View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
October 16, 2013

Trend Micro research finds security flaws in shipping communications protocols

The Forward Looking Threat Research team of Trend Micro, a Japanese security software firm, has discovered flaws in the Automatic Identification System (AIS), a vessel tracking system used by commercial ships weighing over 300 metric tonnes.

By admin-demo

TrendMicro

The Forward Looking Threat Research team of Trend Micro, a Japanese security software firm, has discovered flaws in the Automatic Identification System (AIS), a vessel tracking system used by commercial ships weighing over 300 metric tonnes.

Free Whitepaper
img

Never Trust, Always Verify: Is Zero Trust the Next Big Thing in Cybersecurity?

Cyberattacks continue to rise every year and no sector seems to be immune. Hackers target sensitive information such as organizational, client, and financial data, as well as intellectual property (IP) and proprietary functions. As digital transformation becomes a top priority for many organizations, traditional perimeter-based security models are no longer sufficient to address the growing cybersecurity concerns. Against the backdrop, enterprises explore zero trust as it takes a micro-level approach to authenticate and approve access at every point within a network. Reasons to read: The cybersecurity landscape is swiftly changing, and businesses need more awareness to meet the evolving change. The report highlights the current state of play and the future potential of the zero trust approach in cybersecurity to protect critical digital infrastructure of enterprises across sectors such as financial services, healthcare, telecom, and transportation, among others. Read our report and gather insights on the following topics:
  • Traditional vs zero trust protection
  • Key advantages and solution providers
  • Major industries and key players
  • Drivers and challenges
  • Top funded startups and Mergers & Acquisitions
  • Implementation challenges
by GlobalData
Enter your details here to receive your free Whitepaper.

Installed in around 40,000 vessels, AIS works by taking inputs from a global positioning system (GPS) and then exchanging the vessel’s position, course and other information with nearby ships and offshore installations.

According to the researchers, Marco Balduzzi and Kyle Wilhoit, the flaws in the AIS internet providers can allow pirates and attackers to hijack vessel communications, change the position and course of vessels, create fake vessels, create false SOS or collision alerts, and even permanently disable AIS tracking on any vessel.

Flaws were also discovered in the actual specification of the AIS protocol used by hardware transceivers in all mandatory vessels.

These flaws can impersonate marine authorities to permanently disable the AIS system on a vessel, create a fake ‘man-in-the-water’ distress beacon at any location, and fake a closest point of approach (CPA) alert.

Trend Micro noted that these flaws emerged as the AIS protocol was designed with seemingly zero security considerations.

Trend Micro identified major issues such as a lack of validity checks, lack of timing checks, lack of authentication and lack of integrity checks.

According to the researchers, while the tests were carried out in a dedicated test lab setup, where specific software defined radio equipment was used, they were able to prove that the attacks can be performed by the attacker using a standard VHF radio which costs around €150.

According to the researchers, it will be difficult to fix the flaws in the AIS, as they can be seen in the deep core of the protocol, but will need to be updated across three main areas; validity, authenticity and encryption.


Image: 300t ships should not drive down the main street of a city. Credit: Trend Micro Inc.

Related Companies

Free Whitepaper
img

Never Trust, Always Verify: Is Zero Trust the Next Big Thing in Cybersecurity?

Cyberattacks continue to rise every year and no sector seems to be immune. Hackers target sensitive information such as organizational, client, and financial data, as well as intellectual property (IP) and proprietary functions. As digital transformation becomes a top priority for many organizations, traditional perimeter-based security models are no longer sufficient to address the growing cybersecurity concerns. Against the backdrop, enterprises explore zero trust as it takes a micro-level approach to authenticate and approve access at every point within a network. Reasons to read: The cybersecurity landscape is swiftly changing, and businesses need more awareness to meet the evolving change. The report highlights the current state of play and the future potential of the zero trust approach in cybersecurity to protect critical digital infrastructure of enterprises across sectors such as financial services, healthcare, telecom, and transportation, among others. Read our report and gather insights on the following topics:
  • Traditional vs zero trust protection
  • Key advantages and solution providers
  • Major industries and key players
  • Drivers and challenges
  • Top funded startups and Mergers & Acquisitions
  • Implementation challenges
by GlobalData
Enter your details here to receive your free Whitepaper.

NEWSLETTER Sign up Tick the boxes of the newsletters you would like to receive. The top stories of the day delivered to you every weekday. A weekly roundup of the latest news and analysis, sent every Friday. The industry's most comprehensive news and information delivered every month.
I consent to GlobalData UK Limited collecting my details provided via this form in accordance with the Privacy Policy
SUBSCRIBED

THANK YOU

Thank you for subscribing to Ship Technology