622
collection by AI tools can conflict with privacy and
ethical standards.
5 CONCLUSION
AI is a transformative technology with the power to
both greatly enhance and undermine maritime
cybersecurity. On one side, we see that AI can
empower attackers – enabling more sophisticated
phishing, automating the discovery of vulnerabilities,
and evading traditional defenses at a scale and speed
previously unattainable. On the other side, AI offers
defenders advanced tools to monitor complex
maritime systems, detect anomalies in real time, and
coordinate responses to incidents across global fleets.
This dual-use characteristic of AI means that the
maritime industry must adopt a balanced, vigilant
approach to integration of AI into its cyber
infrastructure 52 . Stakeholders should neither blindly
trust AI nor dismiss it; instead, they must actively
shape its use through rigorous testing, clear policies,
and continuous learning.
As maritime organizations accelerate adoption of
AI-driven automation in navigation, cargo
management, and logistics, they must simultaneously
recognize and mitigate the new cyber risks that
accompany these innovations. The lessons from recent
incidents – from AI-crafted phishing campaigns to the
GPS spoofing that led to a grounding – underscore that
cybersecurity can no longer be an afterthought. AI
itself can become a target, and its failure modes need to
be well understood. Therefore, building resilience is
paramount. This includes investing in resilient AI
(robust to attacks and errors), training personnel to
work effectively with AI systems, and collaborating
internationally to create standards and share threat
intelligence.
In conclusion, AI will undoubtedly play an
increasingly central role in the security of the “digital
seas.” If properly harnessed, AI can act as a force
multiplier for maritime cyber defense, offsetting the
asymmetry that often favors attackers. It can help
protect sprawling shipboard networks, complex port
operations, and critical maritime supply chains by
providing faster-than-human threat detection and
decision support. However, realizing this potential
requires carefully navigating the challenges – technical,
organizational, and ethical – outlined in this paper. The
maritime sector must be proactive in addressing AI’s
vulnerabilities (such as adversarial threats and data
issues) and in implementing the strategies for
resilience (digital twins, deception, adversarial
training, etc.). By doing so, and by fostering a culture
of security innovation and cooperation, the industry
can confidently embrace AI as an ally rather than fear
it as a menace. In the age of digital seas, the winners
will be those who can sail with AI’s winds while
keeping a steady hand on the helm of cybersecurity.
FUNDING
This study was funded by the Gdynia Maritime University,
under the research project: WN/2025/PZ/07.
REFERENCES
[1] R. Fang, R. Bindu, A. Gupta, and D. Kang, “LLM Agents
can Autonomously Exploit One-day Vulnerabilities,”
Apr. 17, 2024, arXiv: arXiv:2404.08144. doi:
10.48550/arXiv.2404.08144.
[2] L. Wu, X. Zhong, J. Liu, and X. Wang, “PTGroup: An
Automated Penetration Testing Framework Using LLMs
and Multiple Prompt Chains,” in Advanced Intelligent
Computing Technology and Applications - 20th
International Conference, ICIC 2024, Tianjin, China,
August 5-8, 2024, Proceedings, Part IX, D.-S. Huang, W.
Chen, and J. Guo, Eds., in Lecture Notes in Computer
Science, vol. 14870. Springer, 2024, pp. 220–232. doi:
10.1007/978-981-97-5606-3_19.
[3] I. Durlik, T. Miller, E. Kostecka, and T. Tuński, “Artificial
Intelligence in Maritime Transportation: A
Comprehensive Review of Safety and Risk Management
Applications,” Appl. Sci., vol. 14, no. 18, Art. no. 18, Jan.
2024, doi: 10.3390/app14188420.
[4] A. Ergasheva, F. Akhmedov, A. Abdusalomov, and W.
Kim, “Advancing Maritime Safety: Early Detection of
Ship Fires through Computer Vision, Deep Learning
Approaches, and Histogram Equalization Techniques,”
Fire, vol. 7, p. 84, Mar. 2024, doi: 10.3390/fire7030084.
[5] E. Kovacs, “OpenAI Says Iranian Hackers Used ChatGPT
to Plan ICS Attacks,” SecurityWeek. Accessed: Jun. 10,
2025. [Online]. Available:
https://www.securityweek.com/openai-says-iranian-
hackers-used-chatgpt-to-plan-ics-attacks/
[6] “OpenAI details how threat actors are abusing ChatGPT
| TechTarget,” Search Security. Accessed: Jun. 10, 2025.
[Online]. Available:
https://www.techtarget.com/searchsecurity/news/366613
512/OpenAI-details-how-threat-actors-are-abusing-
ChatGPT
[7] J. Hazell, “Spear Phishing With Large Language Models,”
arXiv.org. Accessed: Jun. 10, 2025. [Online]. Available:
https://arxiv.org/abs/2305.06972v3
[8] F. Heiding, B. Schneier, A. Vishwanath, and J. Bernstein,
“Devising and Detecting Phishing: Large Language
Models vs. Smaller Human Models”.
[9] “AI-Powered Phishing Outperforms Elite Cybercriminals
in 2025 - Hoxhunt.” Accessed: Jun. 10, 2025. [Online].
Available: https://hoxhunt.com/blog/ai-powered-
phishing-vs-humans
[10] “Maritime needs to prepare for AI-assisted
cyberattacks.” Accessed: Jun. 29, 2025. [Online].
Available: https://mykn.kuehne-
nagel.com/news/article/maritime-needs-to-prepare-for-
aiassisted-cybe-02-Jun-2025
[11] J. Sims, “BlackMamba: Using AI to Generate
Polymorphic Malware.” Accessed: Jun. 10, 2025. [Online].
Available: https://www.hyas.com/blog/blackmamba-
using-ai-to-generate-polymorphic-malware
[12] M. Burgess, “Criminals Have Created Their Own
ChatGPT Clones,” Wired. Accessed: Jun. 10, 2025.
[Online]. Available:
https://www.wired.com/story/chatgpt-scams-fraudgpt-
wormgpt-crime/
[13] “2023 Cyber Trends and Insights in the Marine
Environment Report,” United States Coast Guard News.
Accessed: Jun. 29, 2025. [Online]. Available:
https://www.news.uscg.mil/maritime-
commons/Article/3750095/2023-cyber-trends-and-
insights-in-the-marine-environment-
report/https%3A%2F%2Fwww.news.uscg.mil%2Fmariti
me-commons%2FArticle%2F3750095%2F2023-cyber-
trends-and-insights-in-the-marine-environment-
report%2F
[14] “Coast Guard Cyber Command releases 2024 CTIME
report,” United States Coast Guard News. Accessed: Jul.
05, 2025. [Online]. Available:
https://www.news.uscg.mil/maritime-
commons/Article/4189739/coast-guard-cyber-command-