SlideShare a Scribd company logo
1 of 48
Download to read offline
AIS Exposed
New Vulnerabilities and Attacks
Marco Balduzzi & Alessandro Pasta
(Kyle Wilhoit)
[HITB AMS, 29 May 2014]
Outline
● Balduzzi et al. , October 2013, HITB KUL ++
3
Automatic Identification System
● AIS, Automatic Identification System
● Tracking system for vessels
– Ship-to-ship communication
– From/to port authorities (VTS)
● Some applications:
– Maritime security (piracy)
– Collision avoidance
– Search and rescue
– Accident investigation
– Binary messages, e.g. Weather forecasting
4
Required Installation
● Since 2002
● Introduced to supplement existing safety
systems, e.g. traditional radars
● Required on:
– ANY International ship with gross tonnage of 300+
– ALL passenger ships regardless of size
● Estimated 400,000 installations
● Expected over a million
5
6
Data Exchange
● AIS messages are exchanged in two forms:
● Radio-frequency (VHF) – 162 ± 0.25 MHz
● Online AIS Providers
7
Online Providers
● Collect and visualize
vessels information
● Data upstream via:
– Mobile Apps,
Software
– Email
– API
– Radio-frequency
gateways deployed
regionally
8
Example – Port of AMS
● MarineTraffic.com
9
Example – RF Transponder
● OpenCPN Chart Plotter + AIS Transponder
10
Identified Threats
● Grouped in two macro categories
● 1. Implementation-specific = Online Providers
[Software]
VS
● 2. Protocol-specific = AIS Transponders
[RF / VHF]
11
AIS Application Layer
● AIVDM messages, e.g.:
– Position reports
– Static reports
– Management (channel...)
– Safety-related (SART)
● NMEA sentences , as GPS
!AIVDM,1,1,,B,177KQJ5000G?tO`K>RA1wUbN0TKH,0*5C
TAG, FRAG_#, FRAG_ID, N/A, CHANNEL, PAYLOAD, PAD, CRC
12
AIVDM Encoder
13
Example
● Ship involved in Military Operations
● MMSI 247 320162 (Italy)
14
Spoofing – Online Providers
● Ships or Aids-to-Navigation
15
US to North Korea... What?!
● Wargames (1983) or cyberwar?
16
Programming a malicious route
● Tool to make a ship follow a path over time
● Programmed with Google Earth's KML/KMZ
information
17
Hijacking (Rouge Gateway)
18
Example
● “Move” a real ship – Eleanor Gordon
19
Popping Up in Dallas?
20
Radio-Frequency (VHF) Threats
21
AIS Communication over the Air
● Protocol designed in a “hardware-epoch”
● Hacking was difficult and cost expensive
● No authentication, no integrity check
● 2014
● Craft AIS signals?
● Let's do it via software!
22
SDR – Software Defined Radio
● Many applications, e.g. Radio / TV receivers,
20 USD
● Radio amateurs, SDR transmitters
● Reduced costs
● Reduced complexity
● Increased flexibility
● Accessible by many, pirates included!
23
Our Testing Lab
24
AIS Transmitter
● Built & implemented a software-based AIS transmitter
● GnuRadio, http://gnuradio.org/
● Custom block: AIS Frame Builder [Ref, HITB KUL 2013]
25
RF Spoofing
● Radio-frequency (VHF) version of spoofing
● Setup : [Attacker] – [Victim]
● Amplifier : 20+ km (modified radio)
26
Victim's Console
27
Injecting into legit AIS gateways
28
Man-in-water Spoofing
● Fake a "man-in-the-water" distress beacon
● Trigger SART (S.O.S.) alerts
● Visually and acoustically
● Lure a victim vessel into navigating to a hostile
and attacker-controller sea space
● Mandatory by legislation
29
Man-in-water Spoofing
30
Frequency Hopping (DoS++)
● Disable AIS transponders
● Switch to non-default frequency (RX and TX)
● Single or multiple target(s)
● Program a desired targeted region
– Geographically remote region applies as well
● For example: Pirates can render a ship
“invisible” upon entering Somalia
31
Frequency Hopping (DoS++)
32
CPA Alerting
● Fake a CPA alert, Closest Point of Approach
● Trigger a collision warning alert
● Possibly alter course
33
CPA Alerting
34
Malicious Weather Forecasting
35
Slot Starvation (DoS++)
● Impersonate port authority
● Base station spoofing
● Book TDMA slots
36
Slot Starvation (DoS++)
● Base Station Spoofing
37
Slot Starvation (DoS++)
● Victim's Console
38
Timing Attack (DoS++)
● Instruct an AIS transponder to delay its
transmission in time
● Default broadcast time:
– Static reports = 6 min
– Dynamic reports = 0.5 to 3 min (depending on
speed)
● Attack code:
–
39
Hardware Panic! (DoS)
● Flood the device... Noise on Channel + GPS
40
Back to the r00ts
● AIS = Attack Vector
● AIVDM messages are exchanged and
processed at application layer by back-end
software
– In VTS server installations
● Binary message, special type used for
– Crew members, Number of passengers
– Environment information
● Malicious payloads, e.g. BOF, SQLi, …
41
Back to the r00ts
● SQL Error in back-end processing
42
Attacking D-GPS
● Differential Global Positioning System (D-GPS)
● Used by port authorities to increase the precision
of traditional GPS (meters → centimeters)
● Attack = Spoof D-GPS beacons to force ships
into calculating a wrong “GPS position”!
● Message 17: GNSS broadcast binary message
43
Attacking D-GPS
● Similar to “UT Austin Researchers Spoof
Superyacht at Sea” – Monday, 29 July 2013
44
Responsible Disclosure
● Experiments conducted without interfering
with existing systems
– Messages with safety-implications tested only in
lab environment (wired connections)
● We reached out the appropriate providers and
authorities within time
– MarineTraffic, AisHub, VesselFinder, ShipFinder
– ITU-R, IALA, IMO, US Coast Guards
45
Proposed countermeasures
● Authentication
– Ensure the transmitter is the owner (spoofing)
● Time Check
– Avoid replay attack
● Integrity Monitoring
– Tamper checking of AIS message (hijacking)
● Validity Check on Data Context
– E.g., Geographical information
46
Take Home
● AIS is widely used – Mandatory installation
● AIS is a major technology in marine safety
● AIS is broken at implementation-level
● AIS is broken at protocol-level
● We hope that our work will help in raising the
issue and enhancing the existing situation!
47
Thanks!
● Dr. Marco Balduzzi – @embyte
● Alessandro Pasta – @aka_pastus
48
Bonus ;-)
● Real-World Experiment
● Simulate the operational conditions of an
attacker at sea
● Coverage experiment
● Target: AIS Gateway Installation
● No time for demo video. Visit me offline

More Related Content

What's hot

Pressbrief GlobalEye Singapore Airshow
Pressbrief GlobalEye Singapore AirshowPressbrief GlobalEye Singapore Airshow
Pressbrief GlobalEye Singapore AirshowSaab AB
 
SDR101-presentation-distro
SDR101-presentation-distroSDR101-presentation-distro
SDR101-presentation-distroMike Saunders
 
General Atomics Presentation to Williams Foundation Seminar on Air-Land Integ...
General Atomics Presentation to Williams Foundation Seminar on Air-Land Integ...General Atomics Presentation to Williams Foundation Seminar on Air-Land Integ...
General Atomics Presentation to Williams Foundation Seminar on Air-Land Integ...ICSA, LLC
 
SigfoxGettingStarted TechshopParis
SigfoxGettingStarted TechshopParisSigfoxGettingStarted TechshopParis
SigfoxGettingStarted TechshopParisAurelien Lequertier
 
Saab Airborne Surveillance Media Brief Farnborough 2014
Saab Airborne Surveillance Media Brief Farnborough 2014Saab Airborne Surveillance Media Brief Farnborough 2014
Saab Airborne Surveillance Media Brief Farnborough 2014Saab AB
 
SDR 101 - NDSU CyberSecurity 2017
SDR 101 - NDSU CyberSecurity 2017SDR 101 - NDSU CyberSecurity 2017
SDR 101 - NDSU CyberSecurity 2017Mike Saunders
 
Vsat 2011 gilat_ka band
Vsat 2011 gilat_ka bandVsat 2011 gilat_ka band
Vsat 2011 gilat_ka bandSSPI Brasil
 
Satellite and Cellular Communications for Aviation
Satellite and Cellular Communications for AviationSatellite and Cellular Communications for Aviation
Satellite and Cellular Communications for AviationFlightcell International
 
ComNet NWKED Data Sheet
ComNet NWKED Data SheetComNet NWKED Data Sheet
ComNet NWKED Data SheetJMAC Supply
 
Презентация и брошюра компании «Ukrspecsystems»
Презентация и брошюра компании «Ukrspecsystems»Презентация и брошюра компании «Ukrspecsystems»
Презентация и брошюра компании «Ukrspecsystems»CHAOS - Digital Design Studio
 
Swordfish MPAa Media Presentation singapore airshow 2016
Swordfish MPAa Media Presentation singapore airshow 2016Swordfish MPAa Media Presentation singapore airshow 2016
Swordfish MPAa Media Presentation singapore airshow 2016Saab AB
 
USECASE OF SHORT RANGE DEVICES (SRDs) AND ULTRA WIDE BAND (UWB)
USECASE OF SHORT RANGE DEVICES (SRDs) AND ULTRA WIDE BAND (UWB)USECASE OF SHORT RANGE DEVICES (SRDs) AND ULTRA WIDE BAND (UWB)
USECASE OF SHORT RANGE DEVICES (SRDs) AND ULTRA WIDE BAND (UWB)Sharat Sawhney
 
MTXM2M modem catalog 2015
MTXM2M modem catalog 2015MTXM2M modem catalog 2015
MTXM2M modem catalog 2015Jesus Santos
 
MTX M2M IoT, Internet of Things, 2015
MTX M2M IoT, Internet of Things, 2015MTX M2M IoT, Internet of Things, 2015
MTX M2M IoT, Internet of Things, 2015MTX M2M
 
A LOW-COST DESKTOP SOFTWARE DEFINED RADIO DESIGN ENVIRONMENT USING MATLAB, SI...
A LOW-COST DESKTOP SOFTWARE DEFINED RADIO DESIGN ENVIRONMENT USING MATLAB, SI...A LOW-COST DESKTOP SOFTWARE DEFINED RADIO DESIGN ENVIRONMENT USING MATLAB, SI...
A LOW-COST DESKTOP SOFTWARE DEFINED RADIO DESIGN ENVIRONMENT USING MATLAB, SI...Omid Abolghasemi
 
Thotcon 0xA-fun-with-sdrs-sorry-no-profit - final
Thotcon 0xA-fun-with-sdrs-sorry-no-profit - finalThotcon 0xA-fun-with-sdrs-sorry-no-profit - final
Thotcon 0xA-fun-with-sdrs-sorry-no-profit - finalpricemcdonald
 
AeroGear Linecard 2015
AeroGear Linecard 2015AeroGear Linecard 2015
AeroGear Linecard 2015Zenie Noon
 

What's hot (19)

Pressbrief GlobalEye Singapore Airshow
Pressbrief GlobalEye Singapore AirshowPressbrief GlobalEye Singapore Airshow
Pressbrief GlobalEye Singapore Airshow
 
SDR101-presentation-distro
SDR101-presentation-distroSDR101-presentation-distro
SDR101-presentation-distro
 
SigfoxGettingStarted
SigfoxGettingStartedSigfoxGettingStarted
SigfoxGettingStarted
 
General Atomics Presentation to Williams Foundation Seminar on Air-Land Integ...
General Atomics Presentation to Williams Foundation Seminar on Air-Land Integ...General Atomics Presentation to Williams Foundation Seminar on Air-Land Integ...
General Atomics Presentation to Williams Foundation Seminar on Air-Land Integ...
 
SigfoxGettingStarted TechshopParis
SigfoxGettingStarted TechshopParisSigfoxGettingStarted TechshopParis
SigfoxGettingStarted TechshopParis
 
Saab Airborne Surveillance Media Brief Farnborough 2014
Saab Airborne Surveillance Media Brief Farnborough 2014Saab Airborne Surveillance Media Brief Farnborough 2014
Saab Airborne Surveillance Media Brief Farnborough 2014
 
SDR 101 - NDSU CyberSecurity 2017
SDR 101 - NDSU CyberSecurity 2017SDR 101 - NDSU CyberSecurity 2017
SDR 101 - NDSU CyberSecurity 2017
 
Vsat 2011 gilat_ka band
Vsat 2011 gilat_ka bandVsat 2011 gilat_ka band
Vsat 2011 gilat_ka band
 
Satellite and Cellular Communications for Aviation
Satellite and Cellular Communications for AviationSatellite and Cellular Communications for Aviation
Satellite and Cellular Communications for Aviation
 
Krypto500
Krypto500Krypto500
Krypto500
 
ComNet NWKED Data Sheet
ComNet NWKED Data SheetComNet NWKED Data Sheet
ComNet NWKED Data Sheet
 
Презентация и брошюра компании «Ukrspecsystems»
Презентация и брошюра компании «Ukrspecsystems»Презентация и брошюра компании «Ukrspecsystems»
Презентация и брошюра компании «Ukrspecsystems»
 
Swordfish MPAa Media Presentation singapore airshow 2016
Swordfish MPAa Media Presentation singapore airshow 2016Swordfish MPAa Media Presentation singapore airshow 2016
Swordfish MPAa Media Presentation singapore airshow 2016
 
USECASE OF SHORT RANGE DEVICES (SRDs) AND ULTRA WIDE BAND (UWB)
USECASE OF SHORT RANGE DEVICES (SRDs) AND ULTRA WIDE BAND (UWB)USECASE OF SHORT RANGE DEVICES (SRDs) AND ULTRA WIDE BAND (UWB)
USECASE OF SHORT RANGE DEVICES (SRDs) AND ULTRA WIDE BAND (UWB)
 
MTXM2M modem catalog 2015
MTXM2M modem catalog 2015MTXM2M modem catalog 2015
MTXM2M modem catalog 2015
 
MTX M2M IoT, Internet of Things, 2015
MTX M2M IoT, Internet of Things, 2015MTX M2M IoT, Internet of Things, 2015
MTX M2M IoT, Internet of Things, 2015
 
A LOW-COST DESKTOP SOFTWARE DEFINED RADIO DESIGN ENVIRONMENT USING MATLAB, SI...
A LOW-COST DESKTOP SOFTWARE DEFINED RADIO DESIGN ENVIRONMENT USING MATLAB, SI...A LOW-COST DESKTOP SOFTWARE DEFINED RADIO DESIGN ENVIRONMENT USING MATLAB, SI...
A LOW-COST DESKTOP SOFTWARE DEFINED RADIO DESIGN ENVIRONMENT USING MATLAB, SI...
 
Thotcon 0xA-fun-with-sdrs-sorry-no-profit - final
Thotcon 0xA-fun-with-sdrs-sorry-no-profit - finalThotcon 0xA-fun-with-sdrs-sorry-no-profit - final
Thotcon 0xA-fun-with-sdrs-sorry-no-profit - final
 
AeroGear Linecard 2015
AeroGear Linecard 2015AeroGear Linecard 2015
AeroGear Linecard 2015
 

Similar to AIS Exposed: New vulnerabilities and attacks. (HITB AMS 2014)

Automatic-identification system gr1.pptx
Automatic-identification system gr1.pptxAutomatic-identification system gr1.pptx
Automatic-identification system gr1.pptxMarkFrenlyLompot
 
presentations-amp_imo_presentation
presentations-amp_imo_presentationpresentations-amp_imo_presentation
presentations-amp_imo_presentationJeff Douglas
 
Maritime cyber security threats & consequence part 2
Maritime cyber security  threats & consequence part 2Maritime cyber security  threats & consequence part 2
Maritime cyber security threats & consequence part 2pankaj kapoor
 
"Galileo-EGNOS as an Asset for UTM and Security", por Ángel Rodríguez - Unive...
"Galileo-EGNOS as an Asset for UTM and Security", por Ángel Rodríguez - Unive..."Galileo-EGNOS as an Asset for UTM and Security", por Ángel Rodríguez - Unive...
"Galileo-EGNOS as an Asset for UTM and Security", por Ángel Rodríguez - Unive...Agencia Andaluza del Conocimiento
 
The Pegasus Mission - The Making of Pegasus II
The Pegasus Mission - The Making of Pegasus IIThe Pegasus Mission - The Making of Pegasus II
The Pegasus Mission - The Making of Pegasus IIMatt Long
 
IRJET- Development of Fishermen Border Alert and Speed Reduction System using...
IRJET- Development of Fishermen Border Alert and Speed Reduction System using...IRJET- Development of Fishermen Border Alert and Speed Reduction System using...
IRJET- Development of Fishermen Border Alert and Speed Reduction System using...IRJET Journal
 
20th kabandconference 2014_lisi_v03
20th kabandconference 2014_lisi_v0320th kabandconference 2014_lisi_v03
20th kabandconference 2014_lisi_v03Marco Lisi
 
GLONASS and GSM based Vehicle Tracking System
GLONASS and GSM based Vehicle Tracking SystemGLONASS and GSM based Vehicle Tracking System
GLONASS and GSM based Vehicle Tracking SystemIRJET Journal
 
VESSEL TRAFFIC MANAGEMENT SYSTEM
VESSEL TRAFFIC MANAGEMENT SYSTEMVESSEL TRAFFIC MANAGEMENT SYSTEM
VESSEL TRAFFIC MANAGEMENT SYSTEMSHAILESH SHUKLA
 
Mini RadaScan Brochure
Mini RadaScan BrochureMini RadaScan Brochure
Mini RadaScan BrochureS H Vazifdar
 
Skoltech fss workshop2014_lisi_v01
Skoltech fss workshop2014_lisi_v01Skoltech fss workshop2014_lisi_v01
Skoltech fss workshop2014_lisi_v01Marco Lisi
 
Accessing new tech. trends for the rapid tactical command rtc.
Accessing new tech. trends for the rapid tactical command   rtc.Accessing new tech. trends for the rapid tactical command   rtc.
Accessing new tech. trends for the rapid tactical command rtc.ZikweMsimang
 
INMARSAT - I SSPI Day 2017
INMARSAT - I SSPI Day 2017INMARSAT - I SSPI Day 2017
INMARSAT - I SSPI Day 2017SSPI Brasil
 
Mission Systems overview.pdf
Mission Systems overview.pdfMission Systems overview.pdf
Mission Systems overview.pdfPrestonJerry
 

Similar to AIS Exposed: New vulnerabilities and attacks. (HITB AMS 2014) (20)

Automatic-identification system gr1.pptx
Automatic-identification system gr1.pptxAutomatic-identification system gr1.pptx
Automatic-identification system gr1.pptx
 
presentations-amp_imo_presentation
presentations-amp_imo_presentationpresentations-amp_imo_presentation
presentations-amp_imo_presentation
 
Maritime cyber security threats & consequence part 2
Maritime cyber security  threats & consequence part 2Maritime cyber security  threats & consequence part 2
Maritime cyber security threats & consequence part 2
 
ΕΛΙΣΜΕ ΓΕΕΘΑ 20181127 2.2 Δημήτρης Παπαγεωργίου «Χρήση ΜΕΣ από τις Ε.Δ. και τ...
ΕΛΙΣΜΕ ΓΕΕΘΑ 20181127 2.2 Δημήτρης Παπαγεωργίου «Χρήση ΜΕΣ από τις Ε.Δ. και τ...ΕΛΙΣΜΕ ΓΕΕΘΑ 20181127 2.2 Δημήτρης Παπαγεωργίου «Χρήση ΜΕΣ από τις Ε.Δ. και τ...
ΕΛΙΣΜΕ ΓΕΕΘΑ 20181127 2.2 Δημήτρης Παπαγεωργίου «Χρήση ΜΕΣ από τις Ε.Δ. και τ...
 
"Galileo-EGNOS as an Asset for UTM and Security", por Ángel Rodríguez - Unive...
"Galileo-EGNOS as an Asset for UTM and Security", por Ángel Rodríguez - Unive..."Galileo-EGNOS as an Asset for UTM and Security", por Ángel Rodríguez - Unive...
"Galileo-EGNOS as an Asset for UTM and Security", por Ángel Rodríguez - Unive...
 
The Pegasus Mission - The Making of Pegasus II
The Pegasus Mission - The Making of Pegasus IIThe Pegasus Mission - The Making of Pegasus II
The Pegasus Mission - The Making of Pegasus II
 
IRJET- Development of Fishermen Border Alert and Speed Reduction System using...
IRJET- Development of Fishermen Border Alert and Speed Reduction System using...IRJET- Development of Fishermen Border Alert and Speed Reduction System using...
IRJET- Development of Fishermen Border Alert and Speed Reduction System using...
 
Dfrc perseus
Dfrc perseusDfrc perseus
Dfrc perseus
 
5.Secured By Cargo Tra#Aa847
5.Secured By Cargo Tra#Aa8475.Secured By Cargo Tra#Aa847
5.Secured By Cargo Tra#Aa847
 
EGNSS for robots - GSA special prize
EGNSS for robots - GSA special prizeEGNSS for robots - GSA special prize
EGNSS for robots - GSA special prize
 
20th kabandconference 2014_lisi_v03
20th kabandconference 2014_lisi_v0320th kabandconference 2014_lisi_v03
20th kabandconference 2014_lisi_v03
 
GLONASS and GSM based Vehicle Tracking System
GLONASS and GSM based Vehicle Tracking SystemGLONASS and GSM based Vehicle Tracking System
GLONASS and GSM based Vehicle Tracking System
 
VESSEL TRAFFIC MANAGEMENT SYSTEM
VESSEL TRAFFIC MANAGEMENT SYSTEMVESSEL TRAFFIC MANAGEMENT SYSTEM
VESSEL TRAFFIC MANAGEMENT SYSTEM
 
Lecture maritime ict - salwa
Lecture   maritime ict - salwaLecture   maritime ict - salwa
Lecture maritime ict - salwa
 
Mini RadaScan Brochure
Mini RadaScan BrochureMini RadaScan Brochure
Mini RadaScan Brochure
 
Skoltech fss workshop2014_lisi_v01
Skoltech fss workshop2014_lisi_v01Skoltech fss workshop2014_lisi_v01
Skoltech fss workshop2014_lisi_v01
 
Accessing new tech. trends for the rapid tactical command rtc.
Accessing new tech. trends for the rapid tactical command   rtc.Accessing new tech. trends for the rapid tactical command   rtc.
Accessing new tech. trends for the rapid tactical command rtc.
 
AUV based on EL - Copy
AUV based on EL - CopyAUV based on EL - Copy
AUV based on EL - Copy
 
INMARSAT - I SSPI Day 2017
INMARSAT - I SSPI Day 2017INMARSAT - I SSPI Day 2017
INMARSAT - I SSPI Day 2017
 
Mission Systems overview.pdf
Mission Systems overview.pdfMission Systems overview.pdf
Mission Systems overview.pdf
 

More from Trend Micro

Industrial Remote Controllers Safety, Security, Vulnerabilities
Industrial Remote Controllers Safety, Security, VulnerabilitiesIndustrial Remote Controllers Safety, Security, Vulnerabilities
Industrial Remote Controllers Safety, Security, VulnerabilitiesTrend Micro
 
Investigating Web Defacement Campaigns at Large
Investigating Web Defacement Campaigns at LargeInvestigating Web Defacement Campaigns at Large
Investigating Web Defacement Campaigns at LargeTrend Micro
 
Behind the scene of malware operators. Insights and countermeasures. CONFiden...
Behind the scene of malware operators. Insights and countermeasures. CONFiden...Behind the scene of malware operators. Insights and countermeasures. CONFiden...
Behind the scene of malware operators. Insights and countermeasures. CONFiden...Trend Micro
 
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...Trend Micro
 
Skip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSSkip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSTrend Micro
 
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Trend Micro
 
Mobile Telephony Threats in Asia
Mobile Telephony Threats in AsiaMobile Telephony Threats in Asia
Mobile Telephony Threats in AsiaTrend Micro
 
Cybercrime In The Deep Web
Cybercrime In The Deep WebCybercrime In The Deep Web
Cybercrime In The Deep WebTrend Micro
 
HBR APT framework
HBR APT frameworkHBR APT framework
HBR APT frameworkTrend Micro
 
Countering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep DiscoveryCountering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep DiscoveryTrend Micro
 
The Custom Defense Against Targeted Attacks
The Custom Defense Against Targeted AttacksThe Custom Defense Against Targeted Attacks
The Custom Defense Against Targeted AttacksTrend Micro
 
Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Trend Micro
 
[Case Study ~ 2011] Baptist Hospitals of Southest Texas
[Case Study ~ 2011] Baptist Hospitals of Southest Texas[Case Study ~ 2011] Baptist Hospitals of Southest Texas
[Case Study ~ 2011] Baptist Hospitals of Southest TexasTrend Micro
 
Who owns security in the cloud
Who owns security in the cloudWho owns security in the cloud
Who owns security in the cloudTrend Micro
 
Encryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security TechniquesEncryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security TechniquesTrend Micro
 
Threat predictions 2011
Threat predictions 2011 Threat predictions 2011
Threat predictions 2011 Trend Micro
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep securityTrend Micro
 
Assuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare deliveryAssuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare deliveryTrend Micro
 
Solutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryptionSolutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryptionTrend Micro
 
Security Best Practices for Health Information Exchange
Security Best Practices for Health Information ExchangeSecurity Best Practices for Health Information Exchange
Security Best Practices for Health Information ExchangeTrend Micro
 

More from Trend Micro (20)

Industrial Remote Controllers Safety, Security, Vulnerabilities
Industrial Remote Controllers Safety, Security, VulnerabilitiesIndustrial Remote Controllers Safety, Security, Vulnerabilities
Industrial Remote Controllers Safety, Security, Vulnerabilities
 
Investigating Web Defacement Campaigns at Large
Investigating Web Defacement Campaigns at LargeInvestigating Web Defacement Campaigns at Large
Investigating Web Defacement Campaigns at Large
 
Behind the scene of malware operators. Insights and countermeasures. CONFiden...
Behind the scene of malware operators. Insights and countermeasures. CONFiden...Behind the scene of malware operators. Insights and countermeasures. CONFiden...
Behind the scene of malware operators. Insights and countermeasures. CONFiden...
 
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...
 
Skip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSSkip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWS
 
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
 
Mobile Telephony Threats in Asia
Mobile Telephony Threats in AsiaMobile Telephony Threats in Asia
Mobile Telephony Threats in Asia
 
Cybercrime In The Deep Web
Cybercrime In The Deep WebCybercrime In The Deep Web
Cybercrime In The Deep Web
 
HBR APT framework
HBR APT frameworkHBR APT framework
HBR APT framework
 
Countering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep DiscoveryCountering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep Discovery
 
The Custom Defense Against Targeted Attacks
The Custom Defense Against Targeted AttacksThe Custom Defense Against Targeted Attacks
The Custom Defense Against Targeted Attacks
 
Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012
 
[Case Study ~ 2011] Baptist Hospitals of Southest Texas
[Case Study ~ 2011] Baptist Hospitals of Southest Texas[Case Study ~ 2011] Baptist Hospitals of Southest Texas
[Case Study ~ 2011] Baptist Hospitals of Southest Texas
 
Who owns security in the cloud
Who owns security in the cloudWho owns security in the cloud
Who owns security in the cloud
 
Encryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security TechniquesEncryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security Techniques
 
Threat predictions 2011
Threat predictions 2011 Threat predictions 2011
Threat predictions 2011
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep security
 
Assuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare deliveryAssuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare delivery
 
Solutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryptionSolutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryption
 
Security Best Practices for Health Information Exchange
Security Best Practices for Health Information ExchangeSecurity Best Practices for Health Information Exchange
Security Best Practices for Health Information Exchange
 

Recently uploaded

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 

Recently uploaded (20)

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 

AIS Exposed: New vulnerabilities and attacks. (HITB AMS 2014)

  • 1. AIS Exposed New Vulnerabilities and Attacks Marco Balduzzi & Alessandro Pasta (Kyle Wilhoit) [HITB AMS, 29 May 2014]
  • 2. Outline ● Balduzzi et al. , October 2013, HITB KUL ++
  • 3. 3 Automatic Identification System ● AIS, Automatic Identification System ● Tracking system for vessels – Ship-to-ship communication – From/to port authorities (VTS) ● Some applications: – Maritime security (piracy) – Collision avoidance – Search and rescue – Accident investigation – Binary messages, e.g. Weather forecasting
  • 4. 4 Required Installation ● Since 2002 ● Introduced to supplement existing safety systems, e.g. traditional radars ● Required on: – ANY International ship with gross tonnage of 300+ – ALL passenger ships regardless of size ● Estimated 400,000 installations ● Expected over a million
  • 5. 5
  • 6. 6 Data Exchange ● AIS messages are exchanged in two forms: ● Radio-frequency (VHF) – 162 ± 0.25 MHz ● Online AIS Providers
  • 7. 7 Online Providers ● Collect and visualize vessels information ● Data upstream via: – Mobile Apps, Software – Email – API – Radio-frequency gateways deployed regionally
  • 8. 8 Example – Port of AMS ● MarineTraffic.com
  • 9. 9 Example – RF Transponder ● OpenCPN Chart Plotter + AIS Transponder
  • 10. 10 Identified Threats ● Grouped in two macro categories ● 1. Implementation-specific = Online Providers [Software] VS ● 2. Protocol-specific = AIS Transponders [RF / VHF]
  • 11. 11 AIS Application Layer ● AIVDM messages, e.g.: – Position reports – Static reports – Management (channel...) – Safety-related (SART) ● NMEA sentences , as GPS !AIVDM,1,1,,B,177KQJ5000G?tO`K>RA1wUbN0TKH,0*5C TAG, FRAG_#, FRAG_ID, N/A, CHANNEL, PAYLOAD, PAD, CRC
  • 13. 13 Example ● Ship involved in Military Operations ● MMSI 247 320162 (Italy)
  • 14. 14 Spoofing – Online Providers ● Ships or Aids-to-Navigation
  • 15. 15 US to North Korea... What?! ● Wargames (1983) or cyberwar?
  • 16. 16 Programming a malicious route ● Tool to make a ship follow a path over time ● Programmed with Google Earth's KML/KMZ information
  • 18. 18 Example ● “Move” a real ship – Eleanor Gordon
  • 19. 19 Popping Up in Dallas?
  • 21. 21 AIS Communication over the Air ● Protocol designed in a “hardware-epoch” ● Hacking was difficult and cost expensive ● No authentication, no integrity check ● 2014 ● Craft AIS signals? ● Let's do it via software!
  • 22. 22 SDR – Software Defined Radio ● Many applications, e.g. Radio / TV receivers, 20 USD ● Radio amateurs, SDR transmitters ● Reduced costs ● Reduced complexity ● Increased flexibility ● Accessible by many, pirates included!
  • 24. 24 AIS Transmitter ● Built & implemented a software-based AIS transmitter ● GnuRadio, http://gnuradio.org/ ● Custom block: AIS Frame Builder [Ref, HITB KUL 2013]
  • 25. 25 RF Spoofing ● Radio-frequency (VHF) version of spoofing ● Setup : [Attacker] – [Victim] ● Amplifier : 20+ km (modified radio)
  • 27. 27 Injecting into legit AIS gateways
  • 28. 28 Man-in-water Spoofing ● Fake a "man-in-the-water" distress beacon ● Trigger SART (S.O.S.) alerts ● Visually and acoustically ● Lure a victim vessel into navigating to a hostile and attacker-controller sea space ● Mandatory by legislation
  • 30. 30 Frequency Hopping (DoS++) ● Disable AIS transponders ● Switch to non-default frequency (RX and TX) ● Single or multiple target(s) ● Program a desired targeted region – Geographically remote region applies as well ● For example: Pirates can render a ship “invisible” upon entering Somalia
  • 32. 32 CPA Alerting ● Fake a CPA alert, Closest Point of Approach ● Trigger a collision warning alert ● Possibly alter course
  • 35. 35 Slot Starvation (DoS++) ● Impersonate port authority ● Base station spoofing ● Book TDMA slots
  • 36. 36 Slot Starvation (DoS++) ● Base Station Spoofing
  • 37. 37 Slot Starvation (DoS++) ● Victim's Console
  • 38. 38 Timing Attack (DoS++) ● Instruct an AIS transponder to delay its transmission in time ● Default broadcast time: – Static reports = 6 min – Dynamic reports = 0.5 to 3 min (depending on speed) ● Attack code: –
  • 39. 39 Hardware Panic! (DoS) ● Flood the device... Noise on Channel + GPS
  • 40. 40 Back to the r00ts ● AIS = Attack Vector ● AIVDM messages are exchanged and processed at application layer by back-end software – In VTS server installations ● Binary message, special type used for – Crew members, Number of passengers – Environment information ● Malicious payloads, e.g. BOF, SQLi, …
  • 41. 41 Back to the r00ts ● SQL Error in back-end processing
  • 42. 42 Attacking D-GPS ● Differential Global Positioning System (D-GPS) ● Used by port authorities to increase the precision of traditional GPS (meters → centimeters) ● Attack = Spoof D-GPS beacons to force ships into calculating a wrong “GPS position”! ● Message 17: GNSS broadcast binary message
  • 43. 43 Attacking D-GPS ● Similar to “UT Austin Researchers Spoof Superyacht at Sea” – Monday, 29 July 2013
  • 44. 44 Responsible Disclosure ● Experiments conducted without interfering with existing systems – Messages with safety-implications tested only in lab environment (wired connections) ● We reached out the appropriate providers and authorities within time – MarineTraffic, AisHub, VesselFinder, ShipFinder – ITU-R, IALA, IMO, US Coast Guards
  • 45. 45 Proposed countermeasures ● Authentication – Ensure the transmitter is the owner (spoofing) ● Time Check – Avoid replay attack ● Integrity Monitoring – Tamper checking of AIS message (hijacking) ● Validity Check on Data Context – E.g., Geographical information
  • 46. 46 Take Home ● AIS is widely used – Mandatory installation ● AIS is a major technology in marine safety ● AIS is broken at implementation-level ● AIS is broken at protocol-level ● We hope that our work will help in raising the issue and enhancing the existing situation!
  • 47. 47 Thanks! ● Dr. Marco Balduzzi – @embyte ● Alessandro Pasta – @aka_pastus
  • 48. 48 Bonus ;-) ● Real-World Experiment ● Simulate the operational conditions of an attacker at sea ● Coverage experiment ● Target: AIS Gateway Installation ● No time for demo video. Visit me offline