Opinion Technology
November 03, 2023

Cybercriminals Using LLM Chatbots For Phishing: How Generative AI Can Counteract It

In Brief

Since the introduction of ChatGPT in late 2022, a significant surge in malicious phishing emails has been observed, with 1,265% increase.

Cybercriminals Using LLM Chatbots For Phishing: How Generative AI Can Counteract It

Some of the most common users of large language model (LLM) chatbots are cybercriminals, reveals real-time threat intelligence provider SlashNext report. But, what exactly is the purpose of using LLM chatbots?

According to the report titled ‘The State of Phishing 2023’ cybercriminals are leveraging the tool to help write business email compromise (BEC) attacks and systematically launch highly targeted phishing attacks.

Since the introduction of OpenAI’s ChatGPT in late 2022, a significant surge in malicious phishing emails has been observed, with a staggering 1,265% increase.

Notably, 68% of these phishing emails employ text-based Business Email Compromise (BEC) tactics. This alarming trend underscores growing apprehensions regarding the role of chatbots and jailbreaks in facilitating a rapid proliferation of phishing attacks by enabling cybercriminals to launch highly sophisticated and swift offensives.

When asked, 40% of the respondents (cybersecurity professionals) indicated that they currently employ ChatGPT for composing emails, both for personal and professional use-cases.

It is unsurprising that this utilization extends to cybercriminals, as email composition is one of the most prevalent applications of ChatGPT for hackers. Cyber attackers exploit ChatGPT’s capabilities to aid in crafting Business Email Compromise (BEC) attacks and orchestrating meticulously targeted phishing campaigns.

Bypassing ChatGPT Like Chatbots – Not a Complex Task

While AI chatbots like ChatGPT possess extensive knowledge and can generate text on a wide range of topics, they are subject to certain restrictions to prevent various issues.

These restrictions are in place due to the nature of their training data and the potential for harmful or inappropriate responses. This article explores why ChatGPT is restricted, and it provides techniques to work around these limitations.

However, by framing questions with context, avoiding problematic phrases, and addressing scenarios from a third-person perspective, users can often get more helpful responses. Additionally, users can bypass character limits by asking for smaller portions of text at a time.

Can Generative AI Be the Rescue Hero?

In a rapidly evolving digital landscape, the confluence of AI’s malicious potential and the changing dynamics of remote and hybrid work environments has raised concerns about the escalating risk of cyberattacks.

With employees dispersed across multiple devices and communication channels, organizations are increasingly vulnerable to security breaches. To counter this threat, there is a growing demand for generative AI security solutions designed to protect against advanced cyberattacks such as Business Email Compromise (BEC), supply chain attacks, executive impersonation, and financial fraud.

Generative AI security solutions are good at identifying threats that manipulate human emotions, leveraging tactics like fear or trust to prompt swift actions. By simulating these human emotions and behaviors in their detection process, generative AI security solutions provide a robust defense against the latest cyber threats.

One notable player in this field is SlashNext. The company’s technology is adept at detecting, predicting, and halting attacks such as spear phishing, BEC, and Smishing, all of which exploit zero-hour social engineering techniques. This advanced system operates seamlessly across email, mobile, and web messaging applications, offering a multi-pronged defense.

According to SlashNext, its solutions combine natural language processing, computer vision, machine learning, relationship graphs, and deep contextualization to counteract sophisticated multi-channel messaging attacks.

The company has the ability to anticipate a wide array of AI-generated BEC threats by employing AI data augmentation and cloning technologies.

This approach allows the system to assess core threats and generate numerous variations, effectively training itself to recognize and thwart potential risks, it added.

As organizations grapple with the ever-growing cybersecurity challenges posed by AI-driven threats, generative AI security solutions are invaluable allies in the quest to safeguard sensitive data and maintain digital integrity. The future of cybersecurity is increasingly reliant on these innovative technologies, ensuring that organizations can stay one step ahead of cybercriminals and emerging threats.

Disclaimer

In line with the Trust Project guidelines, please note that the information provided on this page is not intended to be and should not be interpreted as legal, tax, investment, financial, or any other form of advice. It is important to only invest what you can afford to lose and to seek independent financial advice if you have any doubts. For further information, we suggest referring to the terms and conditions as well as the help and support pages provided by the issuer or advertiser. MetaversePost is committed to accurate, unbiased reporting, but market conditions are subject to change without notice.

About The Author

Kumar is an experienced Tech Journalist with a specialization in the dynamic intersections of AI/ML, marketing technology, and emerging fields such as crypto, blockchain, and NFTs. With over 3 years of experience in the industry, Kumar has established a proven track record in crafting compelling narratives, conducting insightful interviews, and delivering comprehensive insights. Kumar's expertise lies in producing high-impact content, including articles, reports, and research publications for prominent industry platforms. With a unique skill set that combines technical knowledge and storytelling, Kumar excels at communicating complex technological concepts to diverse audiences in a clear and engaging manner.

More articles
Kumar Gandharv
Kumar Gandharv

Kumar is an experienced Tech Journalist with a specialization in the dynamic intersections of AI/ML, marketing technology, and emerging fields such as crypto, blockchain, and NFTs. With over 3 years of experience in the industry, Kumar has established a proven track record in crafting compelling narratives, conducting insightful interviews, and delivering comprehensive insights. Kumar's expertise lies in producing high-impact content, including articles, reports, and research publications for prominent industry platforms. With a unique skill set that combines technical knowledge and storytelling, Kumar excels at communicating complex technological concepts to diverse audiences in a clear and engaging manner.

Hot Stories
Join Our Newsletter.
Latest News

From Ripple to The Big Green DAO: How Cryptocurrency Projects Contribute to Charity

Let's explore initiatives harnessing the potential of digital currencies for charitable causes.

Know More

AlphaFold 3, Med-Gemini, and others: The Way AI Transforms Healthcare in 2024

AI manifests in various ways in healthcare, from uncovering new genetic correlations to empowering robotic surgical systems ...

Know More
Read More
Read more
QCP Capital Forecasts 25 Basis Points Rate Cut By Fed Tonight, Observes Decline In Liquidity Across Markets
Business Markets News Report Technology
QCP Capital Forecasts 25 Basis Points Rate Cut By Fed Tonight, Observes Decline In Liquidity Across Markets
December 18, 2024
Saga Mainnet 2.0 Is Now Live, Uniswap V3 Deployed On The Network
News Report Technology
Saga Mainnet 2.0 Is Now Live, Uniswap V3 Deployed On The Network
December 18, 2024
Hex Trust Introduces HT Markets MENA, Trailblazing Fiat On/Off-Ramp Services In Dubai
Business News Report Technology
Hex Trust Introduces HT Markets MENA, Trailblazing Fiat On/Off-Ramp Services In Dubai
December 18, 2024
Omni Core Mainnet Goes Live, Fostering More Unified Ethereum Ecosystem
News Report Technology
Omni Core Mainnet Goes Live, Fostering More Unified Ethereum Ecosystem
December 18, 2024