SlideShare una empresa de Scribd logo
1 de 44
A.P.T.
   Cyberattacks
on a marine context

            Gutiérrez A.
            Corredera L.E.
Goal of the talk

Identification of potential security flaws on a
marine context using the most recent  asset-
oriented hacking techniques.

Potential scenarios pirates could pursue targeting a vessel:

1- Compromised communications.
2- Malfunctioning/Sabotage of PLC systems
3- GPS precise fleet position discovering 
Key concept

A.P.T. (Advanced Persistant Threat):              Refers to a group with
both the capability and the intent to persistently and effectively target a
specific entity.



Advanced: Intelligence-gathering techniques

Persistent: Not opportunistic

Threat: Capability and Intent
Are sea pirates an A.P.T.?


Persistent: Hijacking from early 90s.
Threat: 53 ships on 2010




But...could they become
Advanced?
Are sea pirates an A.P.T.?


Persistent: Hijacking from early 90s.
Threat: 53 ships on 2010




But...could they become
Advanced?
Are sea pirates an A.P.T.?


Persistent: Hijacking from early 90s.
Threat: 53 ships on 2010




But...could they become
Advanced?
Cyberattacks makes them Advanced



Intelligence-gathering: Information Systems Intrusion


Communications interception: Fake base station techniques


Satellite Imaging: Google Maps, Bing...
Classic Cyberattacks: IP oriented

    Every device connected to the Internet has an IP address


Basic steps of a “classical” Hacker (Not Persistent)

  IP ranges scan for listening services

  Target Characterization

  Investigate vulnerabilities and exploits
New Cyberattacks: Asset oriented


                Asset oriented search engine.


Basic steps of a “Persistent” Hacker (Addressed to a certain target)

   Search for a concrete target in Shodan: e.g. Router Model

   Find exploit in Shodan


                  So much faster and straightforward technique!
DEMO: Quick hacking session




Search for USAL assets: hostname:usal.es

Find vulnerable ones. (But be nice to them :)

                  http://www.shodanhq.com
How all this apply to a marine context?
How all this apply to a marine context?
How all this apply to a marine context?




    http://www.zynetix.com/index.php?/solutions/maritime-gsm/
How all this apply to a marine context?




    http://www.zynetix.com/index.php?/solutions/maritime-gsm/
How all this apply to a marine context?




    http://www.zynetix.com/index.php?/solutions/maritime-gsm/
How all this apply to a marine context?




    http://www.zynetix.com/index.php?/solutions/maritime-gsm/
Potential security flaws
Potential security flaws




Communications                         Intelligence
                    Sabotage
  Interception                          gathering
Communications interception




  By Tsaitgaist [see http://commons.wikimedia.org/wiki/File
%3AGsm_structures.svg for license], via Wikimedia Commons
Communications interception




  By Tsaitgaist [see http://commons.wikimedia.org/wiki/File
%3AGsm_structures.svg for license], via Wikimedia Commons
Communications interception




  By Tsaitgaist [see http://commons.wikimedia.org/wiki/File
%3AGsm_structures.svg for license], via Wikimedia Commons
Communications interception




     A5/x           No real time.          Look up tables
                    Needs saved             CUDA/GPUs              Very costly
Cryptoanalysis      transmission.
  Fake base                             Micro BTS
                  Close to the target   Freq.inhibitor for 3G   Less than 10k€
   station                              openBSC, openBTS
  Cellphone       Close to the target   Motorola C123,155
  baseband        No GPRS by now
                                        OsMoComBB         Less than 13$!!!
 modification       Experimental
Potential security flaws
Potential security flaws




Communications                         Intelligence
                    Sabotage
  Interception                          gathering
Sabotage
Sabotage
Sabotage




SCADA
Sabotage




          PLCs




SCADA
Sabotage




          PLCs




SCADA

                   Water Treatment
Sabotage




    Stuxnet      Very sophisticated.       4 Zero-days
                 Deeply targeted at       vulnerabilities.    Extremely
 (Infects PLCs         PLCs.              2 stolen digital    expensive
from FieldPGs)       Spionage              certificates.
                                       Needs a infection
 ScadaTrojans                          pathway to install a
                 Inspired by Stuxnet
 (Infects PLCs      but “Low cost”
                                       client side modified   Cheaper
from SCADAs)                           file.
                                       3 Zero-days.
Potential security flaws
Potential security flaws




Communications                         Intelligence
                    Sabotage
  Interception                          gathering
Intelligence gathering




 http://newdata.es/sistemas-de-navegacion-maritima/
Intelligence gathering



Electronic
Chart
Display and
Information
System




               http://newdata.es/sistemas-de-navegacion-maritima/
Intelligence gathering
Intelligence gathering




A Vessel is usually part of the Internet..
Intelligence gathering




A Vessel is usually part of the Internet..

     And can be hacked as regular servers!
Intelligence gathering




A Vessel is usually part of the Internet..

     And can be hacked as regular servers!
Intelligence gathering




A Vessel is usually part of the Internet..

     And can be hacked as regular servers!
Intelligence gathering




                                  Internet connection.
                  Depends on
Asset oriented                         Computer.
                 manufacturer’s
                                    Classic hacking    Extremely cheap
   hacking         security
                                         tools.
DEMO: Quick assets oriented search session



   Membrane Biological Reactor, Merchant Vessels, Worldwide
   Control system solution comprises: Siemens S7-300 PLC with MP
   HMI and S7-200 PLC based control systems and networking for the
   water treatment systems.




    Search for Maritime related assets:

Zynetix MaritimeGSM, S7-300, advantech


                           http://www.shodanhq.com
Conclusions

  Pirates should be considered an APT.
  They could virtually use Cyberattacks to hijack vessels
more easily.
  Complex Cyberattacks are more and more affordable.
  A ship may become practically speaking an Internet
node with all its risks (should be managed).
  Let’s be in the look out!
THANK YOU!


   {alberto,luisenrique}@flagsolutions.net
     Twitter: @albertoflag , @lencorredera
THANK YOU!


   {alberto,luisenrique}@flagsolutions.net
     Twitter: @albertoflag , @lencorredera

Más contenido relacionado

Destacado

Infant and toddler year part one
Infant and toddler year part oneInfant and toddler year part one
Infant and toddler year part onekajani1991
 
Presentazione Laura Pausini
Presentazione Laura PausiniPresentazione Laura Pausini
Presentazione Laura Pausinimarty92
 
Politieraad 25 maart 2013 zvr iv nip
Politieraad 25 maart 2013 zvr iv nipPolitieraad 25 maart 2013 zvr iv nip
Politieraad 25 maart 2013 zvr iv nipCarl Vyncke
 
Jessie's powerpoint
Jessie's powerpointJessie's powerpoint
Jessie's powerpointkajani1991
 
The reflection paper
The reflection paperThe reflection paper
The reflection paperkajani1991
 
Windows Phone ASO - App Store Optimization
Windows Phone ASO - App Store OptimizationWindows Phone ASO - App Store Optimization
Windows Phone ASO - App Store OptimizationMika Levo
 

Destacado (12)

Infant and toddler year part one
Infant and toddler year part oneInfant and toddler year part one
Infant and toddler year part one
 
Madd 2007
Madd 2007Madd 2007
Madd 2007
 
Presentazione Laura Pausini
Presentazione Laura PausiniPresentazione Laura Pausini
Presentazione Laura Pausini
 
Politieraad 25 maart 2013 zvr iv nip
Politieraad 25 maart 2013 zvr iv nipPolitieraad 25 maart 2013 zvr iv nip
Politieraad 25 maart 2013 zvr iv nip
 
Individual gc
Individual gcIndividual gc
Individual gc
 
Jessie's powerpoint
Jessie's powerpointJessie's powerpoint
Jessie's powerpoint
 
Assiment moral 2014
Assiment moral 2014Assiment moral 2014
Assiment moral 2014
 
Engagements cep
Engagements cepEngagements cep
Engagements cep
 
The reflection paper
The reflection paperThe reflection paper
The reflection paper
 
Windows Phone ASO - App Store Optimization
Windows Phone ASO - App Store OptimizationWindows Phone ASO - App Store Optimization
Windows Phone ASO - App Store Optimization
 
Pluralism powerponit
Pluralism powerponitPluralism powerponit
Pluralism powerponit
 
Musica
MusicaMusica
Musica
 

Similar a Cyberattacks on a marine context (NATO Congress 2011)

Future-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threatsFuture-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threatsSteven SIM Kok Leong
 
Csi Netsec 2006 Poor Mans Guide Merdinger
Csi Netsec 2006 Poor Mans Guide MerdingerCsi Netsec 2006 Poor Mans Guide Merdinger
Csi Netsec 2006 Poor Mans Guide Merdingershawn_merdinger
 
Hardware Trojans By - Anupam Tiwari
Hardware Trojans By - Anupam TiwariHardware Trojans By - Anupam Tiwari
Hardware Trojans By - Anupam TiwariOWASP Delhi
 
CSI - Poor Mans Guide To Espionage Gear
CSI - Poor Mans Guide To Espionage GearCSI - Poor Mans Guide To Espionage Gear
CSI - Poor Mans Guide To Espionage Gearshawn_merdinger
 
Rootkit&honeypot aalonso-dcu-dec09
Rootkit&honeypot aalonso-dcu-dec09Rootkit&honeypot aalonso-dcu-dec09
Rootkit&honeypot aalonso-dcu-dec09Angelill0
 
IoT exploitation: from memory corruption to code execution by Marco Romano
IoT exploitation: from memory corruption to code execution by Marco RomanoIoT exploitation: from memory corruption to code execution by Marco Romano
IoT exploitation: from memory corruption to code execution by Marco RomanoCodemotion
 
IoT exploitation: from memory corruption to code execution - Marco Romano - C...
IoT exploitation: from memory corruption to code execution - Marco Romano - C...IoT exploitation: from memory corruption to code execution - Marco Romano - C...
IoT exploitation: from memory corruption to code execution - Marco Romano - C...Codemotion
 
Greater China Cyber Threat Landscape - ISC 2016
Greater China Cyber Threat Landscape - ISC 2016Greater China Cyber Threat Landscape - ISC 2016
Greater China Cyber Threat Landscape - ISC 2016Sergey Gordeychik
 
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And CountermeasuresSkyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And CountermeasuresAirTight Networks
 
Risk Factory: Let's Get Physical
Risk Factory: Let's Get PhysicalRisk Factory: Let's Get Physical
Risk Factory: Let's Get PhysicalRisk Crew
 
Anton Chuvakin on Honeypots
Anton Chuvakin on HoneypotsAnton Chuvakin on Honeypots
Anton Chuvakin on HoneypotsAnton Chuvakin
 
A Stuxnet for Mainframes
A Stuxnet for MainframesA Stuxnet for Mainframes
A Stuxnet for MainframesCheryl Biswas
 
DIY Internet: Snappy, Secure Networking with MinimaLT (JSConf EU 2013)
DIY Internet: Snappy, Secure Networking with MinimaLT (JSConf EU 2013)DIY Internet: Snappy, Secure Networking with MinimaLT (JSConf EU 2013)
DIY Internet: Snappy, Secure Networking with MinimaLT (JSConf EU 2013)Igalia
 
Order vs. Mad Science: Analyzing Black Hat Swarm Intelligence
Order vs. Mad Science: Analyzing Black Hat Swarm IntelligenceOrder vs. Mad Science: Analyzing Black Hat Swarm Intelligence
Order vs. Mad Science: Analyzing Black Hat Swarm IntelligencePriyanka Aash
 
The next generation ethernet gangster (part 2)
The next generation ethernet gangster (part 2)The next generation ethernet gangster (part 2)
The next generation ethernet gangster (part 2)Jeff Green
 

Similar a Cyberattacks on a marine context (NATO Congress 2011) (20)

Future-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threatsFuture-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threats
 
Csi Netsec 2006 Poor Mans Guide Merdinger
Csi Netsec 2006 Poor Mans Guide MerdingerCsi Netsec 2006 Poor Mans Guide Merdinger
Csi Netsec 2006 Poor Mans Guide Merdinger
 
Hardware Trojans By - Anupam Tiwari
Hardware Trojans By - Anupam TiwariHardware Trojans By - Anupam Tiwari
Hardware Trojans By - Anupam Tiwari
 
CSI - Poor Mans Guide To Espionage Gear
CSI - Poor Mans Guide To Espionage GearCSI - Poor Mans Guide To Espionage Gear
CSI - Poor Mans Guide To Espionage Gear
 
Cyber-Attack.pptx
Cyber-Attack.pptxCyber-Attack.pptx
Cyber-Attack.pptx
 
Rootkit&honeypot aalonso-dcu-dec09
Rootkit&honeypot aalonso-dcu-dec09Rootkit&honeypot aalonso-dcu-dec09
Rootkit&honeypot aalonso-dcu-dec09
 
IoT exploitation: from memory corruption to code execution by Marco Romano
IoT exploitation: from memory corruption to code execution by Marco RomanoIoT exploitation: from memory corruption to code execution by Marco Romano
IoT exploitation: from memory corruption to code execution by Marco Romano
 
IoT exploitation: from memory corruption to code execution - Marco Romano - C...
IoT exploitation: from memory corruption to code execution - Marco Romano - C...IoT exploitation: from memory corruption to code execution - Marco Romano - C...
IoT exploitation: from memory corruption to code execution - Marco Romano - C...
 
Greater China Cyber Threat Landscape - ISC 2016
Greater China Cyber Threat Landscape - ISC 2016Greater China Cyber Threat Landscape - ISC 2016
Greater China Cyber Threat Landscape - ISC 2016
 
Day4
Day4Day4
Day4
 
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And CountermeasuresSkyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
 
15
1515
15
 
Hacking
HackingHacking
Hacking
 
Risk Factory: Let's Get Physical
Risk Factory: Let's Get PhysicalRisk Factory: Let's Get Physical
Risk Factory: Let's Get Physical
 
Honeypot Project
Honeypot ProjectHoneypot Project
Honeypot Project
 
Anton Chuvakin on Honeypots
Anton Chuvakin on HoneypotsAnton Chuvakin on Honeypots
Anton Chuvakin on Honeypots
 
A Stuxnet for Mainframes
A Stuxnet for MainframesA Stuxnet for Mainframes
A Stuxnet for Mainframes
 
DIY Internet: Snappy, Secure Networking with MinimaLT (JSConf EU 2013)
DIY Internet: Snappy, Secure Networking with MinimaLT (JSConf EU 2013)DIY Internet: Snappy, Secure Networking with MinimaLT (JSConf EU 2013)
DIY Internet: Snappy, Secure Networking with MinimaLT (JSConf EU 2013)
 
Order vs. Mad Science: Analyzing Black Hat Swarm Intelligence
Order vs. Mad Science: Analyzing Black Hat Swarm IntelligenceOrder vs. Mad Science: Analyzing Black Hat Swarm Intelligence
Order vs. Mad Science: Analyzing Black Hat Swarm Intelligence
 
The next generation ethernet gangster (part 2)
The next generation ethernet gangster (part 2)The next generation ethernet gangster (part 2)
The next generation ethernet gangster (part 2)
 

Último

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Último (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Cyberattacks on a marine context (NATO Congress 2011)

  • 1. A.P.T. Cyberattacks on a marine context Gutiérrez A. Corredera L.E.
  • 2. Goal of the talk Identification of potential security flaws on a marine context using the most recent  asset- oriented hacking techniques. Potential scenarios pirates could pursue targeting a vessel: 1- Compromised communications. 2- Malfunctioning/Sabotage of PLC systems 3- GPS precise fleet position discovering 
  • 3. Key concept A.P.T. (Advanced Persistant Threat): Refers to a group with both the capability and the intent to persistently and effectively target a specific entity. Advanced: Intelligence-gathering techniques Persistent: Not opportunistic Threat: Capability and Intent
  • 4. Are sea pirates an A.P.T.? Persistent: Hijacking from early 90s. Threat: 53 ships on 2010 But...could they become Advanced?
  • 5. Are sea pirates an A.P.T.? Persistent: Hijacking from early 90s. Threat: 53 ships on 2010 But...could they become Advanced?
  • 6. Are sea pirates an A.P.T.? Persistent: Hijacking from early 90s. Threat: 53 ships on 2010 But...could they become Advanced?
  • 7. Cyberattacks makes them Advanced Intelligence-gathering: Information Systems Intrusion Communications interception: Fake base station techniques Satellite Imaging: Google Maps, Bing...
  • 8. Classic Cyberattacks: IP oriented Every device connected to the Internet has an IP address Basic steps of a “classical” Hacker (Not Persistent) IP ranges scan for listening services Target Characterization Investigate vulnerabilities and exploits
  • 9. New Cyberattacks: Asset oriented Asset oriented search engine. Basic steps of a “Persistent” Hacker (Addressed to a certain target) Search for a concrete target in Shodan: e.g. Router Model Find exploit in Shodan So much faster and straightforward technique!
  • 10. DEMO: Quick hacking session Search for USAL assets: hostname:usal.es Find vulnerable ones. (But be nice to them :) http://www.shodanhq.com
  • 11. How all this apply to a marine context?
  • 12. How all this apply to a marine context?
  • 13. How all this apply to a marine context? http://www.zynetix.com/index.php?/solutions/maritime-gsm/
  • 14. How all this apply to a marine context? http://www.zynetix.com/index.php?/solutions/maritime-gsm/
  • 15. How all this apply to a marine context? http://www.zynetix.com/index.php?/solutions/maritime-gsm/
  • 16. How all this apply to a marine context? http://www.zynetix.com/index.php?/solutions/maritime-gsm/
  • 18. Potential security flaws Communications Intelligence Sabotage Interception gathering
  • 19. Communications interception By Tsaitgaist [see http://commons.wikimedia.org/wiki/File %3AGsm_structures.svg for license], via Wikimedia Commons
  • 20. Communications interception By Tsaitgaist [see http://commons.wikimedia.org/wiki/File %3AGsm_structures.svg for license], via Wikimedia Commons
  • 21. Communications interception By Tsaitgaist [see http://commons.wikimedia.org/wiki/File %3AGsm_structures.svg for license], via Wikimedia Commons
  • 22. Communications interception A5/x No real time. Look up tables Needs saved CUDA/GPUs Very costly Cryptoanalysis transmission. Fake base Micro BTS Close to the target Freq.inhibitor for 3G Less than 10k€ station openBSC, openBTS Cellphone Close to the target Motorola C123,155 baseband No GPRS by now OsMoComBB Less than 13$!!! modification Experimental
  • 24. Potential security flaws Communications Intelligence Sabotage Interception gathering
  • 28. Sabotage PLCs SCADA
  • 29. Sabotage PLCs SCADA Water Treatment
  • 30. Sabotage Stuxnet Very sophisticated. 4 Zero-days Deeply targeted at vulnerabilities. Extremely (Infects PLCs PLCs. 2 stolen digital expensive from FieldPGs) Spionage certificates. Needs a infection ScadaTrojans pathway to install a Inspired by Stuxnet (Infects PLCs but “Low cost” client side modified Cheaper from SCADAs) file. 3 Zero-days.
  • 32. Potential security flaws Communications Intelligence Sabotage Interception gathering
  • 34. Intelligence gathering Electronic Chart Display and Information System http://newdata.es/sistemas-de-navegacion-maritima/
  • 36. Intelligence gathering A Vessel is usually part of the Internet..
  • 37. Intelligence gathering A Vessel is usually part of the Internet.. And can be hacked as regular servers!
  • 38. Intelligence gathering A Vessel is usually part of the Internet.. And can be hacked as regular servers!
  • 39. Intelligence gathering A Vessel is usually part of the Internet.. And can be hacked as regular servers!
  • 40. Intelligence gathering Internet connection. Depends on Asset oriented Computer. manufacturer’s Classic hacking Extremely cheap hacking security tools.
  • 41. DEMO: Quick assets oriented search session Membrane Biological Reactor, Merchant Vessels, Worldwide Control system solution comprises: Siemens S7-300 PLC with MP HMI and S7-200 PLC based control systems and networking for the water treatment systems. Search for Maritime related assets: Zynetix MaritimeGSM, S7-300, advantech http://www.shodanhq.com
  • 42. Conclusions Pirates should be considered an APT. They could virtually use Cyberattacks to hijack vessels more easily. Complex Cyberattacks are more and more affordable. A ship may become practically speaking an Internet node with all its risks (should be managed). Let’s be in the look out!
  • 43. THANK YOU! {alberto,luisenrique}@flagsolutions.net Twitter: @albertoflag , @lencorredera
  • 44. THANK YOU! {alberto,luisenrique}@flagsolutions.net Twitter: @albertoflag , @lencorredera

Notas del editor

  1. \n
  2. \n
  3. \n
  4. \n
  5. \n
  6. \n
  7. \n
  8. \n
  9. \n
  10. \n
  11. \n
  12. \n
  13. \n
  14. \n
  15. \n
  16. \n
  17. \n
  18. \n
  19. \n
  20. \n
  21. \n
  22. \n
  23. \n
  24. \n
  25. \n
  26. \n
  27. \n
  28. \n
  29. \n
  30. \n
  31. \n
  32. \n
  33. \n
  34. \n
  35. \n
  36. \n
  37. \n
  38. \n
  39. \n
  40. \n
  41. \n
  42. \n
  43. \n
  44. \n
  45. \n
  46. \n
  47. \n
  48. \n
  49. \n
  50. \n