Page 206 - ΝΑΥΤΙΚΑ ΧΡΟΝΙΚΑ - SEPT 2025
P. 206

Horizon from the bridge


               ing is the deliberate manipulation   messaging services or applications,
               of Automatic Identification System   such as WhatsApp or WeChat, con-
               (AIS) data to deceive AIS tracking   stitute risky behaviour.
               systems about the identity, posi-  4.  Insecure network connections: Con-
               tion and other information of a    necting insecure equipment to criti-
               ship. GNSS spoofing involves the   cal vessel networks creates a risk of
               transmission of fake or tampered   spreading malware or inadvertently
               satellite signals to deceive a Global   providing remote access to critical
               Navigation Satellite System (GNSS)   equipment to threat actors. Ena-
               receiver. Reports from the US Coast   bling the vessel’s computer hotspot
               Guard Navigation Center indicate   and connecting personal devices
               an increase in this activity during   such as computers, mobile phones
               2023 and 2024 in areas of geopo-   or tablets to connect to the inter-
               litical conflict, such as the eastern   net, or connecting personal devices
               Mediterranean, the Black Sea, the   of crew members or guests to the
               Red Sea,  the coastal waters of    vessel’s internet network, either
               China, and the Persian Gulf.       via Ethernet cable or Wi-Fi, without
                                                  proper security procedures should
          Seven “deadly sins” of insecure behaviour  be avoided.
            1. Payments  to unverified parties:   5.  Unauthorised remote access: Pro-
              Payments made to fraudulent par-   viding remote access to unknown
              ties pretending  to be legitimate   or unauthorised parties. Crew mem-
              suppliers, such as making payments   bers should avoid responding  to
              before checking  the accuracy of   unplanned or unauthorised requests
              bank account details or complying   from any third party claiming to be
              with requests to change the benefi-  a vessel or equipment manufacturer
              ciary’s bank account before checking   to provide a remote connection to a
              the validity of the requester. Ideally,   vessel system. Other risky behaviours
              checking and confirming the validity   that should be avoided include pro-
              of the requester should be done ver-  viding remote access to an unknown
              bally over the phone.              IP address or leaving remote connec-
            2.  Insecure use of removable devices:   tions open long after the intended
              Poor control of removable devices   task has been completed.
              such as USB, external hard drives,   6.  Dangerous  software  downloads:
              or mobile phones creates the risk   Downloading unapproved, unwanted,
              of spreading malware. This risk is   or dangerous software  that may
              particularly serious in cases where   contain malware or serious vulnera-
              the removable device is transferred   bilities. Downloading software from
              between information technology (IT)   unknown or untrusted sources must
              and business technology (OT) sys-  be avoided. The most common dan-
              tems. Risky behaviours include con-  gerous software downloads in 2023
              necting the same removable device   and 2024 included PDF editors,
              alternately to personal computers   image editors, and computer games.
              (PCs),  third-party  devices,  com-  Crew members often download PDF
              pany IT equipment or OT systems,   or image editors with the good inten-
              e.g., Electronic Chart Display and   tion of trying to edit a document
              Information System (ECDIS), Global   needed to complete ship or port
              Maritime Distress and Safety System   operations. However, this inadvert-
              (GMDSS), or other operational pan-  ently introduces cyber risk.
              els and human-machine interfaces   7. Supply chain attacks: This occurs
              of OT systems, without scanning the   when a shipping company inadvert-
              removable device for malware.      ently provides access to a threat
            3.  Insecure links: Clicking on insecure   actor through a shipping supplier’s
              links that lead to suspicious or mali-  computer systems. Examples of risky
              cious websites. Clicking on links in   behaviour that should be avoided
              emails from unknown or untrusted   include over-trusting connections to
              sources or clicking on links sent via   third-party systems without validat-

          204                                                                                             NX
   201   202   203   204   205   206   207   208   209   210   211