Russian hackers want to use ChatGPT for attacks

Share post

Customer access is required for full use of OpenAI's AI system ChatGPT. Russian hackers are currently looking for ways to bypass this access to use ChatGPT to achieve their malicious goals. But that's what a lot of hackers want right now. Conversation notes from the dark web.

Check Point Research (CPR) is monitoring attempts by Russian hackers to bypass OpenAI restrictions to use ChatGPT for malicious purposes. In underground forums, hackers are discussing how to bypass controls of IP addresses, payment cards and phone numbers - all of which are necessary to access ChatGPT from Russia. CPR shares screenshots of what they saw and warns about the rapidly growing interest in ChatGPT by hackers of all countries to expand their criminal circles.

Hackers discuss on the dark web

It's not particularly difficult to bypass OpenAI's country-specific restrictions to gain access to ChatGPT. At the moment, security researchers see that Russian hackers are already discussing and checking how to bypass geofencing to use ChatGPT for malicious purposes. Check Point Research believes these hackers will attempt to implement ChatGPT into their daily criminal operations and test its capabilities. Cyber ​​criminals are increasingly interested in ChatGPT as the AI ​​technology behind it can help a hacker save money.

🔎 1.A hacker asks what is the best way to use a stolen payment card to pay for an upgraded account on OpenAI that gives access to more powerful and specialized models and features.

🔎 2. Discussion on how to bypass OpenAI geo-controls.

 

🔎 3. In general, there are many guides in Russian semi-legal online SMS services showing how to register in ChatGPT. Check Point has examples of this already being used.

No big danger yet

“In the short term, we don't believe that this new AI technology will turn the entire threat landscape upside down, but rather lead to an increase in mass-produced malware and, most importantly, much better-crafted phishing emails. Over the long term, however, integrating and improving this AI technology can completely and for the worse change the way hackers build and unleash their cyber threats on users.” — Sergey Shykevich, Threat Intelligence Group Manager at Check Point Software Technologies.

More at CheckPoint.com

 


About check point

Check Point Software Technologies GmbH (www.checkpoint.com/de) is a leading provider of cybersecurity solutions for public administrations and companies worldwide. The solutions protect customers from cyberattacks with an industry leading detection rate for malware, ransomware and other types of attacks. Check Point offers a multi-level security architecture that protects company information in cloud environments, networks and on mobile devices, as well as the most comprehensive and intuitive “one point of control” security management system. Check Point protects over 100.000 businesses of all sizes.


 

Matching articles on the topic

IT security: NIS-2 makes it a top priority

Only in a quarter of German companies do management take responsibility for IT security. Especially in smaller companies ➡ Read more

Cyber ​​attacks increase by 104 percent in 2023

A cybersecurity company has taken a look at last year's threat landscape. The results provide crucial insights into ➡ Read more

Mobile spyware poses a threat to businesses

More and more people are using mobile devices both in everyday life and in companies. This also reduces the risk of “mobile ➡ Read more

Crowdsourced security pinpoints many vulnerabilities

Crowdsourced security has increased significantly in the last year. In the public sector, 151 percent more vulnerabilities were reported than in the previous year. ➡ Read more

Digital Security: Consumers trust banks the most

A digital trust survey showed that banks, healthcare and government are the most trusted by consumers. The media- ➡ Read more

Darknet job exchange: Hackers are looking for renegade insiders

The Darknet is not only an exchange for illegal goods, but also a place where hackers look for new accomplices ➡ Read more

Solar energy systems – how safe are they?

A study examined the IT security of solar energy systems. Problems include a lack of encryption during data transfer, standard passwords and insecure firmware updates. trend ➡ Read more

New wave of phishing: Attackers use Adobe InDesign

There is currently an increase in phishing attacks that abuse Adobe InDesign, a well-known and trusted document publishing system. ➡ Read more