{"id":32859,"date":"2023-07-14T03:00:00","date_gmt":"2023-07-14T10:00:00","guid":{"rendered":"https:\/\/insidebigdata.com\/?p=32859"},"modified":"2023-07-13T09:53:11","modified_gmt":"2023-07-13T16:53:11","slug":"wormgpt-the-generative-ai-tool-cybercriminals-are-using-to-launch-business-email-compromise-attacks","status":"publish","type":"post","link":"https:\/\/insidebigdata.com\/2023\/07\/14\/wormgpt-the-generative-ai-tool-cybercriminals-are-using-to-launch-business-email-compromise-attacks\/","title":{"rendered":"WormGPT \u2013 The Generative AI Tool Cybercriminals Are Using to Launch Business Email Compromise Attacks"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"alignright size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"310\" height=\"154\" src=\"https:\/\/insidebigdata.com\/wp-content\/uploads\/2023\/07\/SlashNext_logo.png\" alt=\"\" class=\"wp-image-32860\" srcset=\"https:\/\/insidebigdata.com\/wp-content\/uploads\/2023\/07\/SlashNext_logo.png 310w, https:\/\/insidebigdata.com\/wp-content\/uploads\/2023\/07\/SlashNext_logo-300x149.png 300w, https:\/\/insidebigdata.com\/wp-content\/uploads\/2023\/07\/SlashNext_logo-150x75.png 150w, https:\/\/insidebigdata.com\/wp-content\/uploads\/2023\/07\/SlashNext_logo-1024x512.png 1024w\" sizes=\"(max-width: 310px) 100vw, 310px\" \/><\/figure><\/div>\n\n\n<p>SlashNext published a <a href=\"https:\/\/slashnext.com\/blog\/wormgpt-the-generative-ai-tool-cybercriminals-are-using-to-launch-business-email-compromise-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener\">research report<\/a> detailing a unique module based on ChatGPT that was created by cybercriminals with the explicit intent of leveraging generative AI for nefarious purposes.\u00a0<\/p>\n\n\n\n<p>The SlashNext team collaborated with Daniel Kelley, a reformed black hat computer hacker who is researching the latest threats and tactics employed by cybercriminals. Delving into cybercrime forums, Kelley and SlashNext uncovered discussion threads wherein bad actors were:&nbsp;<\/p>\n\n\n\n<ul>\n<li>freely sharing with one another tips for how to leverage ChatGPT to refine emails that can be used in phishing or BEC attacks;&nbsp;<\/li>\n\n\n\n<li>promoting \u201cjailbreaks\u201d for interfaces like ChatGPT, referring to specialized prompts and inputs that are designed to manipulate interfaces like ChatGPT into generating output that might involve disclosing sensitive information, producing inappropriate content or executing harmful code;<\/li>\n\n\n\n<li>Promoting a custom module similar to ChatGPT, presented as a blackhat alternative to ChatGPT but without any ethical boundaries or limitations.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>These research findings have widespread implications for the security community in understanding how bad actors are not only manipulating generative AI platforms like ChatGPT for malicious purposes, but also creating entirely new platforms based on the same technology, specifically designed to do their ill-bidding.\u00a0<\/p>\n\n\n\n<p><em>Sign up for the free insideBIGDATA&nbsp;<a href=\"http:\/\/inside-bigdata.com\/newsletter\/\" target=\"_blank\" rel=\"noreferrer noopener\">newsletter<\/a>.<\/em><\/p>\n\n\n\n<p><em>Join us on Twitter:&nbsp;<a href=\"https:\/\/twitter.com\/InsideBigData1\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/twitter.com\/InsideBigData1<\/a><\/em><\/p>\n\n\n\n<p><em>Join us on LinkedIn:&nbsp;<a href=\"https:\/\/www.linkedin.com\/company\/insidebigdata\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.linkedin.com\/company\/insidebigdata\/<\/a><\/em><\/p>\n\n\n\n<p><em>Join us on Facebook:&nbsp;<a href=\"https:\/\/www.facebook.com\/insideBIGDATANOW\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.facebook.com\/insideBIGDATANOW<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>SlashNext published a research report detailing a unique module based on ChatGPT that was created by cybercriminals with the explicit intent of leveraging generative AI for nefarious purposes.\u00a0These research findings have widespread implications for the security community in understanding how bad actors are not only manipulating generative AI platforms like ChatGPT for malicious purposes, but also creating entirely new platforms based on the same technology, specifically designed to do their ill-bidding.\u00a0 <\/p>\n","protected":false},"author":10513,"featured_media":13689,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"footnotes":""},"categories":[526,180,67,268,56,84,1],"tags":[437,1333,1254,419,341,110,96],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>WormGPT \u2013 The Generative AI Tool Cybercriminals Are Using to Launch Business Email Compromise Attacks - insideBIGDATA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/insidebigdata.com\/2023\/07\/14\/wormgpt-the-generative-ai-tool-cybercriminals-are-using-to-launch-business-email-compromise-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"WormGPT \u2013 The Generative AI Tool Cybercriminals Are Using to Launch Business Email Compromise Attacks - insideBIGDATA\" \/>\n<meta property=\"og:description\" content=\"SlashNext published a research report detailing a unique module based on ChatGPT that was created by cybercriminals with the explicit intent of leveraging generative AI for nefarious purposes.\u00a0These research findings have widespread implications for the security community in understanding how bad actors are not only manipulating generative AI platforms like ChatGPT for malicious purposes, but also creating entirely new platforms based on the same technology, specifically designed to do their ill-bidding.\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/insidebigdata.com\/2023\/07\/14\/wormgpt-the-generative-ai-tool-cybercriminals-are-using-to-launch-business-email-compromise-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"insideBIGDATA\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/insidebigdata\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-14T10:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-13T16:53:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/insidebigdata.com\/wp-content\/uploads\/2015\/09\/Crime_analytics.png\" \/>\n\t<meta property=\"og:image:width\" content=\"219\" \/>\n\t<meta property=\"og:image:height\" content=\"178\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Editorial Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@insideBigData\" \/>\n<meta name=\"twitter:site\" content=\"@insideBigData\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editorial Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/insidebigdata.com\/2023\/07\/14\/wormgpt-the-generative-ai-tool-cybercriminals-are-using-to-launch-business-email-compromise-attacks\/\",\"url\":\"https:\/\/insidebigdata.com\/2023\/07\/14\/wormgpt-the-generative-ai-tool-cybercriminals-are-using-to-launch-business-email-compromise-attacks\/\",\"name\":\"WormGPT \u2013 The Generative AI Tool Cybercriminals Are Using to Launch Business Email Compromise Attacks - insideBIGDATA\",\"isPartOf\":{\"@id\":\"https:\/\/insidebigdata.com\/#website\"},\"datePublished\":\"2023-07-14T10:00:00+00:00\",\"dateModified\":\"2023-07-13T16:53:11+00:00\",\"author\":{\"@id\":\"https:\/\/insidebigdata.com\/#\/schema\/person\/2949e412c144601cdbcc803bd234e1b9\"},\"breadcrumb\":{\"@id\":\"https:\/\/insidebigdata.com\/2023\/07\/14\/wormgpt-the-generative-ai-tool-cybercriminals-are-using-to-launch-business-email-compromise-attacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/insidebigdata.com\/2023\/07\/14\/wormgpt-the-generative-ai-tool-cybercriminals-are-using-to-launch-business-email-compromise-attacks\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/insidebigdata.com\/2023\/07\/14\/wormgpt-the-generative-ai-tool-cybercriminals-are-using-to-launch-business-email-compromise-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/insidebigdata.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"WormGPT \u2013 The Generative AI Tool Cybercriminals Are Using to Launch Business Email Compromise Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/insidebigdata.com\/#website\",\"url\":\"https:\/\/insidebigdata.com\/\",\"name\":\"insideBIGDATA\",\"description\":\"Your Source for AI, Data Science, Deep Learning &amp; Machine Learning Strategies\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/insidebigdata.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/insidebigdata.com\/#\/schema\/person\/2949e412c144601cdbcc803bd234e1b9\",\"name\":\"Editorial Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/insidebigdata.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e137ce7ea40e38bd4d25bb7860cfe3e4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e137ce7ea40e38bd4d25bb7860cfe3e4?s=96&d=mm&r=g\",\"caption\":\"Editorial Team\"},\"sameAs\":[\"http:\/\/www.insidebigdata.com\"],\"url\":\"https:\/\/insidebigdata.com\/author\/editorial\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"WormGPT \u2013 The Generative AI Tool Cybercriminals Are Using to Launch Business Email Compromise Attacks - insideBIGDATA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/insidebigdata.com\/2023\/07\/14\/wormgpt-the-generative-ai-tool-cybercriminals-are-using-to-launch-business-email-compromise-attacks\/","og_locale":"en_US","og_type":"article","og_title":"WormGPT \u2013 The Generative AI Tool Cybercriminals Are Using to Launch Business Email Compromise Attacks - insideBIGDATA","og_description":"SlashNext published a research report detailing a unique module based on ChatGPT that was created by cybercriminals with the explicit intent of leveraging generative AI for nefarious purposes.\u00a0These research findings have widespread implications for the security community in understanding how bad actors are not only manipulating generative AI platforms like ChatGPT for malicious purposes, but also creating entirely new platforms based on the same technology, specifically designed to do their ill-bidding.\u00a0","og_url":"https:\/\/insidebigdata.com\/2023\/07\/14\/wormgpt-the-generative-ai-tool-cybercriminals-are-using-to-launch-business-email-compromise-attacks\/","og_site_name":"insideBIGDATA","article_publisher":"http:\/\/www.facebook.com\/insidebigdata","article_published_time":"2023-07-14T10:00:00+00:00","article_modified_time":"2023-07-13T16:53:11+00:00","og_image":[{"width":219,"height":178,"url":"https:\/\/insidebigdata.com\/wp-content\/uploads\/2015\/09\/Crime_analytics.png","type":"image\/png"}],"author":"Editorial Team","twitter_card":"summary_large_image","twitter_creator":"@insideBigData","twitter_site":"@insideBigData","twitter_misc":{"Written by":"Editorial Team","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/insidebigdata.com\/2023\/07\/14\/wormgpt-the-generative-ai-tool-cybercriminals-are-using-to-launch-business-email-compromise-attacks\/","url":"https:\/\/insidebigdata.com\/2023\/07\/14\/wormgpt-the-generative-ai-tool-cybercriminals-are-using-to-launch-business-email-compromise-attacks\/","name":"WormGPT \u2013 The Generative AI Tool Cybercriminals Are Using to Launch Business Email Compromise Attacks - insideBIGDATA","isPartOf":{"@id":"https:\/\/insidebigdata.com\/#website"},"datePublished":"2023-07-14T10:00:00+00:00","dateModified":"2023-07-13T16:53:11+00:00","author":{"@id":"https:\/\/insidebigdata.com\/#\/schema\/person\/2949e412c144601cdbcc803bd234e1b9"},"breadcrumb":{"@id":"https:\/\/insidebigdata.com\/2023\/07\/14\/wormgpt-the-generative-ai-tool-cybercriminals-are-using-to-launch-business-email-compromise-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/insidebigdata.com\/2023\/07\/14\/wormgpt-the-generative-ai-tool-cybercriminals-are-using-to-launch-business-email-compromise-attacks\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/insidebigdata.com\/2023\/07\/14\/wormgpt-the-generative-ai-tool-cybercriminals-are-using-to-launch-business-email-compromise-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/insidebigdata.com\/"},{"@type":"ListItem","position":2,"name":"WormGPT \u2013 The Generative AI Tool Cybercriminals Are Using to Launch Business Email Compromise Attacks"}]},{"@type":"WebSite","@id":"https:\/\/insidebigdata.com\/#website","url":"https:\/\/insidebigdata.com\/","name":"insideBIGDATA","description":"Your Source for AI, Data Science, Deep Learning &amp; Machine Learning Strategies","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/insidebigdata.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/insidebigdata.com\/#\/schema\/person\/2949e412c144601cdbcc803bd234e1b9","name":"Editorial Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/insidebigdata.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e137ce7ea40e38bd4d25bb7860cfe3e4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e137ce7ea40e38bd4d25bb7860cfe3e4?s=96&d=mm&r=g","caption":"Editorial Team"},"sameAs":["http:\/\/www.insidebigdata.com"],"url":"https:\/\/insidebigdata.com\/author\/editorial\/"}]}},"jetpack_featured_media_url":"https:\/\/insidebigdata.com\/wp-content\/uploads\/2015\/09\/Crime_analytics.png","jetpack_shortlink":"https:\/\/wp.me\/p9eA3j-8xZ","jetpack-related-posts":[{"id":34038,"url":"https:\/\/insidebigdata.com\/2023\/11\/29\/sophos-anticipates-ai-based-attack-techniques-and-prepares-detections\/","url_meta":{"origin":32859,"position":0},"title":"Sophos Anticipates AI-Based Attack Techniques and Prepares Detections","date":"November 29, 2023","format":false,"excerpt":"Sophos, a global leader in innovating and delivering cybersecurity as a service, released two reports about the use of AI in cybercrime. The first report\u2014\u201cThe Dark Side of AI: Large-Scale Scam Campaigns Made Possible by Generative AI\u201d\u2014demonstrates how, in the future, scammers could leverage technology like ChatGPT to conduct fraud\u2026","rel":"","context":"In &quot;AI Deep Learning&quot;","img":{"alt_text":"","src":"https:\/\/i0.wp.com\/insidebigdata.com\/wp-content\/uploads\/2023\/06\/AI_shutterstock_2287025875_special-1.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":32994,"url":"https:\/\/insidebigdata.com\/2023\/07\/28\/generative-ai-report-fraudgpt-ai-powered-fraud-begins\/","url_meta":{"origin":32859,"position":1},"title":"Generative AI Report: FraudGPT &#8211; AI Powered Fraud Begins","date":"July 28, 2023","format":false,"excerpt":"Word out on the street is that FraudGPT\u00a0has launched. It's an\u00a0AI bot exclusively targeted for offensive purposes, such as crafting spear phishing emails, creating cracking tools, and creating fake identities, and it signals the first major instance of a published fraud-focused AI tool. FraudGPT follows in the footsteps of WormGPT.","rel":"","context":"In &quot;AI Deep Learning&quot;","img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/uwaH33zGKRY\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":32465,"url":"https:\/\/insidebigdata.com\/2023\/05\/24\/lets-talk-about-chatgpt-and-fraud\/","url_meta":{"origin":32859,"position":2},"title":"ChatGPT: A Fraud Fighter\u2019s Friend or Foe?","date":"May 24, 2023","format":false,"excerpt":"In this contributed article, Doriel Abrahams, Head of Risk, U.S., Forter, explores how ChatGPT can combine with social engineering to conduct fraud, some of the generative AI trends he anticipates will play out this year, and how existing fraud rings could use the technology to manipulate both businesses and consumers\u2026","rel":"","context":"In &quot;AI Deep Learning&quot;","img":{"alt_text":"","src":"https:\/\/i0.wp.com\/insidebigdata.com\/wp-content\/uploads\/2023\/04\/ChatGPT_shutterstock_2249988847_small.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":32902,"url":"https:\/\/insidebigdata.com\/2023\/07\/22\/generative-ai-report-commandbar-releases-ai-powered-helphub-to-overlay-chatgpt-onto-any-product\/","url_meta":{"origin":32859,"position":3},"title":"Generative AI Report: CommandBar Releases AI-Powered HelpHub to Overlay ChatGPT Onto Any Product","date":"July 22, 2023","format":false,"excerpt":"Welcome to the Generative AI Report, a new feature here on insideBIGDATA with a special focus on all the new applications and integrations tied to generative AI technologies. We\u2019ve been receiving so many cool news items relating to applications centered on large language models, we thought it would be a\u2026","rel":"","context":"In &quot;AI Deep Learning&quot;","img":{"alt_text":"","src":"https:\/\/i0.wp.com\/insidebigdata.com\/wp-content\/uploads\/2023\/07\/ChatGPT_shutterstock_2249988847_special.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":34046,"url":"https:\/\/insidebigdata.com\/2023\/11\/30\/happy-birthday-chatgpt\/","url_meta":{"origin":32859,"position":4},"title":"Happy Birthday ChatGPT!","date":"November 30, 2023","format":false,"excerpt":"Today, November 30, 2023, mark\u2019s the first anniversary of OpenAI\u2019s ChatGPT. In the last year, the AI chatbot has secured support from major Silicon Valley companies and seen integration across various fields including academia, the arts, marketing, medicine, gaming, and government. These are exciting times, so we decided to put\u2026","rel":"","context":"In &quot;AI Deep Learning&quot;","img":{"alt_text":"","src":"https:\/\/i0.wp.com\/insidebigdata.com\/wp-content\/uploads\/2023\/07\/ChatGPT_shutterstock_2249988847_special.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":33360,"url":"https:\/\/insidebigdata.com\/2023\/09\/12\/secret-to-building-killer-chatgpt-biz-apps-is-traditional-ai\/","url_meta":{"origin":32859,"position":5},"title":"Secret to Building Killer ChatGPT Biz Apps is Traditional AI\u00a0","date":"September 12, 2023","format":false,"excerpt":"In this contributed article, Gaetan Castelein, VP of Marketing at\u00a0Tecton gives focus to Predictive AI vs. Generative AI and points out that AI is still in its infancy as a business application. It's important to remember that no matter what transpires between generative AI and predictive AI, there is no\u2026","rel":"","context":"In &quot;AI Deep Learning&quot;","img":{"alt_text":"","src":"https:\/\/i0.wp.com\/insidebigdata.com\/wp-content\/uploads\/2023\/07\/ChatGPT_shutterstock_2249988847_special.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/posts\/32859"}],"collection":[{"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/users\/10513"}],"replies":[{"embeddable":true,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/comments?post=32859"}],"version-history":[{"count":0,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/posts\/32859\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/media\/13689"}],"wp:attachment":[{"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/media?parent=32859"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/categories?post=32859"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/tags?post=32859"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}