Cyber Management Course (Ma) – Module 6

Checklists of venerable equipment – Introduction

The following are common cyber vulnerabilities, which may be found onboard both existing ships, and on newbuild ships:

obsolete and unsupported operating systems

outdated or missing antivirus software and protection from malware

inadequate security configurations and best practices, including ineffective network management and the use of default administrator accounts and passwords,

shipboard computer networks, which lack boundary protection measures and segmentation on networks

safety critical equipment or systems always connected with the shore side

inadequate access controls for third parties including contractors and service providers.

Cyber Management Course (Ma) – Module 5

Monitoring Ships Data and activity – Attacking NMEA0183

ECDIS display showed her to be on track i.e. the symbol of the ship was following the orange line and yet She was 17 miles off her planned track.

What went wrong?

No one correlated where the ship was relative to what they could see out the window.

The buoys were going down the wrong side there was land on the ships head.

Buoys, Radar, Ships, Echo sounder, or even the Loran C which was merely thought to have a poor fix – Questions were not asked….

This was because there was an over reliance on GPS.

This was because they didn’t prove ECDIS correct.

Their GPS system reverted to DR mode because of an antenna malfunction.  The NACOS 25 was set up in autopilot and simply followed the navtrack.

There were alarms on the GPS but they were not loud enough and the IBS did not have a separate DR alarm.

Cyber Management Course (Ma) – Module 5

Monitoring Ships Data and activity – Attacking NMEA0183

Back to our NMEA attack example…

If the ECDIS is in track control mode whereby it directs the autopilot, the hacker can fool it through GPS data tampering and cause the ship to change direction.

Ships masters may counter that they would cross reference the ECDIS position with ARPA in the event of position uncertainty, though it is perfectly possible to insert identical position errors in to synthetic radar, removing the ability to verify by cross checking.

If the crew are alert, then they should pick it up and take control, but they are being presented with exactly the same tampered position data as the automated systems, so crew would need to be very alert indeed.

Cyber Management Course (Ma) – Module 5

Monitoring Ships Data and activity – Attacking NMEA0183

We can pause in the example for a minute to reflect on the MV Majesty grounding in 1995.

When she ground she was 17 miles off track, but the display showed her on track.  In reality in went into DR mode and `drifted` as it was not an `EP`.  However the principle we are discussing here is that you could manipulate the NMEA to do the same.

Cyber Management Course (Ma) – Module 5

Monitoring Ships Data and activity – Convertor Security

Security of the convertors is very important.

The convertor must be ‘hardened’ against security attacks. This means ensuring that the administration passwords are not left default by the installer. Default passwords are very common.

Can we identify and convertors used for critical or safety equipment?

Cyber Management Course (Ma) – Module 5

Monitoring Ships Data and activity – Default convertor passwords

Serial to IP convertors usually have a web interface for configuration. The default credentials are usually admin/superuser, superusr/ or admin/ in the case of Perle and usually admin/moxa, admin/admin or admin/ in the case of Moxa convertors. These are published by the manufacturers on their own web sites

Once the hacker has the password, they can administrate the convertor. That means complete compromise and control of the serial data it is sending to the ships engine, steering gear, ballast pumps or whatever.

Cyber Management Course (Ma) – Module 5

Monitoring Ships Data and activity – Exploitable convertors

There’s an interesting security flaw in some convertor firmware. An exploit is available in the Metasploit security exploit framework that is popular with hackers. One example vulnerability is referenced as CVE-2016-9361 and allows the hacker to recover the admin password, even if it has been changed from the default. This vulnerability has been fixed, but the software needs to be updated to apply the patch.

Cyber Management Course (Ma) – Module 5

Monitoring Ships Data and activity – Encrypting convertor communications

Many newer serial to IP convertors support SSH or similar traffic encryption, making man in the middle and similar hacking attacks much more difficult. Convertors should have encryption enabled. If they do not support encryption, check for software updates that do, or replace the convertors with more up to date models that support encryption.

Cyber Management Course (Ma) – Module 5

Monitoring Ships Data and activity – Monitoring NMEA0183

Almost all OT networks on board communicate using a protocol known as NMEA0183. This protocol offers no encryption or message authentication. The only validation that the message is correct is a 2-byte XOR checksum that is simply present to ensure the message was electrically correctly received.

A NMEA 0183 message might look like this:

Where the 5-letter code beginning ‘$’ dictates what type of message it is, with the variables after passing useful information.

The example above was taken from a remote data storage module for a voyage data recorder. It shows GPS heading and location data plus AIS information.

Cyber Management Course (Ma) – Module 5

Monitoring Ships Data and activity – Monitoring NMEA0183

Systems that use NMEA0183 include:

Steering

Propulsion

Dynamic positioning

Ballasting

GPS

AIS

Navtex

BNWAS

And many others

Clearly the security of the serial network and the NMEA 0183 messages is critical to the safety of the vessel.