{"id":800346,"date":"2023-07-19T11:10:22","date_gmt":"2023-07-19T11:10:22","guid":{"rendered":"https:\/\/telecomlive.in\/web\/2023\/07\/19\/beware-chatgpt-doppelganger-wormgpt-is-helping-cybercriminals-launch-online-attacks\/"},"modified":"2023-07-19T11:10:22","modified_gmt":"2023-07-19T11:10:22","slug":"beware-chatgpt-doppelganger-wormgpt-is-helping-cybercriminals-launch-online-attacks","status":"publish","type":"post","link":"https:\/\/telecomlive.in\/web\/2023\/07\/19\/beware-chatgpt-doppelganger-wormgpt-is-helping-cybercriminals-launch-online-attacks\/","title":{"rendered":"Beware! ChatGPT doppelganger WormGPT is helping cybercriminals launch online attacks"},"content":{"rendered":"<p>Cyber security researchers have warned of a new ChatGPT clone dubbed as WormGPT that is designed specially to help cyber criminals launch online attacks. SlashNext, a cyber security firm, has discovered WormGPT being sold on dark web pitching it as a \u201csophisticated AI model\u201d and a \u201cbest GPT alternative for blackhat\u201d designed especially for cybercrimes. The tool is described as \u201cprivacy focused\u201d and a way for \u201ceasy money\u201d for cyber criminals.<\/p>\n<p>The malicious tool has \u201cno ethical boundaries or limitations\u201d and is capable of generating convincing fake emails that can be used to fulfil ill intentions of the attackers.<\/p>\n<p>The researchers say that WormGPT has been trained on \u201ca diverse array of data sources, particularly concentrating on malware-related data.\u201d The researchers conducted tests on WormGPT instructing it to write an email intended to pressure an unsuspecting account manager into paying a fake invoice.<\/p>\n<p>The malicious generated the intended email which was \u201cnot only remarkably persuasive but also strategically cunning, showcasing its potential for sophisticated phishing attacks.\u201d<\/p>\n<p>The researchers found out the various services that WormGPT can offer. It includes tasks like refining or writing persuasive emails for phishing or Business Email Compromise(BEC) attack, writing codes for jailbreaks, and more.<\/p>\n<p>Designed in 2021, WormGPT is a GPTJ language model-based AI module with multiple features like chat memory retention, unlimited character support, and code creation abilities, note the researchers.<\/p>\n<p>The module can be used for various kinds of cybercrimes like phishing, blackmailing, smishing or BEC attacks. Cybersecurity researchers have warned that WormGPT is a serious threat and there are fest steps that we can take to safeguard ourselves against such malicious attacks. These include companies offering extensive training aimed at countering BEC attacks. Employees should be educated about this kind of attack and taught to be wary of suspicious emails. Further, the companies could opt for improved email verification measures like setting up alerts for email coming from outside the organisation and using email systems that flag messages containing specific keywords linked to BEC attacks like \u201curgent\u201d, \u201csensitive\u201d, or \u201cwire transfer.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber security researchers have warned of a new ChatGPT clone dubbed as WormGPT that is designed specially to help cyber criminals launch online attacks. SlashNext, a cyber security firm, has discovered WormGPT being sold on dark web pitching it as a \u201csophisticated AI model\u201d and a \u201cbest GPT alternative for blackhat\u201d designed especially for cybercrimes. The tool is described as \u201cprivacy focused\u201d and a way for \u201ceasy money\u201d for cyber criminals. The malicious tool has \u201cno ethical boundaries or limitations\u201d and is capable of generating convincing fake emails that can be used to fulfil ill intentions of the attackers. The [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[7],"tags":[],"class_list":["post-800346","post","type-post","status-publish","format-standard","hentry","category-it-2"],"acf":[],"_links":{"self":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/posts\/800346","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/comments?post=800346"}],"version-history":[{"count":0,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/posts\/800346\/revisions"}],"wp:attachment":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/media?parent=800346"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/categories?post=800346"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/tags?post=800346"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}