IDEAS home Printed from https://ideas.repec.org/a/pal/marecl/v26y2024i1d10.1057_s41278-023-00276-8.html
   My bibliography  Save this article

Port cyberattacks from 2011 to 2023: a literature review and discussion of selected cases

Author

Listed:
  • Chalermpong Senarak

    (International Academy of Aviation Industry, King Mongkut’s Institute of Technology Ladkrabang)

Abstract

Cyberattacks pose a significant threat to seaports worldwide. While numerous scholars have endeavored to address these threats, their findings are often limited in practicality, applying to only a few ports. This paper aims to contribute to the extant literature by presenting and discussing 15 case studies of port cyberattacks that occurred from 2011 to 2023. These cases encompass six instances in Europe, six in America, two in Asia, and one in Africa. The study employs a twofold methodology, consisting of a comprehensive literature review and a personal assessment. Several key insights emerge. First, two primary motivations drive port cyberattacks: (a) the demand for ransom payments and (b) the desire to cause severe disruptions. Second, ransomware was the most common threat used to extort payments, followed by malware and DDoS attacks, which aimed to inflict operational disruption. Third, weaknesses in cybersecurity procedures and a lack of awareness among staff members emerged as significant contributors to cyber vulnerabilities. Forth, ports that quickly detected threats and implemented response measures were able to minimize operational impacts, ensuring the swift resumption of services and the maintenance of service continuity. Fifth, collaborative efforts with external partners and officials expedited response and recovery processes by facilitating threat investigation and solution identification. In light of these findings, it becomes imperative for all ports to develop comprehensive cyber disaster management plans, covering four key phases: preparedness, response, recovery, and mitigation. These plans should encompass three critical aspects of cybersecurity hygiene: human factors, procedural improvements, and infrastructure enhancements. Such practices are instrumental in bolstering a port’s resilience and mitigating the risks associated with cyberattacks.

Suggested Citation

  • Chalermpong Senarak, 2024. "Port cyberattacks from 2011 to 2023: a literature review and discussion of selected cases," Maritime Economics & Logistics, Palgrave Macmillan;International Association of Maritime Economists (IAME), vol. 26(1), pages 105-130, March.
  • Handle: RePEc:pal:marecl:v:26:y:2024:i:1:d:10.1057_s41278-023-00276-8
    DOI: 10.1057/s41278-023-00276-8
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1057/s41278-023-00276-8
    File Function: Abstract
    Download Restriction: Access to full text is restricted to subscribers.

    File URL: https://libkey.io/10.1057/s41278-023-00276-8?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Roach, J. Ashley, 2004. "Initiatives to enhance maritime security at sea," Marine Policy, Elsevier, vol. 28(1), pages 41-66, January.
    2. Neil Adams & Richard Chisnall & Christopher Pickering & Stefan Schauer & Rafael Company Peris & Ioannis Papagiannopoulos, 2021. "Guidance for ports: security and safety against physical, cyber and hybrid threats," Journal of Transportation Security, Springer, vol. 14(3), pages 197-225, December.
    3. Papa, Paola, 2013. "US and EU strategies for maritime transport security: A comparative perspective," Transport Policy, Elsevier, vol. 28(C), pages 75-85.
    4. Lauren R. Shapiro & Marie-Helen Maras & Lucia Velotti & Susan Pickman & Hung-Lung Wei & Robert Till, 2018. "Trojan horse risks in the maritime transportation systems sector," Journal of Transportation Security, Springer, vol. 11(3), pages 65-83, December.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Bolbot, Victor & Kulkarni, Ketki & Brunou, Päivi & Banda, Osiris Valdez & Musharraf, Mashrura, 2022. "Developments and research directions in maritime cybersecurity: A systematic literature review and bibliometric analysis," International Journal of Critical Infrastructure Protection, Elsevier, vol. 39(C).
    2. Viljoen, Nadia M. & Joubert, Johan W., 2016. "The vulnerability of the global container shipping network to targeted link disruption," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 462(C), pages 396-409.
    3. Yeo, Gi-Tae & Pak, Ji-Yeong & Yang, Zaili, 2013. "Analysis of dynamic effects on seaports adopting port security policy," Transportation Research Part A: Policy and Practice, Elsevier, vol. 49(C), pages 285-301.
    4. Alexandru VOICU & Ruxandra-Laura BOSILCA, 2015. "Maritime Security Governance In The Fight Against Piracy Off The Coast Of Somalia: A Focus On The Eu Response," EURINT, Centre for European Studies, Alexandru Ioan Cuza University, vol. 2, pages 371-386.
    5. Yin, Yuwei & Lam, Jasmine Siu Lee, 2022. "Impacts of energy transition on Liquefied Natural Gas shipping: A case study of China and its strategies," Transport Policy, Elsevier, vol. 115(C), pages 262-274.
    6. Bueger, Christian, 2015. "What is maritime security?," Marine Policy, Elsevier, vol. 53(C), pages 159-164.
    7. Constantin ANGHELACHE & Madalina-Gabriela ANGHEL & Radu Titus MARINESCU & Aurelian DIACONU, 2017. "Analysis Of The Evolution Transport Perspective In The European Union States Members," Romanian Statistical Review Supplement, Romanian Statistical Review, vol. 65(8), pages 102-111, August.
    8. Chen, Hong & Lam, Jasmine Siu Lee & Liu, Nan, 2018. "Strategic investment in enhancing port–hinterland container transportation network resilience: A network game theory approach," Transportation Research Part B: Methodological, Elsevier, vol. 111(C), pages 83-112.
    9. Urciuoli, Luca, 2016. "What are the causes of transport insecurity? Results from a survey with transport operators," Transport Policy, Elsevier, vol. 47(C), pages 189-202.
    10. Jade Lindley, 2020. "Criminal Threats Undermining Indo-Pacific Maritime Security: Can International Law Build Resilience?," Journal of Asian Economic Integration, , vol. 2(2), pages 206-220, September.
    11. Boris Svilicic & Miho Kristić & Srđan Žuškin & David Brčić, 2020. "Paperless ship navigation: cyber security weaknesses," Journal of Transportation Security, Springer, vol. 13(3), pages 203-214, December.
    12. Ahokas, Jenna & Kiiski, Tuomas & Malmsten, Jarmo & Ojala, Lauri M., 2017. "Cybersecurity in ports: A conceptual approach," Chapters from the Proceedings of the Hamburg International Conference of Logistics (HICL), in: Kersten, Wolfgang & Blecker, Thorsten & Ringle, Christian M. (ed.), Digitalization in Supply Chain Management and Logistics: Smart and Digital Solutions for an Industry 4.0 Environment. Proceedings of the Hamburg Inter, volume 23, pages 343-359, Hamburg University of Technology (TUHH), Institute of Business Logistics and General Management.
    13. Olaf Jonkeren & Piet Rietveld, 2016. "Protection of Critical Waterborne Transport Infrastructures: An Economic Review," Transport Reviews, Taylor & Francis Journals, vol. 36(4), pages 437-453, July.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:pal:marecl:v:26:y:2024:i:1:d:10.1057_s41278-023-00276-8. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.palgrave-journals.com/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.