MARITIME SECURITY: CYBER CRIME
PORTS ON CYBER CRIME ALERT Port authorities and staff are increasingly in the sight of cyber criminals aiming to find vulnerabilities. Dave MacIntyre investigates
8 Cyber-crime is here – a typical image that can appear on IT systems
Cyber criminals have already struck. When Maersk Line found itself infected with the NotPetya ransomware virus in 2017, it took ten days to rebuild its network of 4000 servers and 45,000 PCs. The outage cost about US$300 million. Just this February, Australian 3PL Toll Group’s IT platform was temporarily crippled by a ransomware attack. Other instances include attempts to steal cargo from the terminal or disrupt terminal systems unless a ransom is paid, or to commandeer ships in port waters, to block approaches or berths, for political purposes. Ports are showing increased awareness as a result. The Port of Melbourne has helped establish a Port Cyber Security Forum, with experts advising port users on pro-active cooperation to address cyber security risks. Governments too are recognising the threat to ports. The UK government has published an updated version of its “Ports and port systems: cyber security code of practice” document, which aims to provide guidance for companies with responsibility for protecting technical systems at port facilities and vessels docked in ports. It offers advice on developing a cyber security assessment and how to plan for protecting important assets, processes and potential vulnerabilities. NEED FOR SAFEGUARDS The need to educate staff on how to recognise risks has led Singapore-based Stapleton International to develop a specialist course that has been endorsed by the Maritime and Port Authority of Singapore and recognised by Inmarsat along
36 | APRIL 2020
with the Institute of Maritime Engineering, Science and Technology and the University of Sunderland in the UK. Stapleton chief executive Dr. Mick Thurlbeck says data transfer is at unprecedented levels and the multiplicity of systems in use in ports and on board vessels could prove to be a huge opportunity for cyber-crime. He says that 95% of cyber breaches are a result of personal error by staff and this can happen at any level within the port organisation or on the ships in port. “There has been a marked shift of attacks from corporate systems to target individuals. Almost every company has the latest security software and firewalls in place so many presume that the IT department will keep everything safe and intact. But human error is the weakest link. “C-level staff are no exception, just as management are also generally prone to attack. The methods used by cyber criminals – phishing, social engineering, ransomware etc –are not targeted at any particular level. All they look for is someone to make the mistake and the consequences can be alarming. Once the hackers have breached, you are then under their control.” LEGAL IMPLICATIONS The legal implications for a port authority whose cyber defences have been breached will depend 8 Dr. Mick Thurlock says human error is still the weakest link
For the latest news and analysis go to www.portstrategy.com/news101