The U.S. Coast Guard on Monday issued a safety alert advising commercial vessel owners and operators to ensure that effective cybersecurity measures are in place to protect the network and important control systems on their ships.
The alert points to a February 2019 incident where a deep draft vessel bound for the Port of New York and New Jersey had its systems infected with a piece of malware that “significantly degraded the functionality of the onboard computer system.”
While the incident did not impact the ship’s essential control systems, it did highlight the lack of proper cybersecurity measures.
“It is unknown whether this vessel is representative of the current state of cybersecurity aboard deep draft vessels. However, with engines that are controlled by mouse clicks, and growing reliance on electronic charting and navigation systems, protecting these systems with proper cybersecurity measures is as essential as controlling physical access to the ship or performing routine maintenance on traditional machinery,” the Coast Guard said. “It is imperative that the maritime community adapt to changing technologies and the changing threat landscape by recognizing the need for and implementing basic cyber hygiene measures.”
The Coast Guard has advised vessel and facility operators and owners to prevent these types of incidents by segmenting their networks to make it more difficult for attackers to access critical systems and equipment, eliminate the use of the same login credentials for multiple employees and limit the privileges of users who don’t require administrator permissions, scan external media (e.g. USB drives) before plugging them into the shipboard network, install security software and keep it updated, and always patch operating systems and applications.
The agency has advised owners and operators to contact the Hunt and Incident Response Team (HIRT) at the DHS’s National Cybersecurity and Communications Integration Center (NCCIC) to conduct a cybersecurity assessment that will help them identify specific risks and vulnerabilities.
Learn More About Maritime Cybersecurity at SecurityWeek’s ICS Cyber Security Conference
This alert comes just weeks after the Coast Guard issued a marine safety information bulletin warning the maritime industry of phishing emails purporting to come from a Port State Control (PSC) authority, and malware designed to disrupt shipboard systems.
Threat actors have been known to target the maritime industry and researchers showed recently that insecure configurations and vulnerabilities in communications and navigation systems can allow hackers to remotely track, hijack and sink ships.
“The threats are very real,” Jalal Bouhdada, founder and principal consultant at industrial cybersecurity firm Applied Risk, wrote in a SecurityWeek column last year. “Researchers have demonstrated proof of concept attacks against many of the most common maritime systems, and there’s evidence of problems in the wild in which navigational computers were infected with malware on a USB stick being used for upgrades. Even worse, there have also been public reports that critical communications systems have been left effectively unprotected, thanks to defenceless interfaces and failures to change default credentials.”
“The nature of the shipping industry does present highly unique challenges for hardening cybersecurity, but they are not insurmountable. For firms that get it right, cybersecurity will be a powerful enabler in the world of more automated and unmanned shipping,” the expert added.
Related: Hackers Can Hijack, Sink Ships
Related: Maritime Cybersecurity: Securing Assets at Sea
Related: China-linked Hackers Target Engineering and Maritime Industries

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- 3CX Confirms Supply Chain Attack as Researchers Uncover Mac Component
- OpenSSL 1.1.1 Nears End of Life: Security Updates Only Until September 2023
- Google Links More iOS, Android Zero-Day Exploits to Spyware Vendors
- ChatGPT Data Breach Confirmed as Security Firm Warns of Vulnerable Component Exploitation
- Thousands Access Fake DDoS-for-Hire Websites Set Up by UK Police
- Intel Boasts Attack Surface Reduction With New 13th Gen Core vPro Platform
- Dole Says Employee Information Compromised in Ransomware Attack
- High-Severity Vulnerabilities Found in WellinTech Industrial Data Historian
Latest News
- 500k Impacted by Data Breach at Debt Buyer NCB
- Chinese Cyberspies Use ‘Melofee’ Linux Malware for Stealthy Attacks
- Why Endpoint Resilience Matters
- Microsoft Cloud Vulnerability Led to Bing Search Hijacking, Exposure of Office 365 Data
- 3CX Confirms Supply Chain Attack as Researchers Uncover Mac Component
- UK Introduces Mass Surveillance With Online Safety Bill
- Musk, Scientists Call for Halt to AI Race Sparked by ChatGPT
- Malware Hunters Spot Supply Chain Attack Hitting 3CX Desktop App
