Skip to main navigation Skip to search Skip to main content

How did they get aboard my ship? Analysing vessel cyber incidents using the Cyber Kill Chain

Jeroen Pijpker, Stephen McCombie

Research output: Contribution to journalConference paperpeer-review

5 Downloads (Pure)

Abstract

The Global Maritime Transportation System (GMTS) is increasingly reliant on digitized and interconnected systems. This trend also applies to one of the most essential elements of the GMTS, vessels themselves. The Maritime Cyber Attack Database (MCAD) contains listings of maritime cyber incidents from public sources, including those involving vessels. Utilizing MCAD in this paper, we categorize and analyse these specific listings related to vessels. Vessels have complex networks of Information Technology (IT) and Operational Technology (OT). In this paper, we further categorize and systematically analyse selected cyber-attacks against vessels with the Lockheed Martin Cyber Kill Chain. This work also shows a significant rise in attacks against vessels since 2016. These case studies help industry more clearly understand the specific tactics and techniques used in cyber-attacks on vessels.
Original languageEnglish
Pages (from-to)374-382
Number of pages9
JournalInternational Conference on Cyber Warfare and Security: conference proceedings
Volume21
Issue number1
DOIs
Publication statusPublished - 19 Feb 2026
Externally publishedYes
EventInternational Conference on Cyber Warfare and Security (21st : 2026) - University of North Carolina, Wilmington, United States
Duration: 5 May 20266 May 2026

Bibliographical note

Copyright the Author(s) 2026. Version archived for private and non-commercial use with the permission of the author/s and according to publisher conditions. For further rights please contact the publisher.

Keywords

  • maritime cybersecurity
  • Cyber Kill Chain
  • MCAD
  • GMTS

Fingerprint

Dive into the research topics of 'How did they get aboard my ship? Analysing vessel cyber incidents using the Cyber Kill Chain'. Together they form a unique fingerprint.

Cite this