Cyber Affairs
No Result
View All Result
  • Login
  • Register
[gtranslate]
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
Social icon element need JNews Essential plugin to be activated.
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

3000+ Posts on Dark Web to Use ChatGPT for Illegal Purposes

admin by admin
Jan 25, 2024
in News
A A
0

For the multitude of malicious activities, threat actors could exploit ChatGPT due to its conversational abilities, such as generating convincing phishing messages, crafting sophisticated social engineering attacks, and automating the production of misleading content.

Hackers can exploit the capacity of the model to understand and generate human-like text to trick users and automate fraudulent schemes, which makes it an attractive tool for them.

Kaspersky’s Digital Footprint Intelligence service recently discovered more than 3000 discussions on Dark Web posts to use ChatGPT for illicit purposes.

Document

Run Free ThreatScan on Your Mailbox

Trustifi’s Advanced threat protection prevents the widest spectrum of sophisticated attacks before they reach a user’s mailbox. Try Trustifi Free Threat Scan with Sophisticated AI-Powered Email Protection .


Spike in Discussions Regarding the Illegal use of ChatGPT

Researchers noted a significant rise in Dark Web discussions on misusing ChatGPT. From January to December 2023, threat actors discussed using ChatGPT for illegal activities, like creating polymorphic malware to evade detection. 

One suggestion involved using the OpenAI API to generate malicious code through a legitimate domain that poses a security threat. However, no such malware has been detected yet by security analysts, but it could emerge later.

Polymorphic malicious code (Source - Kaspersky)
Polymorphic malicious code (Source – Kaspersky)

Threat actors commonly leverage ChatGPT for malicious purposes by using AI to tackle challenges like processing user data dumps. 

Even tasks requiring expertise are simplified with ChatGPT’s generated answers which lowers the entry barriers into various fields, including criminal ones. This trend may escalate potential attacks, as even beginners can also perform actions that once demanded experienced teams. 

An example involves a user seeking a team for carding and engaging in illegal activities, mentioning the active use of AI in code writing, particularly for parsing malware log files. This ease of use poses risks in multiple domains.

Several types of ChatGPT-like tools were integrated by the cybercriminal forums for standard tasks. Threat actors use tailored prompts which are known as jailbreaks to unlock additional functionalities. 

In 2023, 249 offers to sell these prompt sets were found, and some users collected the prompt sets, but not all are intended for illegal actions. The AI developers aim to limit harmful content but may unintentionally provide sensitive information.

GitHub hosts open-source tools for obfuscating PowerShell code, used by cybersecurity experts and attackers. Kaspersky found a cybercrime forum post sharing the utility for malicious purposes. 

Legitimate utilities are shared for research, but the ease of access can attract cyber criminals. Projects like WormGPT, XXXGPT, and FraudGPT, ChatGPT analogs without limitations which raise serious concerns. 

WormGPT faced community backlash and shut down, but fake ads offering access persist. These phishing pages falsely claim trial versions, demanding payment in various methods. However, despite the project closure, the developers warned against the scams.

WormGPT leads among projects like xxxGPT, WolfGPT, FraudGPT, and DarkBERT. A demo of xxxGPT allows custom prompts that generate code for threats like keyloggers. 

Despite the simplicity, the ease of generating malicious code raises alarms. Besides this, the stolen ChatGPT accounts flood the market, obtained from malware log files or hacked premium accounts. 

Sellers advise to not alter any details for persistent and undetected use. Automated accounts with API limits are sold in bundles that facilitate quick switches after bans for malicious activity.

Read the full article here

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

[mc4wp_form id=”387″]

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

[mc4wp_form id=”387″]

Social icon element need JNews Essential plugin to be activated.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.