In a case raising alarms about maritime cybersecurity, French prosecutors have charged a Latvian crew member of an Italian-operated passenger ferry with installing remote-access malware on the vessel’s systems, allegedly at the behest of a foreign power. The incident, uncovered in the port of Sète on France’s Mediterranean coast, has triggered a high-stakes investigation by the country’s counterespionage agency, DGSI. Authorities arrested the suspect on December 16, followed by a second seafarer, amid fears the breach could have allowed remote control of critical ship functions.
The ferry, which shuttles passengers between France, Italy, and North Africa, was found infected with sophisticated remote-access tools capable of commandeering navigation, propulsion, and communication systems. French Interior Minister Bruno Retailleau confirmed the probe into “foreign interference,” stating the malware “could have enabled remote control of the ship.” This development, reported first by Bleeping Computer, underscores vulnerabilities in global shipping amid rising state-sponsored cyber threats.
Malware Discovery and Initial Response
Routine checks in Sète revealed the malware, prompting swift action from French cyber police. The primary suspect, a Latvian national whose identity remains undisclosed, faces charges of “attempting to attack an automated data processing system on behalf of a foreign power.” A judicial source told AFP the tool was a “remote access trojan” designed for persistent, undetected access. The Paris prosecutor’s office opened the case under Article 411-8 of the penal code, which covers intelligence-related offenses punishable by up to 10 years in prison.
The second arrest, detailed by Maritime Executive, involved another crew member suspected of complicity. Both remain in custody as DGSI analysts dissect the infection vector, believed to stem from a USB device or compromised onboard network. No ransom demand or data exfiltration has surfaced, pointing instead to espionage motives.
Technical Breakdown of the Breach
Experts describe the malware as a modular remote access trojan (RAT) with keylogging, screen capture, and command execution capabilities. According to The Cyber Express, it targeted the vessel’s integrated bridge systems, potentially exposing AIS transponders, ECDIS charts, and engine controls. “This wasn’t opportunistic hacking; it was targeted persistence,” said a cybersecurity analyst familiar with maritime threats, noting similarities to nation-state tools like those in Russia’s arsenal.
Ferry operator Corsica Linea, which runs the vessel, isolated affected systems and notified flag-state Italy and EU maritime authorities. The ship, unnamed publicly but identified in leaks as servicing the Sète-Palma-Malta route, resumed limited operations after forensic wipes. gCaptain reported the discovery stemmed from anomalous network traffic detected during a routine audit.
Foreign Power Suspicions Mount
France’s probe centers on potential ties to Russia, given the suspect’s Latvian origin and regional tensions. Retailleau told Europe 1 radio: “We are dealing with foreign interference, possibly from a state actor.” France 24 cited sources linking the operation to hybrid warfare tactics, echoing Baltic cable sabotage incidents. Latvia’s proximity to Russia fuels speculation, though no official attribution has been made.
Interpol and Europol have been looped in, with Italian authorities probing onboard logs. A DGSI spokesperson emphasized: “The goal was strategic access, not disruption.” Web searches reveal posts on X amplifying concerns, with users like @trtworld noting the Latvian’s charges and @newvisionwire quoting Retailleau directly, reflecting widespread industry buzz.
Maritime Sector’s Cyber Vulnerabilities Exposed
This breach highlights chronic weaknesses in shipping IT, where legacy systems mingle with IoT devices. The International Maritime Organization mandates cyber risk management since 2021, yet compliance lags. “Ferries are soft targets—high traffic, multinational crews, porous ports,” observed gCaptain. Recent attacks, like the 2021 Port of Houston ransomware, underscore the pattern.
Industry insiders point to crew vetting gaps; the Latvian joined via a third-party agency. ENISA’s 2024 maritime cyber report warns of insider threats, recommending air-gapped critical systems and behavioral analytics. Corsica Linea pledged enhanced screening, but executives privately fret over operational costs.
Geopolitical Ripples and Response Measures
EU officials are monitoring for copycat plots, with France pushing for NIS2 directive enforcement on ports. Retailleau announced bolstered port surveillance, including AI-driven anomaly detection. The U.S. Coast Guard echoed warnings via MARSEC advisories, urging vessel operators to segment networks.
As investigations deepen, questions swirl around the second arrestee’s role—possibly a spotter or handler. Prosecutors seek phone records and financial trails. Bleeping Computer updated its coverage with forensic details, revealing the RAT’s C2 servers traced to Eastern Europe proxies.
Industry Reforms on Horizon
Shipping giants like Maersk and MSC are reviewing protocols post-incident. BIMCO’s cyber committee calls for mandatory RAT scans at embarkation. “This elevates maritime cyber from IT issue to national security priority,” a Lloyd’s List analyst noted. France’s case could spur bilateral pacts with Italy and Latvia.
Detained suspects face preliminary hearings next week. If convicted, precedents like the 2023 Chinese spy balloon saga suggest lengthy sentences. The ferry saga serves as a stark reminder: in an era of hybrid threats, no vessel is an island.
