The maritime industry, which plays a crucial role in global trade, is increasingly vulnerable to cyberattacks as it digitizes. Recent intelligence from Cyble reports over a hundred cyber incidents in the past year, primarily orchestrated by advanced persistent threat (APT) groups, financially motivated hackers, ransomware gangs, and hacktivists targeting shipping and maritime organizations.
Financially Motivated Cyberattacks
The industry’s growing reliance on operational technology (OT) and digital logistics has made it more susceptible to attacks, particularly against a backdrop of geopolitical tensions. A significant event occurred in March, when the anti-Iranian group Lab Dookhtegan disrupted VSAT communications across 116 Iranian vessels, affecting critical logistics and communication links. This trend of electronic interference, including GPS jamming and AIS spoofing, poses severe navigational risks, particularly in strategic waterways like the Persian Gulf and Strait of Hormuz.
The maritime domain is a battleground for great-power competition. Russian APTs are targeting European ports sympathetic to Ukraine, while Chinese groups have breached organizations certifying global fleets. Pro-Palestinian hacktivists are using AIS data to track Israeli-linked tankers. Numerous groups, such as SideWinder APT and APT41, are employing advanced malware and supply chain intrusions to exploit vulnerabilities. Regional actors like Turla and RedCurl have increased incidents of industrial espionage and ransomware attacks against maritime assets.
Sector Vulnerabilities Exposed
The dark web is witnessing a surge in sensitive data for sale, including port credentials and technical documentation, increasing risks of economic sabotage and safety breaches. Cyble’s research points to critical vulnerabilities in various maritime and industrial systems, including Citrix and Siemens products. Especially concerning are longstanding flaws in COBHAM SAILOR VSAT systems, pivotal for global fleet operations.
To address these threats, experts suggest improving network isolation, banning unauthorized USB and cellular devices, utilizing data diodes, and implementing rigorous application whitelisting. Tailored incident response strategies involving IT and OT teams are essential for managing cyber disruptions.
Supply Chain Security and Regulatory Compliance
Supply chain security demands immediate attention, with recommendations for reducing remote access on foreign-made equipment and leveraging cryptographically signed software bills of materials (SBOMs) alongside blockchain-verified navigation updates. As the regulatory landscape evolves, maritime organizations need to align with emerging cybersecurity rules from the U.S. Coast Guard and the EU’s NIS2 Directive.
Ultimately, the maritime sector’s security and resilience hinge on proactive management of vulnerabilities, stringent access controls, and a coordinated response plan tailored to the pervasive and dynamic threat landscape targeting critical global shipping infrastructure. The industry is encouraged to remain vigilant and adaptive to protect against the increasing array of cyber threats.







