{"id":21576,"date":"2018-03-15T10:32:01","date_gmt":"2018-03-15T14:32:01","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=21576"},"modified":"2019-11-15T06:39:54","modified_gmt":"2019-11-15T11:39:54","slug":"yachts-vulnerabilities","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/yachts-vulnerabilities\/21576\/","title":{"rendered":"Modern yacht hacking"},"content":{"rendered":"<p>Manufacturers of modern vessels didn\u2019t escape the common trend of connecting various parts of their ships to the Internet. As a result, any modern yacht now contains not only navigation systems, but also a pack of IoT devices with routers and switches \u2014 regardless of whether they\u2019re really necessary.<\/p>\n<p>As a result, yachts have the same security problems as other devices that <em>suddenly<\/em> became Internet-friendly: Technologies developed before modern security standards, navigation and infotainment systems connected to the same network, unprotected Internet connections on board, and more. Stephan Gerling of the ROSEN Group reported some of these problems during the <a href=\"https:\/\/www.kaspersky.com\/blog\/tag\/the-sas-2018\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Security Analyst Summit 2018<\/a> conference.<\/p>\n<p>A yacht\u2019s onboard network may include <a href=\"http:\/\/www.raymarine.com\/uploadedFiles\/Products\/Networking\/SeaTalk\/SeaTalkng.pdf\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">a lot of things<\/a> \u2014 a vessel traffic service (VTS) device, automatic identification system (AIS), autopilot, GPS receivers, radar, cameras (including thermal), depth sounders, engine control and monitoring (some are cloud based now), and more. All of these electronics are connected to a network through a bus based on National Marine Electronics Association (NMEA) plug-and-play standards. The newest of these standards is NMEA 2000 (or N2K). Curiously, it\u2019s related to the CAN bus used in road vehicles.<\/p>\n<p>Even when electronic marine tools are not connected to the Internet, they can fall prey to some known vectors of attack: GPS jamming, GPS spoofing, AIS spoofing, and so on. Such attacks are not just theoretical; some have already <a href=\"http:\/\/www.businessinsider.com\/hacking-and-gps-spoofing-involved-in-navy-accidents-2017-8\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">happened<\/a>. In attacks of this kind, malefactors alter information about a ship\u2019s position and speed \u2014 data collected by AIS and transmitted, for example, to a harbor master to avoid collisions. Attacks on a GPS signal or AIS connection can cause navigation problems and even lead to collisions with other vessels, with serious damage and even human casualties.<\/p>\n<p>In addition to NMEA, modern yachts have other networks on board. Infotainment networks are based on the TCP\/IP protocol, which we use every day and includes the connected devices we know well: routers and switches, <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/wi-fi\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener\">Wi-Fi<\/a> access points, VoIP phones, smart TVs, and so on.<\/p>\n<p>The issue here is that NMEA and TCP\/IP networks are connected through a gateway. On the one hand, that means a yacht\u2019s owner can remotely control and monitor the vessel\u2019s systems, from lights or curtains to an engine, from his\/her smartphone or tablet. Even the autopilot can be controlled by special wireless device. On the other hand, that means that these two networks are not isolated, and if an infotainment network is <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/hacker\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener\">hacked<\/a>, it is possible to hack deeper \u2014 into the NMEA network.<\/p>\n<p>Of course, infotainment networks get Internet access through satellite, high power 4G\/3G\/2G, and Wi-Fi modules.<\/p>\n<p>To demonstrate how insecure a boat\u2019s network can be, Gerling brought aboard one available solution to set up and control the Internet connection and local networks. For the user\u2019s convenience, the solution can be remotely controlled (by software for Windows, iOS, or Android), and that is where problems start.<\/p>\n<p>For example, every time the control app is opened on a tablet, mobile phone, or computer, it makes an FTP connection to the router and downloads an XML file. This file contains the complete router configuration, including hardcoded router credentials and Wi-Fi SSID and password in clear text. Thanks to the insecure FTP protocol, this data is easy to intercept, meaning that criminals can take full control over a yacht\u2019s router and infotainment network. In addition, Gerling found a user account with root rights in the router OS that was left by developers, probably for a remote technical support.<\/p>\n<p>What can a cybercriminal do after taking control of an infotainment system? Well, for example, intercept traffic including HTTP requests, audio (VoIP) and video (surveillance) streaming, and more. It\u2019s a good start not only for espionage, but also for attacking every device on board that has a Wi-Fi connection.<\/p>\n<p>After Gerling reported all discovered issues to the vendor, the network protocol was changed from FTP to SSH, and new app and router firmware versions were developed. The patched software does still contain hardcoded credentials \u2014 developers just changed the password from \u201c12345678\u201d to a more complicated one. And the developer\u2019s root account still remains in the router\u2019s operating system, even after the patch.<\/p>\n<p>Looking at the situation as a whole, we do not have many tips for yacht owners. Onboard infotainment systems are not usually a DIY setup of routers and cables but instead are delivered as a complete solution with limited options. And it\u2019s unlikely many yacht owners will install and adjust their own systems. In a nutshell, all we can recommend is to choose your infotainment solution\u2019s manufacturer wisely.<\/p>\n<p>That said, the research shows even complicated and expensive solutions may contain primitive, easily exploitable flaws that can be used for espionage on a yacht\u2019s owner and guests. What happens on board won\u2019t stay on board, in other words. Taking into consideration how many high-profile victims own or rent a vessel, manufacturers should pay much more attention to security \u2014 and proactively involve experts and pentesters \u2014 not simply wait for serious leaks, for which they will be rightly blamed.<\/p>\n<p>From an IT-security perspective, a connected yacht is very similar to a connected car, so similar methods can be used for protection: for example, implementing a gateway that secures the data exchange between the components of an onboard computer system. One such option would be a <a href=\"https:\/\/www.kaspersky.com\/blog\/connected-cars-secure-by-design\/16947\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">device powered by our Kaspersky OS<\/a>, which we are developing for car manufacturers.<\/p>\n<p>Thanks to our microkernel operating system, such protection can control all interactions between the hardware components inside an information system and prevent any deviations caused by internal errors or unauthorized access attempts. You can learn more about our operating system and its capabilities on the <a href=\"https:\/\/os.kaspersky.com\/?utm_medium=blg&amp;utm_source=ww_kd_p_180315\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Kaspersky OS Web page<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Yachts are now Internet-friendly \u2014 and vulnerable because developers aren\u2019t focusing on information security.<\/p>\n","protected":false},"author":217,"featured_media":21577,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,2683],"tags":[2882,730,658,1111,337,2752,333,422],"class_list":{"0":"post-21576","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-2882","10":"tag-connected-cars","11":"tag-internet-of-things","12":"tag-maritime","13":"tag-sas","14":"tag-sas-2018","15":"tag-security-analyst-summit","16":"tag-threats"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/yachts-vulnerabilities\/21576\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/yachts-vulnerabilities\/12774\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/yachts-vulnerabilities\/10583\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/yachts-vulnerabilities\/14895\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/yachts-vulnerabilities\/13212\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/yachts-vulnerabilities\/12636\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/yachts-vulnerabilities\/15532\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/yachts-vulnerabilities\/15183\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/yachts-vulnerabilities\/19994\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/yachts-vulnerabilities\/10100\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/yachts-vulnerabilities\/10225\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/yachts-vulnerabilities\/16109\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/yachts-vulnerabilities\/9436\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/yachts-vulnerabilities\/19881\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/yachts-vulnerabilities\/19808\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/yachts-vulnerabilities\/19835\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/sas-2018\/","name":"SAS 2018"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/21576","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/217"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=21576"}],"version-history":[{"count":6,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/21576\/revisions"}],"predecessor-version":[{"id":29778,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/21576\/revisions\/29778"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/21577"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=21576"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=21576"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=21576"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}