Skip to Content
logologo
AI Incident Database
Open TwitterOpen RSS FeedOpen FacebookOpen LinkedInOpen GitHub
Open Menu
Discover
Submit
  • Welcome to the AIID
  • Discover Incidents
  • Spatial View
  • Table View
  • List view
  • Entities
  • Taxonomies
  • Submit Incident Reports
  • Submission Leaderboard
  • Blog
  • AI News Digest
  • Risk Checklists
  • Random Incident
  • Sign Up
Collapse
Discover
Submit
  • Welcome to the AIID
  • Discover Incidents
  • Spatial View
  • Table View
  • List view
  • Entities
  • Taxonomies
  • Submit Incident Reports
  • Submission Leaderboard
  • Blog
  • AI News Digest
  • Risk Checklists
  • Random Incident
  • Sign Up
Collapse

Report 2493

Associated Incidents

Incident 44325 Report
ChatGPT Abused to Develop Malicious Softwares

Loading...
Malware with AI: online code generated with ChatGPT
punto-informatico.it · 2023

Check Point Software experts had tested the capabilities of ChatGPT in writing **malware **. A few weeks later, the first practical examples have already been published on a well-known hacking forum, especially by (aspiring) cybercriminals with little technical skills. The tools are currently very basic, but surely more sophisticated versions will be distributed in the coming months.

Three examples of malware created with ChatGPT

Check Point Research researchers used ChatGPT to write a phishing email with an Excel attachment containing a macro that downloads malware onto your computer. A user used OpenAI AI to code an info-stealer in Python. The malware starts searching for specific files (for example, Word and PDF documents) which, if found, are copied to a directory, compressed in ZIP format and sent to the remote server. When finished, directory and ZIP archive are deleted.

The second example is an encryption tool, also written in Python. The code contains all the functions necessary for file encryption and decryption, using various algorithms, including Blowfish and Twofish. The code can be used for common tasks, but a few modifications are enough to automate the operations and exploit it during a ransomware attack.

The last example is more complex. A forum user used ChatGPT to create a marketplace, which is a dark web site used for the sale of weapons, drugs, malware, stolen products and credit card data. By taking advantage of third-party APIs, it is possible to update prices in real time taking into account the current value of the cryptocurrencies accepted as a payment method.

Check Point Software experts asked ChatGPT how the technology can be used for illegal purposes. The AI replied that there are several ways, including phishing emails, social media posts or fake videos to manipulate public opinion. However, OpenAI is not responsible, as the terms of service prohibit the use of its technology for dangerous or illegal activities.

This article contains affiliate links: purchases or orders made through these links will allow our site to receive a commission. The offers may undergo price changes after publication.

Read the Source

Research

  • Defining an “AI Incident”
  • Defining an “AI Incident Response”
  • Database Roadmap
  • Related Work
  • Download Complete Database

Project and Community

  • About
  • Contact and Follow
  • Apps and Summaries
  • Editor’s Guide

Incidents

  • All Incidents in List Form
  • Flagged Incidents
  • Submission Queue
  • Classifications View
  • Taxonomies

2024 - AI Incident Database

  • Terms of use
  • Privacy Policy
  • Open twitterOpen githubOpen rssOpen facebookOpen linkedin
  • e1b50cd