Connect with us

Hi, what are you looking for?

White Papers

Sophos anticipates AI-based attack techniques and prepares detections

Using a simple e-commerce template and LLM tools like GPT-4, Sophos X-Ops was able to build a fully functioning website with AI-generated images, audio, and product descriptions, as well as a fake Facebook login and fake checkout page to steal users’ login credentials and credit card details.

Sophos, a global player in innovating and delivering cybersecurity as a service, today released two reports about the use of AI in cybercrime. The first report—“The Dark Side of AI: Large-Scale Scam Campaigns Made Possible by Generative AI”—demonstrates how, in the future, scammers could leverage technology like ChatGPT to conduct fraud on a massive scale with minimal technical skills.

However, a second report, titled “Cybercriminals Can’t Agree on GPTs,” found that, despite AI’s potential, rather than embracing large language models (LLMs) like ChatGPT, some cybercriminals are skeptical and even concerned about using AI for their attacks.

The Dark Side of AI

Using a simple e-commerce template and LLM tools like GPT-4, Sophos X-Ops was able to build a fully functioning website with AI-generated images, audio, and product descriptions, as well as a fake Facebook login and fake checkout page to steal users’ login credentials and credit card details. The website required minimal technical knowledge to create and operate, and, using the same tool, Sophos X-Ops was able to create hundreds of similar websites in minutes with one button.

Advertisement. Scroll to continue reading.

“It’s natural—and expected—for criminals to turn to new technology for automation. The original creation of spam emails was a critical step in scamming technology because it changed the scale of the playing field. New AIs are poised to do the same; if an AI technology exists that can create complete, automated threats, people will eventually use it. We have already seen the integration of generative AI elements in classic scams, such as AI-generated text or photographs to lure victims.

“However, part of the reason we conducted this research was to get ahead of the criminals. By creating a system for large-scale fraudulent website generation that is more advanced than the tools criminals are currently using, we have a unique opportunity to analyze and prepare for the threat before it proliferates,” said Ben Gelman, senior data scientist, Sophos.

Cybercriminals Can’t Agree on GPTs

For its research into attacker attitudes towards AI, Sophos X-Ops examined four prominent dark web forums for LLM-related discussions. While cybercriminals’ AI use appears to be in its early stages, threat actors on the dark web are discussing its potential when it comes to social engineering.  Sophos X-Ops has already witnessed the use of AI in romance-based, crypto scams.

In addition, Sophos X-Ops found that the majority of posts were related to compromised ChatGPT accounts for sale and “jailbreaks”—ways to circumvent the protections built into LLMs, so cybercriminals can abuse them for malicious purposes. Sophos X-Ops also found ten ChatGPT-derivatives that the creators claimed could be used to launch cyber-attacks and develop malware. However, threat actors had mixed reactions to these derivatives and other malicious applications of LLMs, with many criminals expressing concern that the creators of the ChatGPT imitators were trying to scam them.

Advertisement. Scroll to continue reading.

“While there’s been significant concern about the abuse of AI and LLMs by cybercriminals since the release of ChatGPT, our research has found that, so far, threat actors are more skeptical than enthused. Across two of the four forums on the dark web we examined, we only found 100 posts on AI. Compare that to cryptocurrency where we found 1,000 posts for the same period.

“We did see some cybercriminals attempting to create malware or attack tools using LLMs, but the results were rudimentary and often met with skepticism from other users. In one case, a threat actor, eager to showcase the potential of ChatGPT inadvertently revealed significant information about his real identity. We even found numerous ‘thought pieces’ about the potential negative effects of AI on society and the ethical implications of its use. In other words, at least for now, it seems that cybercriminals are having the same debates about LLMs as the rest of us,” said Christopher Budd, director, X-Ops research, Sophos.

For more about AI-generated scam websites and threat actors’ attitudes to LLMs, read The Dark Side of AI: Large-Scale Scam Campaigns Made Possible by Generative AI and Cybercriminals Can’t Agree on GPTs on Sophos.com.

Advertisement. Scroll to continue reading.
Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

As the holiday season approaches, Grab is proactively ramping up new measures to ensure safe rides for its passengers and driver-partners. 

HEADLINES

PLDT, its wireless unit Smart, and the Cybercrime Investigation and Coordinating Center are spearheading PROTECTA Pilipinas or Protect Technology-Telecom Alliance to safeguard tech and...

HEADLINES

The #BeCyberSmart pocket session at the recent Biñan City Sari-Sari Store Congress shared valuable tips on how to identify scams and fraud. The module...

HEADLINES

The partnership harnesses TransUnion Philippines’ database of consumer borrowing data, using its advanced scoring models to assess their risk profiles and present a credit...

MOBILE PRODUCTS

Priced at just P1,999, this affordable and stylish smartwatch is perfect for students who need a reliable companion to keep up with their fast-paced...

HEADLINES

Tucked away in the bustling street of Palatiw, Pasig City, ChellyRobert offers a surprising list of multi-brand furniture and electronics. Despite its unassuming exterior,...

HEADLINES

Now scheduled to take place from September 30 to October 1, 2024, at the Acacia Hotel in Alabang, Muntinlupa City, this year’s conference is...

HEADLINES

PROTECTA Pilipinas looks to advocate for legal frameworks that explicitly protect telecom infrastructure from vandalism, theft, and sabotage, including penalties for offenders.

Advertisement