I couldn’t escape the hype around me Chat GPT. It’s still early days, but this time it might be worth the hype.
Indeed, you can read amazingly good articles if you ask them to blog on almost any theme and style. Unless otherwise, you know the subject so well that you can spot the mistakes in it.
Of course, most people are unlikely to be experts in the field of the news article, blog post, or social media post they read. This means they take it at face value and believe every word. We are living in an era of rapid automated fake news content production. As a man whose life depends on two things: a certain amount of expertise and his ability to write about it in a useful, accurate and understandable way, this is a challenging thought.
ChatGPT is scary. We believe this is used to serve content that is presented as the output of an actual writer, without “AI attribution” attached. In fact, we already know this to be the case. CNET The company admitted that it had been publishing AI-generated news stories under human editorial oversight for months as an ongoing trial.
At the time of this writing, the case has been put on hold due to media interest in the uncovered creation of stories by AI. They even have a new contract specifically prohibiting the creation of content using ChatGPT or similar tools. To be honest, I had no idea until I read the contract. However, some people may not have the same ethical considerations as I do when it comes to creating content.
Given this, it’s easy to see why I, a contributor focused primarily on security, am talking about ChatGPT in the first place. Cybercriminals have already figured out how to abuse this tool to quickly create anything. hacking tools To phishing campaign Additionally, some security experts point out: chatbot Pretending to be a young girl on a dating site can be pretty powerful.
Given that you can Ask ChatGPT to create the code (and working executable code at the time), this isn’t all that surprising. Also, the “responsibility” for this should not be placed at the feet of ChatGPT or OpenAI. Bad people use good tools to create malicious elements. It’s real, and that’s exactly what they’ve done.
Researchers at Check Point, who monitor the shady world of underground cybercrime forums, found that one of the Android malware distributors had a code created by ChatGPT that could steal files online. I found it published. Another piece of malware has been identified that can install malicious backdoors on your PC. One new developer first claimed: python The scripts they have created so far are mainly written by ChatGPT, Encrypt files. This could easily be applied to encrypt his entire PC without user intervention, say the Check Point researchers, as part of a ransomware attack, for example.
The only saving grace, at least for now, the researchers say, is that the code is all very basic. It won’t help for long. Regarding phishing campaigns, ChatGPT has already implemented controls to prevent such requests from being carried out. We’ve heard these have been circumvented by determined researchers and even some journalists, so we have to assume that cybercriminals can be added to the list.
Even if this study wasn’t worrying enough, CyberArk researchers are also considering the possibility of: Creating ChatGPT malware. It is said that it can be used to create polymorphic malware.Simply put, it is malware Each attack modifies the code to avoid detection by antivirus defenses. This type of malware renders signature-based protection useless. Cyber Ark believes he was able to circumvent the ChatGPT filter by adhering to some constraints set by the researchers. It’s also in its early stages, so the code may not trigger initial detection, but other tools will detect the malware once the machine is infected.
Ian Hirst, partner in Cyber Threat Services at Gemserv, points out that the ChatGPT world isn’t all about negativity. cyber security. “ChatGPT has the potential to be a powerful cybersecurity tool,” he says. “AI can help detect and prevent cybercrime by monitoring chat conversations and flagging suspicious activity for further investigation. , can also quickly and effectively assist in cyber incident management with chat conversations that provide guidance on how to mitigate.”