Submitted:
24 October 2024
Posted:
25 October 2024
You are already at the latest version
Abstract

Keywords:
1. Introduction
2. Related Work
3. Materials & Methods
- Date - Month and Year the incident took place or it became known.
- Impact area - The GMTS are impacted, can be: Shore, Offshore, and Vessel.
- Incident Location - The location of where the incident took place.
- Incident Country - The country in which the incident took place
- GPS coordinates - Approximate latitude and longitude of the place the incident took place.
- Victim Country - The country in which the victim resides.
- Victim Identity - The name of the victim affected.
- Victim type - Type of victim related to GMTS, examples: Ship Builder, Logistics Provider, Marine Technology Provider.
- Method - The attack method used by the threat actor.
- Attacker Country - The country in which the threat actor operates from.
4. Evaluation
4.1. Global Trends
4.2. Asymmetry of Threat Actor and Victim Countries
4.3. Year-on-Year Threat Actor Activity by Continent
4.4. Attack Method
5. Limitations & Future Work
5.1. Limitations of Literature Review
5.2. Under-Reporting of Cybersecurity Incidents
5.3. Lack of an Anonymous Reporting Mechanism
5.4. Lack of Visualisations for Key High-Level Statistics
6. Conclusion
Author Contributions
Data Availability Statement
Conflicts of Interest
Abbreviations
| ADMIRAL | Advanced Dataset of Maritime cyber Incidents ReleAsed for Literature |
| CTI | Cyber Threat Intelligence |
| CISSM | Centre for International and Security Studies at Maryland |
| EuRepoC | European Repository of Cyber Incidents |
| GMTS | Global Maritime Transportation Systems |
| GPS | Global Positioning System |
| JSON | JavaScript Object Notation |
| LLMs | Large Language Models |
| MCAD | Maritime Cyber Attack Database |
| NLP | Natural Language Processing |
| STIX | Structured Threat Information eXpression |
| 1 | https://maritimecybersecurity.nl. |
| 2 | This is larger than the number of incidents in our dataset,as some incidents note more than 1 victim origin country. |
References
- Weaver, G.A.; Feddersen, B.; Marla, L.; Wei, D.; Rose, A.; Van Moer, M. Estimating economic losses from cyber-attacks on shipping ports: An optimization-based approach. Transportation Research Part C: Emerging Technologies 2022, 137, 103423. [Google Scholar] [CrossRef]
- Rifjay, D.N.N. European Union Efforts In Securing Cyber Environment Of Europe’s Maritime Sector After Maersk Cyber-attack(2017-2018). Ph.D. Thesis, President University, 2021. [Google Scholar]
- Ribeiro, A. Operations at Japan’s Port of Nagoya resume, after probable LockBit ransomware attack. Industrialcyber, 2023. Available online: https://industrialcyber.co/transport/operations-at-japans-port-of-nagoya-resume-after-probable-lockbit-ransomware-attack/.
- Oruc, A. Claims of state-sponsored cyberattack in the maritime industry. Conference Proceedings of INEC, 2020.
- Schwarz, M.; Marx, M.; Federrath, H. 2021; arXiv:cs.CR/2112.06545].
- Meland, P.H.; Bernsmed, K.; Wille, E.; Rødseth, Ø.J.; Nesheim, D.A. A Retrospective Analysis of Maritime Cyber Security Incidents. TransNav, International Journal on Marine Navigation and Safety of Sea Transportation 2021, 15, 519–530. [Google Scholar] [CrossRef]
- Barnum, S. Standardizing cyber threat intelligence information with the structured threat information expression (stix). Mitre Corporation 2012, 11, 1–22. [Google Scholar]
- Böhm, F.; Menges, F.; Pernul, G. Graph-based visual analytics for cyber threat intelligence. Cybersecurity 2018, 1, 16. [Google Scholar] [CrossRef]
- Bronk, C.; deWitte, P. , M.; Neittaanmäki, P., Eds.; Springer International Publishing: Cham, 2022; pp. 241–254. doi:10.1007/978-3-030-91293-2_10.Conveyor. In Cyber Security: Critical Infrastructure Protection; Lehto, M., Neittaanmäki, P., Eds.; Springer International Publishing: Cham, 2022; Springer International Publishing: Cham, 2022; pp. 241–254. [Google Scholar] [CrossRef]
- Loomis, W.; Singh, V.V.; Kessler, G.C.; Bellekens, X. Raising the colors: Signaling for cooperation on maritime cybersecurity; Atlantic Council, 2021.
- Tam, K.; Jones, K.D. Maritime cybersecurity policy: the scope and impact of evolving technology on international shipping. Journal of Cyber Policy 2018, 3, 147–164. [Google Scholar] [CrossRef]
- Bimco, International Chamber of Shipping, W. P.G., Cyber Security Workbook for On Board Ship Use; Marisec: London, 2023; p. 208. [Google Scholar]
- Mraković, I.; Vojinović, R. Maritime cyber security analysis–How to reduce threats? Transactions on maritime science 2019, 8, 132–139. [Google Scholar] [CrossRef]
- Iqbal, Z.; Khan, M.K. Maritime cybersecurity: Vulnerabilities and counter measures. Journal of Contemporary Studies 2021, 9, 42–58. [Google Scholar]
- Akpan, F.; Bendiab, G.; Shiaeles, S.; Karamperidis, S.; Michaloliakos, M. Cybersecurity challenges in the maritime sector. Network 2022, 2, 123–138. [Google Scholar] [CrossRef]
- Jacq, O. Détection, analyse contextuelle et visualisation de cyber-attaques en temps réel : élaboration de la Cyber Situational Awareness du monde maritime. PhD thesis, 2021. Thèse de doctorat dirigée par Kermarrec, Yvon Informatique Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire 2021.
- Pranggono, B.; Arabo, A. COVID-19 pandemic cybersecurity issues. Internet Technology Letters 2021, 4, e247. [Google Scholar] [CrossRef]
- Lohrmann, D. Is a ’Cyber Pandemic’ Coming? https://www.govtech.com/blogs/lohrmann-on-cybersecurity/is-a-cyber-pandemic-coming.html, 2020. (Accessed on 05/13/2024).
- Thetius, Cyberowl, H. Shifting Tides, Rising Ransoms and Critical Decisions: Progress on maritime cyber risk management maturity. Cyberowl, 2023. Available online: https://cyberowl.io/resources/global-industry-report-shifting-tides-rising-ransoms-and-critical-decisions-progress-on-maritime-cyber-risk-management-maturity/#download.
- Bunwaree, P. The Illegality Of Fishing Vessels Going Dark And Methods Of Deterrence. Cambridge University Press 2023, 71. [Google Scholar] [CrossRef]
- Egger, M.; Zellweger-Zähner, T.; Schneider, M.; Junker, C.; Lengeler, C.; Antes, G. Language bias in randomised controlled trials published in English and German. Lancet 1997, 350, 326–329. [Google Scholar] [CrossRef] [PubMed]
- Vaswani, A.; Shazeer, N.; Parmar, N.; Uszkoreit, J.; Jones, L.; Gomez, A.N.; Kaiser, L.; Polosukhin, I. Attention is All you Need. Advances in Neural Information Processing Systems; Guyon, I.; Luxburg, U.V.; Bengio, S.; Wallach, H.; Fergus, R.; Vishwanathan, S.; Garnett, R., Eds. Curran Associates, Inc., 2017, Vol. 30.
- Wall, D.S. Cybercrime, media and insecurity: The shaping of public perceptions of cybercrime1. International Review of Law, Computers & Technology 2008, 22, 45–63. [Google Scholar] [CrossRef]
- Lydon, L. Corporate under reporting of cybercrime: Why does reporting to authorities matter? ISG MSc Information Security thesis series, Royal Holloway University of London, 2022. Available online: https://www.royalholloway.ac.uk/research-and-teaching/departments-and-schools/information-security/research/explore-our-research/isg-technical-reports/.
- Pijpker, J.; McCombie, S.J. A Ship Honeynet to Gather Cyber Threat Intelligence for the Maritime Sector. 2023 IEEE 48th Conference on Local Computer Networks (LCN), 2023, pp. 1–6. [CrossRef]
- Harry, C.; Gallagher, N. Classifying Cyber Events: A Proposed Taxonomy. Journal of Information Warfare 2018, 17, 17–31. [Google Scholar]
- European Repository of Cyber Incidents (EuRepoC). Global Dataset of Cyber Incidents V.1.2, 2024. [CrossRef]









| Year | Title | Summary | No. Attacks |
|---|---|---|---|
| 2019 | Maritime Cyber Security Analysis – How to Reduce Threats? [13] | Provides examples of cyber attacks against the maritime industry. Also it discusses different attacks forms that can be used and introduces different steps to mitigate cyber incidenst. | 9 |
| 2020 | Claims of State-Sponsored Cyberattack in the Maritime Industry [4] | Emphasizes the impact of cyber attacks on the maritime industry due to its widespread use of information technology (IT) and operational technology (OT). It also examines various cyberattacks in the maritime industry. | 22 |
| 2021 | A Retrospective Analysis of Maritime Cyber Security Incidents [6] | Summarizes different IT/OT attacks to the maritime industry. A total of 46 incidents are summarized between 2010 - 2020. | 46 |
| 2021 | A Structured Analysis of Information Security Incidents in the Maritime Sector [5] | Provides an overview about publicly known cyber incidents in the maritime sector from the past 20 years. It covers 90 publicly reported attacks and 15 proof of concepts, categorizing them into different threat categories. | 90 |
| 2021 | Maritime Cybersecurity: Vulnerabilities and counter measures [14] | Describes the cyber threats to the maritime industry. It discusses 9 recent cyberattacks and incidents on maritime infrastructure. | 9 |
| 2022 | Cybersecurity Challenges in the Maritime Sector [15] | Explores the increasing cybersecurity breaches in the maritime industry due to digitalization, highlighting vulnerabilities, consequences of cyber attacks, and mitigation actions. The paper summarizes 13 attacks against the maritime industry. | 13 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).