Man-in-the-Middle: The invisible intruder
Article 2 from the series "It’s a jungle out there: Navigating the digital danger zone"

Man-in-the-Middle (MitM) attacks occur in two stages. First, the attacker positions themselves between two communicating parties, such as a vessel and its shore control centre. This can be done by compromising a network, setting up a rogue Wi-Fi hotspot, or exploiting vulnerabilities in software or hardware.
Once in place, the attacker can intercept, read, and even alter the data being transmitted, before forwarding it to the intended recipient. This not only gives access to sensitive information but also enables manipulation of the communication itself.
Why it’s a serious threat:
In a maritime context, a MitM attack can alter navigational data, expose user credentials, and even interfere with automated processes. A 2013 incident attributed to Iranian hackers used this technique to make vessels appear at incorrect locations in tracking systems.
Examples from the industry:
- Crew connects to public Wi-Fi in port - an attacker silently intercepts passwords
- A platform uses an unencrypted remote desktop tool - communications are captured
- Automated data exchanges between a fleet monitoring system and a ship are altered without detection
How to protect against it:
- Use VPN and TLS/SSL encryption for all network traffic
- Implement a Zero Trust model - every connection must be authenticated
- Monitor network traffic in real time with Marlink’s External Attack Surface Management (EASM) solution to monitor for similar or squatted domains
MitM attacks are silent but highly effective. In a world where data is as vital as fuel, securing communication is a critical part of any cyber security strategy.
Get in touch
Contact us to find out how we can help you create new possibilities for your operations.
Insights
Read about our latest insights and explore the forefront of digital protection through our curated selection of news, articles, and expert blogs.









