Cyber Affairs
No Result
View All Result
  • Login
  • Register
[gtranslate]
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
Social icon element need JNews Essential plugin to be activated.
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Hackers Using ChatGPT to Generate Malware & Social Engineering Threats

admin by admin
Sep 7, 2023
in News
A A
0

Large language models (LLMs) and generative AI are rapidly advancing globally, offering great utility but also raising misuse concerns.

The rapid modernization of generative AI and its AI counterparts will transform the complete future of cybersecurity threats significantly. However, besides its potential risks, it’s also important to appreciate the value of generative AI in legitimate applications.

Cybersecurity researchers at the Threat Intelligence Team of Avast recently reported that hackers are actively abusing ChatGPT to generate malware and social engineering threats.

Hackers Abusing ChatGPT

In recent times, AI-driven scams have been on the rise, making it easier for cybercriminals or threat actors to craft convincing lures like:-

  • Emails
  • Social scams
  • E-shop reviews
  • SMS scams
  • Lottery scam emails

Rising threats use advanced tech, and this scenario is reshaping the battlefield of AI technologies, mirroring abuses in areas like-

  • Cryptocurrencies
  • Covid-19
  • Ukraine conflict

ChatGPT’s fame attracts hackers more for its fame than AI conspiracy, making it mature for exploration in their works.

Currently, ChatGPT isn’t an all-in-one tool for advanced phishing attacks. Attackers often require templates, kits, and manual work to make their attempts convincing. Multi-type models, like LlamaIndex, could enhance future phishing and scam campaigns with varied content.

TTPs & Mediums

Here below, we have mentioned all the TTPs and mediums used by the threat actors to abuse the ChatGPT:-

  • Malvertising
  • YouTube scams
  • Typosquatting
  • Browser Extensions
  • Installers
  • Cracks
  • Fake updates

LLMs for Malware and Social Engineering Threats

LLMs simplify malicious code generation, but some expertise is still needed. Specialized malware tools can complicate the process by evading security measures.

Creating LLM malware prompts demands precision and technical expertise, with restrictions on prompt length and security filters limiting complexity.

AI tech has transformed spam tactics significantly, with spambots unwittingly revealing themselves by sharing ChatGPT’s error messages, highlighting their presence.

Notably, spambots now exploit user reviews by copying ChatGPT responses, aiming to boost feedback and product ratings deceptively.

This highlights the need for vigilance in digital interactions as manipulated reviews mislead consumers into purchasing lower-quality products.

Bad actors can circumvent ChatGPT’s filters, but it’s time-consuming. They often resort to traditional search engines or available educational-use-only malware on GitHub.

Besides this, the Deepfakes are powered by AI, which poses significant threats, fabricating convincing videos and causing damage to reputations, public trust, and even personal security.

Positive Scenario

Security analysts can employ ChatGPT to generate detection rules or clarify existing ones, aiding both beginners and experienced analysts in enhancing pattern detection tools like:- 

Yara rule template (Source – Avast)

AI-based assistant tools

There are several projects that integrate LLM-based AI assistants, enhancing productivity across various tasks, from office work to technical work.

AI assistants aid malware analysts by simplifying assembly comprehension, disassembling code analysis, and debugging, streamlining reverse engineering efforts.

Here below, we have mentioned the known AI-based assistant tools:-

  • Gepetto for IDA Pro
  • VulChatGPT
  • Windbg Copilot
  • GitHub Copilot
  • Microsoft Security Copilot
  • PentestGPT
  • BurpGPT

Recommendations

Here below, we have mentioned all the recommendations offered by the security researchers:-

  • Be cautious of unbelievable offers.
  • Make sure to verify the publisher and reviews.
  • Always understand your desired product.
  • Don’t use cracked software.
  • Report suspicious activity.
  • Update your software regularly.
  • Trust your cybersecurity provider.
  • Self-education is crucial.

Keep informed about the latest Cyber Security News by following us on Google News, Linkedin, Twitter, and Facebook.

Related Read



Read the full article here

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

[mc4wp_form id=”387″]

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

[mc4wp_form id=”387″]

Social icon element need JNews Essential plugin to be activated.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.