Cyber Criminals Are Quick To Use ChatGPT 

ChatGPT has captured the Internet’s attention with millions using the technology to write poems, craft short stories, answer questions and even ask advice and now cyber criminals have begun using OpenAI’s artificially intelligent chatbot ChatGPT to quickly construct hacking tools. 

Norton has released its quarterly Consumer Cyber Safety Pulse Report which observes that cyber criminals have extended  the use of ChatGPT to create deepfake chatbots, phishing campaigns and malware.

OpenAI, a private company backed by Microsoft, made it available to the public for free in November. In addition to writing lures, ChatGPT can also generate code. 

Nortons research team have examined how cyber criminals can use artificial intelligence to create realistic and sophisticated threats. The latest report includes an analysis of how large language models can enhance criminal tactics. Amongst other exploits, cyber criminals are using  ChatGPT to generate malicious threats through its impressive ability to generate human-like text that adapts to different languages and audiences and in tis way criminals can quickly and easily craft email or social media phishing lures that are even more convincing, making it more difficult to tell what’s legitimate and what’s a threat.

ChatGPT can generate articles, essays, jokes, poetry and job applications in response to text prompts. It can respond to questions in a human-like manner and understand the context of follow-up queries much like in human conversations, as well as being able to compose longform pieces of writing if asked. 

Just as ChatGPT makes developers’ lives easier with its ability to write and translate source code, it can also make cyber criminals’ lives easier by making scams faster to create and more difficult to detect.

“I’m excited about large language models like ChatGPT, however, I’m also wary of how cyber criminals can abuse it...  We know cybercriminals adapt quickly to the latest technology, and we’re seeing that ChatGPT can be used to quickly and easily create convincing threats," Kevin Roundy, Senior Technical Director of Nortonn said.

As well as using ChatGPT for effective phishing, criminals can also use it to create deepfake chatbots which   can impersonate humans or legitimate sources, like a bank or government entity, to manipulate victims into disclosing personal information to gain access to sensitive information, steal money or commit fraud.

Norton's advice is to be suspicious and extremely cautious when engaging with unknown sources of possible risk: 

  • Avoid chatbots that don’t appear on a company’s website or app and being cautious of providing any personal information to someone you’re chatting with online
  • Take a moment to think before you click on links in response to unsolicited phone calls, emails or messages.
  • Update your security measures to make sure you have a  a leyer of security that goes beyond known malware recognition, such as behaviour detection and blocking.

The latest Pulse Report also revealed that throughout 2022, Norton thwarted over 3.5 billion threats, or around 9.6 million threats per day. In 2022, Norton blocked 90.9 million phishing attempts, 260.4 million file threats, 1.6 million mobile threats, 274 thousand ransomware attacks. Norton AntiTrack blocked over 3 billion trackers and fingerprinting scripts. In the last quarter alone, Norton blocked over 787.7 million threats, or around 8.5 million threats per day. From October through December 2022, Norton blocked 27 million phishing attempts, 49.4 million file threats, 770 thousand mobile threats, 46 thousand ransomware attacks. Norton AntiTrack blocked over 1 billion trackers and fingerprinting scripts.

OpenAI has put certain filters in place to prevent obvious requests for ChatGPT to construct malware with policy violation notifications, but hackers have already found ways around those safeguards. 

Techguide:    NZHerald:     Guardian:    Business Insider:     Forbes:    Analytic Insight:   ITBrief:     

You Might Also Read:

The Latest Artificial Intelligence Technologies:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« New US National Cyber Security Strategy
Detecting Digital Injection To Counter Deepfake Biometric Fraud  »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Acumin

Acumin

Acumin is an internationally established Cyber Security recruitment specialist.

it-sa 365

it-sa 365

it-sa 365 is a digital platform for connecting IT security vendors and experts with those who bear responsibility for IT security in management and technology.

Cyberlytic

Cyberlytic

Cyberlytic applies artificial intelligence to combat the most sophisticated of web application threats, addressing the growing problem of high volumes of threat data.

ACID Technologies

ACID Technologies

ACID provide a supplementary layer of protection by performing searches to detect potential threats and risks before actual attacks commence.

Allgress

Allgress

Allgress solutions converge disparate risk silos across enterprise networks and automate governance, risk and compliance management processes.

Maverick Technologies

Maverick Technologies

Maverick is an industrial automation, enterprise integration and operational consulting company. Services include industrial cyber security.

SQN Banking Systems

SQN Banking Systems

SQN Banking Systems fraud detection software products are a critical step towards overcoming the growing problem of fraud across the various payment channels.

Secure Code Warrior

Secure Code Warrior

Secure your code from the start with gamified, scalable online secure coding training for software developers.

AnChain.AI

AnChain.AI

AnChain.AI's analytics platform proactively protects crypto assets by providing proprietary artificial intelligence, knowledge graphs, and threat intelligence on blockchain transactions.

Zerodium

Zerodium

Zerodium is the leading exploit acquisition platform for premium zero-days and advanced cybersecurity research.

Next Horizon

Next Horizon

In the Next Horizon incubator, new disruptive models are being developed in Industry 4.0, Automated Driving and Internet-of-Things.

Boeing

Boeing

Boeing is the world's largest aerospace company and leading manufacturer of commercial jetliners, defense, space and security systems.

Axio Global

Axio Global

Axio is a leading cyber risk management SaaS company. Our Axio360 platform gives companies visibility to their cyber risk, and enables them to prioritize investments to protect their business.

Code Intelligence

Code Intelligence

Code Intelligence offers a platform for automated software security testing to help developers make their software more robust and secure.

Stronghold Cyber Security

Stronghold Cyber Security

Stronghold Cyber Security is a consulting company that specializes in NIST 800, the Cybersecurity Framework and the Cybersecurity Maturity Model Certification.

Chainguard

Chainguard

Founded by the industry's leading experts on open source software, security and cloud native development, Chainguard are on a mission to make the software supply chain secure by default.