{"id":3083,"date":"2024-09-26T07:47:28","date_gmt":"2024-09-26T07:47:28","guid":{"rendered":"https:\/\/xdr-mdr.lmntrix.com\/main_web\/?p=3083"},"modified":"2025-07-29T07:01:21","modified_gmt":"2025-07-29T07:01:21","slug":"chatgpt-and-the-emerging-cyber-threats-2","status":"publish","type":"post","link":"https:\/\/lmntrix.com\/blog\/chatgpt-and-the-emerging-cyber-threats-2\/","title":{"rendered":"ChatGPT and the Emerging Cyber Threats"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/Learn-about.webp\" alt=\"\"\/><\/figure>\n\n\n\n<p>As with all technologies, how they are used is what determines the type of impact they will have on society as a whole. Artificial Intelligence (AI) is that new technology and in particular the generative AI of ChatGPT, that has seemingly stolen all the technology headlines of late. Currently, the technology has proven to be both advantageous to the cybersecurity industry. Conversely, it has also proven to be a risk to both security firms and the IT infrastructures they have been tasked with protecting.<\/p>\n\n\n\n<p>This article is primarily focused on the risks posed by such technology but will cover some of the benefits the technology can unlock for those defending networks and endpoints. However, before going down those rabbit holes, some definitions are required to move forward.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Starting with AI, one of the best working definitions comes from John McCarthy\u2019s paper \u201cWhat is Artificial Intelligence\u201d, McCarthy states,<\/p>\n\n\n\n<p>\u201cIt is the science and engineering of making intelligent machines, especially intelligent computer programs. It is related to the similar task of using computers to understand human intelligence, but AI does not have to confine itself to methods that are biologically observable.\u201d<\/p>\n<\/blockquote>\n\n\n\n<p>With that in mind,\u00a0<a href=\"https:\/\/www.ibm.com\/topics\/artificial-intelligence\" target=\"_blank\" rel=\"noopener\">IBM\u2019s explanation of the current state of AI<\/a>\u00a0is incredibly apt,<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cAt its simplest form, artificial intelligence is a field, which combines computer science and robust datasets, to enable problem-solving. It also encompasses sub-fields of machine learning and deep learning, which are frequently mentioned in conjunction with artificial intelligence. These disciplines are comprised of AI algorithms that seek to create expert systems which make predictions or classifications based on input data.\u201d<\/p>\n\n\n\n<p>And,<\/p>\n\n\n\n<p>\u201cOver the years, artificial intelligence has gone through many cycles of hype, but even to\u00a0skeptics, the release of OpenAI\u2019s ChatGPT seems to mark a turning point. The last time generative AI loomed this large, the breakthroughs were in computer vision, but now the leap forward is in natural language processing. And it\u2019s not just language: Generative models can also learn the grammar of software code, molecules, natural images, and a variety of other data types.\u201d<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">LMNTRIX\u2019s Experience with Chat GPT<\/h3>\n\n\n\n<p>At LMNTRIX we have followed the recent developments in earnest and have noticed that ChatGPT, and its similar incarnations, can be used to supplement cyber research. If done properly this can drastically reduce research times by handling tasks that would benefit from some level of automation. Tasks like decrypting Base64 shellcode and discovering a known cross-site scripting vulnerability can be done easily and in record time.<\/p>\n\n\n\n<p>Carlo Minassian, CEO of LMNTRIX, said he was able to get the program to perform several offensive and defensive cyber security tasks with his team at LMNTRIX CDC. Notably, researchers at LMNTRIX CDC were able to task the AI with helping them with writing ransomware for Windows Operating Systems. This sounds like it could be used by an attacker, spoiler alert, it can, in the hands of the good guys, it helped assist the LMNTRIX team with reverse engineering malware code, despite specific terms of use that prohibit the practice.<\/p>\n\n\n\n<p>LMNTRIX staff also noted that the security risks posed by ChatGPT are not direct risks, as the deployment of malware can be perceived. Rather, it is the vast amounts of information that can be used maliciously to supplement attacks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Risks Associated With ChatGPT<strong><\/strong><\/h2>\n\n\n\n<p>As with all tools, it is the end user that determines if it will be used for good or, dare I say it, evil. While security researchers, and those tasked with defending IT infrastructure can use the technology for good, we have already begun to see threat actors use the technology for less noble purposes. Currently, we have seen threat actors use ChatGPT to help generate AI-powered phishing scams and dupe the technology into writing malicious code.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">AI-Generated Phishing Scams<strong><\/strong><\/h3>\n\n\n\n<p>Phishing is still the&nbsp;<a href=\"https:\/\/www.ic3.gov\/Media\/PDF\/AnnualReport\/2021_IC3Report.pdf\" target=\"_blank\" rel=\"noopener\">most common Internet Threat<\/a>&nbsp;users are impacted by. They are relatively easy to detect as they\u2019re often littered with misspellings, poor grammar, and generally awkward phrasing, especially those originating from other countries where the threat actor\u2019s first language isn\u2019t English. ChatGPT allows the threat actor to generate a campaign error-free making detection a harder prospect than before. This can be seen in ChatGPT\u2019s ability to converse so seamlessly with users without spelling, grammatical, and verb tense mistakes makes it seem like there could very well be a real person on the other side of the chat window. OpenAI can be considered a godsend for those composing the lures, which are critical to a phishing campaign\u2019s success.<\/p>\n\n\n\n<p>Just as threat actors have looked to leverage the tech, security researchers have already developed a&nbsp;<a href=\"https:\/\/www.pcguide.com\/apps\/chat-gpt-detectors\/\" target=\"_blank\" rel=\"noopener\">\u201cChatGPT Detector\u201d<\/a>. Ideally, such software would be used to automatically screen and flag emails that are AI-generated. Additionally, all employees need to be routinely trained and re-trained on the latest cybersecurity awareness and prevention skills, with specific attention paid to AI-supported phishing scams. That said, the onus is on both the private sector and the wider public to continue advocating for advanced detection tools, rather than only focusing on AI\u2019s expanding capabilities and benefits.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Generating Malicious Code<strong><\/strong><\/h3>\n\n\n\n<p>In this regard, it is important to note that ChatGPT is coded to prevent the AI from generating code it perceives as malicious. As the&nbsp;<a href=\"https:\/\/hbr.org\/2023\/04\/the-new-risks-chatgpt-poses-to-cybersecurity\" target=\"_blank\" rel=\"noopener\">Harvard Business Review<\/a>&nbsp;notes,<\/p>\n\n\n\n<p>\u201cChatGPT is proficient at generating code and other computer programming tools, but the AI is programmed not to generate code that it deems to be malicious or intended for hacking purposes. If hacking code is requested, ChatGPT will inform the user that its purpose is to \u2018assist with useful and ethical tasks while adhering to ethical guidelines and policies.\u2019\u201d&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>However, it is possible that ChatGPT can be tricked into supplying malicious code to a threat actor. There have already been&nbsp;<a href=\"https:\/\/www.analyticsinsight.net\/cybercriminals-are-using-chatgpt-to-create-hacking-tools-and-code\/#:~:text=Security%20researchers%20have%20reported%20that,create%20hacking%20tools%20and%20code\" target=\"_blank\" rel=\"noopener\">several instances<\/a>&nbsp;of hackers using the tool to such an end. In one instance, a well-known underground hacking site by a hacker claiming to be testing the tool to recreate malware strains as a researcher might. A deeper dive revealed that ChatGPT was used to write their initial scripts. Another user uploaded Python code that he claimed could encrypt files and had been created using ChatGPT on the aforementioned forum. The threat actor claimed that the hacking tools and code were his first of its kind.<\/p>\n\n\n\n<p>In another instance, a hacker demonstrated how ChatGPT might be used to establish a Dark Web marketplace. The hacker revealed that he had developed a piece of code that uses a third-party API to get the most recent Bitcoin values and can be utilized for the Dark Web market as a payment mechanism.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Final Thoughts<strong><\/strong><\/h2>\n\n\n\n<p>Once again I turn to the Harvard Business Review, with regard to the duality of AI tools like ChatGPT,<\/p>\n\n\n\n<p>\u201c\u2026it\u2019s important to remember that this same power is equally available to good actors. In addition to trying to prevent ChatGPT-related threats, cybersecurity training should also include instruction on how ChatGPT can be an important tool in the cybersecurity professionals\u2019 arsenal. As this rapid technology evolution creates a new era of cybersecurity threats, we must examine these possibilities and create new training to keep up.\u201d<\/p>\n\n\n\n<p>As one of LMNTRIX\u2019s team pointed out If you take a tool like a screwdriver, it is always dual use. It can be used as intended, pry a door open to grant an intruder, or it can be used as a weapon to cause bodily harm. How the tool performs, and what it does, depends on who uses it. Ultimately, opportunity and motive can probably help draw a thin line between a technology (or a tool) being used for ethical, or unethical purposes ChatGPT is no exception. The real question is how are you going to create and integrate new threat models into your existing ecosystem? If you\u2019re unsure, go ahead and contact the LMNTRIX team, we\u2019ll be happy to help shape your security program for years to come.<\/p>\n<\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>As with all technologies, how they are used is what determines the type of impact they will have on society as a whole. Artificial Intelligence (AI) is that new technology and in particular the generative AI of ChatGPT, that has seemingly stolen all the technology headlines of late. Currently, the technology has proven to be [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":3084,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-3083","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"_links":{"self":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/3083","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/comments?post=3083"}],"version-history":[{"count":2,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/3083\/revisions"}],"predecessor-version":[{"id":4358,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/3083\/revisions\/4358"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media\/3084"}],"wp:attachment":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media?parent=3083"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/categories?post=3083"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/tags?post=3083"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}