The maritime industry has become a major target for cyberattacks. We look at threat actors, incidents, vulnerabilities – and what can be done.
The maritime industry, responsible for as much as 90% of global trade, is increasingly becoming a target of cyber threat actors.
A recent Cyble report to clients documented more than a hundred cyberattacks by advanced persistent threat (APT) groups, financially motivated threat actors, ransomware groups, and hacktivists, as the maritime and shipping industry has become a prime target amid growing geopolitical conflict.
The trend has become particularly pronounced in the last year. Pro-Palestinian hacktivists have targeted Israeli-linked vessels using Automatic Identification System (AIS) data. Russian groups have targeted European ports supporting Ukraine. Chinese state actors compromised classification societies that certify the world’s fleets.
In one notable incident in March 2025, in concert with U.S. attacks on Houthi rebels in Yemen, the anti-Iranian group Lab Dookhtegan launched a well-orchestrated cyberattack that allegedly disrupted communications (VSAT) on 116 Iranian vessels. The operation reportedly severed inter-ship and ship-to-port links, targeting entities accused of supplying arms to Houthi forces.
Electronic interference, including GPS jamming and spoofing, is escalating in critical maritime chokepoints like the Persian Gulf and Strait of Hormuz, posing a serious threat to vessel safety and operational reliability. This interference can disrupt AIS positional reporting and other navigation systems, leaving ships effectively blind in some of the world’s busiest and most strategically sensitive waters.
Driven largely by rising geopolitical tensions and military maneuvers, these disruptions increase the risk of collisions, navigational errors, and maritime incidents, while also undermining regional security and the safe flow of global trade.
What follows is a look at some of the incidents, campaigns, and vulnerabilities affecting the maritime industry, along with some key cybersecurity considerations.
At least a dozen advanced persistent threat (APT) groups have targeted the maritime industry in the last year. Some of the APT groups have included:
Cyble dark web researchers have documented a number of threat actors in the last year selling sensitive data and access allegedly stolen from maritime organizations. These claims have included:
A threat actor (TA) on DarkForums recently claimed to possess 1TB of internal data allegedly stolen from a major European defense contractor specializing in submarines and naval vessels. The TA claimed that the data includes source code for a top-secret CMS for submarines and frigates, network metadata, classified technical documents, virtual machines with navy simulators, and confidential internal communications.
Another TA on DarkForums recently advertised data allegedly stolen from a European marine technology company. The TA claimed to possess internal system files from the company, including technical manuals and internal configurations for systems, detailed NMEA telegrams used for engine control systems, and other sensitive operational documentation.
A TA on DarkForums in June advertised data allegedly pertaining to a major South American maritime authority. According to the TA, the compromised data revealed security gaps, such as offline surveillance on key maritime routes, and outdated cybersecurity protocols at some major ports.
A TA on the former BreachForums in February leaked data allegedly stolen from a Middle Eastern government body responsible for regulating, developing, and overseeing maritime transport and logistics activities. According to the TA, the leaked dataset included detailed records such as operational reports, logistical data, internal communications, and other critical information related to maritime activities.
A TA on the former BreachForums advertised data allegedly stolen from a major U.S. port that included SSL certificates, private keys, a firewall license, and login credentials.
Cyble also documented dozens of ransomware and hacktivism attacks hitting the maritime sector. Ship blueprints have been among the data allegedly exfiltrated by ransomware groups.
Cyble vulnerability intelligence researchers highlighted ten vulnerabilities affecting the maritime industry that should be prioritized by security teams. They include:
Cyble recommends a number of security measures for improving maritime cybersecurity, including banning personal USB devices in operational areas on ports and ships.
Network Isolation Architecture should be implemented, including:
Supply chain security requires immediate attention, including disabling remote access on Chinese-manufactured equipment, implementing rigorous vendor security assessments, and establishing secure update mechanisms for maritime systems. Persistent vendor access should be replaced by “just-in-time” support windows.
Vulnerability management should prioritize patching CISA KEV-listed vulnerabilities, replacing legacy Windows systems, and implementing network segmentation between IT and OT environments.
Incident response capabilities need maritime-specific protocols, cross-functional teams that include OT specialists, and regular drills simulating ransomware and APT scenarios.
Access control must include the elimination of default credentials, the implementation of multi-factor authentication, and privileged access management for critical systems.
Regulatory compliance also must be addressed, including preparation for Coast Guard cybersecurity rules, alignment with IACS UR E26/E27 standards, and implementation of NIS2 Directive requirements.