Hackers Are Spoofing Ship GPS and Its Getting Worse

Maritime cybersecurity has gotten complicated with all the GPS spoofing incidents, network vulnerabilities, and ransomware threats flying around. As someone who’s tracked these attacks since they started making headlines, I learned everything there is to know about why hackers have noticed that modern ships are floating computer networks. Today, I will share it all with you.

GPS Spoofing: Fake Signals, Real Danger

GPS spoofing involves broadcasting false satellite signals that trick ship navigation systems into displaying incorrect positions. Unlike jamming, which simply blocks GPS, spoofing is insidious because crews may not realize their displayed position is wrong. Probably should have led with this — its the sneaky nature that makes spoofing dangerous.

Incidents have clustered in the Black Sea, Eastern Mediterranean, and Persian Gulf. Ships have reported their navigation systems showing them miles from their actual position, or even apparently on land. In congested waterways, such errors could cause collisions or groundings.

Notable Maritime Cyber Attacks

The 2017 NotPetya attack devastated Maersk, the worlds largest container shipping company. The malware encrypted critical systems, forcing the company to reinstall 45,000 PCs and 4,000 servers. Operations across 76 ports ground to a halt. Maersk estimated losses at $300 million.

Thats what makes maritime cyber attacks different from typical IT incidents — the physical operations of global shipping stop when systems go down.

In 2020, the International Maritime Organization suffered a cyberattack that took down the UN agencys website and internal systems for days. Port facilities from South Africa to Australia have faced ransomware demands.

Vulnerable Systems Aboard Ships

Modern vessels contain dozens of networked systems that could be compromised:

  • Electronic Chart Display and Information Systems (ECDIS)
  • Automatic Identification Systems (AIS)
  • Engine control and monitoring systems
  • Cargo management systems
  • Ballast water management systems
  • Satellite communication systems

Many of these systems were designed for operational efficiency, not security. They run on outdated operating systems, share networks with crew entertainment systems, and connect to shore-side management platforms. Every connection point is a potential vulnerability.

What Ship Operators Should Do

IMO now requires cyber risk management as part of safety management systems. Operators should segment networks to isolate critical navigation and engine systems from less secure crew networks. Regular software updates, access controls, and crew training on phishing and social engineering all reduce risk.

The threat is growing because the maritime industry was slow to recognize it. Ships built even a decade ago werent designed with cybersecurity in mind. Retrofitting security onto legacy systems is expensive and imperfect, but the alternative is waiting for the next major attack.

Captain Tom Bradley

Captain Tom Bradley

Author & Expert

Captain Tom Bradley is a USCG-licensed 100-ton Master with 30 years of experience on the water. He has sailed across the Atlantic twice, delivered yachts throughout the Caribbean, and currently operates a marine surveying business. Tom holds certifications from the American Boat and Yacht Council and writes about boat systems, maintenance, and seamanship.

40 Articles
View All Posts