Report: Maritime Cyberattacks Doubled in 2025
The prevalence of maritime cyberattacks doubled in 2025, according to Korean security firm Cytur, led by an explosion of malware and distributed denial of service (DDoS) incidents. Some of the most concerning examples involved a high-level penetration of the shoreside supply chain, giving the attackers useful information about systems (or even remote access) at a fleet level. Others extended to worst-case scenarios: destroyed equipment, hacked ECDIS chart systems, and remote control of ballast valves.
Hackers are getting better at targeting shipping, Cytur's report shows, and they have a reason: money. Access is the same as ever - exploiting unwitting crewmembers via phishing emails; breaching unprotected public wifi used by the crew; or sneaking aboard via a hacked USB drive, whether by bribing a crewmember to use the drive or by accident. But Cyber threat actors are finding more ways to monetize vessel information, whether by encrypting it, holding it hostage and demanding a ransom from the operator, or by stealing it and selling it to third parties on the Dark Web.
Illicit items found for sale online include voyage logs, cargo manifests, ship design schematics and the personal information of the crew, according to Cytur. Often the operator will pay to avoid having their internal records released: one common ransomware attack involves encrypting the ship's Planned Maintenance System (PMS), forcing the operator to pay in order to recover the voyage's logs. Ransomware attacks and data theft are often found in high-traffic regions, like Asian waters and major hub ports, Cytur said.
Another common form of attack is distributed denial of service (DDoS), a brute-force swarm of automated activity that swamps a network and crowds out legitimate traffic. Hackers may hijack vulnerable onboard routers and other IT infrastructure, then use it to send so many requests that it overwhelms the capacity of the ship's satcom connection, temporarily rendering the ship unable to exchange messages with the home office.
More concerning, though, are hacks targeted at disabling or hijacking ship systems. The "Lab Dookhtegan" ("sewn lips") attack on Iranian tonnage last year was a concerning example. The threat group systematically targeted an Iranian satcom provider, Fanava, to carry out an attack high up the digital supply chain for Iran's state-owned fleet of tankers. After penetrating Fanava, Lab Dookhtegan obtained fleetwide control over ship to shore VOIP services, making it harder for the vessels to communicate with the home office or with port officials.
While in possession of access to the ships' networks, the Lab Dookhtegan group stole corporate documents belonging to Iranian state firms NITC and IRISL, then released them online. When done with its access mission, it destroyed the ships' modems by overwriting partitioned memory; physical replacement of the hardware was required.
Another advanced supply chain attack occurred in October, when Japanese radar and ECDIS builder Furuno was hit by ransomware. The hacking threat group, known as Rhysida, stole Furuno's internal data and threatened to release it; meanwhile, it encrypted the firm's data, disabled backup servers and demanded payment. The attack temporarily interfered with service, updates and parts shipments for Furuno.
Most concerning may be hacking attacks on operating technology (OT), like engine control systems and ballast water systems. Cytur warned that the remote access communications protocols baked into equipment electronics - used by OEM troubleshooting teams to remotely diagnose errors and make changes - remain a vulnerability. If a hacker could remotely control engine output, or ballasting, the results could be catastrophic.

that matters most
Get the latest maritime news delivered to your inbox daily.
Going forward, Cytur anticipates that AI agent-assisted attacks will become more prevalent, and that this year will be the beginning of an era of "autonomous attacks" with largely or fully AI-directed hacking campaigns. This will de-skill cyber crime, opening up the door to a larger number of would-be hackers, the consultancy predicts.
"The incident data from 2024 and 2025 proves that maritime cybersecurity is no longer an ‘option’ but a matter directly linked to a vessel’s ‘right to operate,'" said Cho Yong Hyun, CEO of Cytur.
Content Original Link:
" target="_blank">

