AI phishing

Are the bad guys using AI?

They might! AI tools like ChatGPT or DALL-E-2 are currently widely tested out on the internet – both for the good as well as for the bad.

From my point of view, we are at the very beginning of an interesting development, which will unfold over the next couple of years. AI will play an increasing role in both attacking as well as protecting systems.

I’ve included a very simple example in this post – I’ve used ChatGPT to create an e-mail template an attacker could use within a phishing attack. Pretty impressive – especially if you compare it to the phishing mails loaded with typos and grammatically wrong sentences we’ve been used to some years ago.

Be aware – and always try to be one step ahead of the attacker!

Image of a AI generated phishing mail template.
The image shows an email notification informing customers that their login credentials have expired and they need to re-verify their credentials to ensure the security of their account. The email includes a link to a re-verification page and instructions on how to complete the process. It also offers an apology for any inconvenience caused and emphasizes the importance of account security. The email concludes with contact information for customer support in case of questions or concerns and expresses gratitude for choosing their company. The email is signed by the company, represented by the placeholder "[Your Company Name]."

Similar Posts

  • Christmas season

    Christmas season is here again! Like you, your “favorite” cyber criminals are also waiting to get their presents. Here are my 3 free security tips for you to spoil their fun this Christmas season: Have a wonderful time with your beloved ones and stay secure!

  • BSI AI Guideline

    What a good start into the weekend 😎 📄 The German BSI has published a guideline for developers regarding potential vulnerabilies in AI systems. 📣 From my point of view, a security risk assessment on systems using AI technologies has to consider the attacks on the AI parts of the system as well. A security…

  • WormGPT and FraudGPT

    As with any new technology, the “other side” is trying to figure out how to use it to their advantage. The normal commercial versions of LLMs have barriers built in to prevent the creation of malware code or phishing mails, for example. If you remove these barriers, you get the output that we as security…

  • Realtime AI applications

    Real time AI applications can bring huge benefits but also come with (social) risks we will have to deal with. The example below is a good demonstration of what is possible today. I’m very curious regarding the public discussion on how we will balance benefits vs. risks of such applications without killing technological progress in…

  • Thanks for attending

    A big “Thank you” to all participants for attending the German edition of our ICS – Informatik Consulting Systems webinar today! I’m very happy, that so many people were interested in the topic “Security lifecycle management for existing ETCS products”. 📣 In case you’ve missed it or you’re not speaking German – don’t worry! There…

  • Next conference: Nürnberg

    Today I’ve registered for attending the “CNA Forum Bahn+BahnTechnik 2024” conference with the title “Unlocking the opportunities of railtech” CNA Forum Bahntechnik | CNA – Center for transportation & logistics Neuer Adler e.V. (c-na.de) My personal focus for the conference will be the topics around the digitalisation of the railways and how to develop the…