 23,
2023. https://cybersecurityventures.com/multi‐factor‐
authentication‐is‐not‐99‐percent‐effective/(accessedJune
14,2023).
[8]ʺHackingTwoFactor
Authentication:Four Methods for
Bypassing 2FA and MFA – The CISO Perspective,ʺ
January 13, 2022.
https://cisoperspective.com/index.php/2022/01/13/hackin
g‐two‐factor‐authentication‐four‐methods‐for‐
bypassing‐2fa‐and‐mfa/(accessedJune14,2023).
[9]“CVE‐CVE‐2021‐32648.” https://cve.mitre.org/cgi‐
bin/cvename.cgi?name=CVE‐2021‐32648 (accessed June
14,2023).
[10]Editorial,ʺUkraine banking and defense platforms
knocked out amid heightened tensions with Russia,ʺ
NetBlocks, February 15, 2022.
https://netblocks.org/reports/ukraine‐banking‐and‐
defence‐platforms‐knocked‐out‐russia‐conflict‐
JBQX7mAo(accessedJune14,2023).
[11]https://news.viasat.com/viasat,ʺKA‐SAT Network
cyber attack overview,ʺ viasat.com, March 30, 2022.
https://news.viasat.com/blog/corporate/ka‐sat‐network‐
cyber‐attack‐overview(accessedJune14,2023).
[12]ʺ2022Ukraine
cyberattacks,ʺWikipedia. May 04, 2023.
Accessed: June 14, 2023. [Online]. Available:
https://en.wikipedia.org/w/index.php?title=2022_Ukrain
e_cyberattacks&oldid=1153205698
[13]State of the Hack: One Year after the APT1 Report,
(February 28, 2014). Accessed: June 14, 2023. [Online
Video]. Available:
https://www.youtube.com/watch?v=88o‐uifbJSE
[14]“Internet Crime Complaint Center(I C3) | Annual
Reports.” https://www.ic3.gov/Home/AnnualReports
(accessedJune14,2023).
[15]Coast
GuardCyberCommand,ʺ2022CyberTrendsand
Insights in the Marine Environment (CTIME) Report,ʺ
United States Coast Guard, May 2023. [Online].
Available:
https://www.uscg.mil/Portals/0/Images/cyber/2022CTIM
EReport_Final.pdf?ver=lFYiLZqt4dbVf2RFTgL15g%3d%
3d×tamp=1685643398263
[16]A. Ajdin,ʺHapag‐Lloyd flags spear phishing attack,ʺ
Splash247,March08,2022.https://splash247.com/hapag‐
lloyd‐flags‐spear‐phishing‐attack/ (accessed June 15,
2023).
[17]ʺPhishing
impersonatesshippinggiantMaersktopush
STRRAT malware,ʺ BleepingComputer.
https://www.bleepingcomputer.com/news/security/phis
hing‐impersonates‐shipping‐giant‐maersk‐to‐push‐
strrat‐malware/(accessedJune15,2023).