Maritime Cybersecurity
– Maritime Cybersecurity – Maritime Cybersecurity Our affiliate, Athena Dynamics Pte Ltd (ADPL) in Singapore, has organized a global specialized IT team (GHA/gha: Good Hackers Alliance) that can comprehensively implement cybersecurity measures for onboard network systems, from Identification → Defense → Detection → Response → Recovery, using remote access via satellite communication. ■Specific Cyberattack Methods • Ransomware hijacking of ship management systems • GPS spoofing to falsify location information (a type of cyberattack that misleads GPS location information by transmitting false GPS signals, disrupting ship routes or causing collisions) • Theft of crew members’ personal information through phishing scams, etc. Based on reported cases to date, the following onboard systems are the main targets of cyberattacks. ➣ IT (Information Technology) systems such as PCs for office work on ships ➣ OT (Operation Technology) systems such as navigation equipment, engine control devices, and cargo monitoring devices We can remotely access and conduct Asset Discovery (asset survey) of vessels operated by ship management companies, in accordance with the IMO-mandated cybersecurity standard UR E26. Furthermore, if you install cloud-based software (XDR agent) on the ship’s network from land, our Security Operation Center (SOC) can provide full support, from implementation to operation, maintenance, and 24/7/365 continuous monitoring. There are two mandatory IACS requirements applicable to vessels whose construction contracts are signed on or after July 1, 2024 (for newly built vessels): UR E26 “Cyber Resilience of Ships” UR E27 “Cyber Resilience of Onboard Systems and Equipment” – For newly built ships – – For Existing Vessels – The mandatory requirements of IACS UR E26/27 mentioned above do not apply to existing vessels. However, since cyber risks are the same, cybersecurity measures for the onboard network are necessary. As a countermeasure, we propose a straightforward modification of the onboard network using the following procedure (3…