Skip to content

AI-driven criminal activities escalating: A look at how generative AI is attracting cybercriminals

Criminal Activity Focus: Repurposed GhostGPT ceases to function as an AI tool, instead dedicated towards illicit purposes

Rising Trend of GhostGPT - Criminals' Embrace of Generative Artificial Intelligence for Illicit...
Rising Trend of GhostGPT - Criminals' Embrace of Generative Artificial Intelligence for Illicit Purposes

AI-driven criminal activities escalating: A look at how generative AI is attracting cybercriminals

Headline: GhostGPT: A New Threat in the Cybersecurity Landscape Empowering Less-Skilled Hackers

In the ever-evolving world of cybersecurity, a new threat has emerged that is causing concern among experts: GhostGPT. This AI-powered malicious chatbot, developed late in 2024, is significantly impacting the cyber threat landscape, particularly for small and medium-sized businesses (SMEs).

GhostGPT operates as a jailbroken or open-source large language model (LLM) that has been stripped of safety protocols. This allows it to automate and amplify attacks such as phishing, which affected 84% of UK businesses in 2024 alone.

The AI-powered tool can produce polymorphic malware and phishing content with minimal input, making it accessible for even novice hackers. This means that individuals with limited technical background can now launch more damaging campaigns targeting SMEs, which typically have fewer cybersecurity resources and defenses compared to larger firms.

The ease of access and contextualization provided by GhostGPT changes the economics of cybercrime, allowing a single individual to initiate complex attacks. This has notably increased risks for SMEs, which are often less equipped to defend against such fast, convincing, and scalable attacks.

GhostGPT's capabilities extend beyond generating malware and phishing content. It can also create personalized email messages that mimic internal tone, corporate templates, and linguistic quirks of specific individuals. Furthermore, it provides step-by-step attack advice, including setting up command-and-control infrastructure, bypassing endpoint detection systems, and exploiting specific software vulnerabilities.

The emergence of GhostGPT signals a shift in the cyber threat landscape, as generative AI is now being weaponized. This trend has accelerated a broader "AI arms race" in cybersecurity, where defenders and attackers continually leverage AI tools to outmaneuver each other.

To combat this new threat, SMEs must prioritize regular software patching, the use of multi-factor authentication (MFA), and employee awareness training. Additionally, endpoint detection and response (EDR) and extended detection and response (XDR) systems can identify anomalous behaviors that signal compromise, even if the initial attack evades traditional defenses.

DNS filtering can also reduce exposure to malicious links embedded in phishing emails or messaging apps. Threat intelligence is crucial in the current cyber threat landscape, as it enables real-time awareness of tactics, techniques, and procedures (TTPs) used by attackers.

As this technology becomes more accessible, the lines between state-backed threats, organized cybercrime, and amateur experimentation will continue to blur. Understanding how tools like GhostGPT work and how to defend against them will become a differentiator for the UK channel community.

In conclusion, the emergence of GhostGPT has enabled rapid creation of persuasive phishing and social engineering scams that SMEs struggle to detect. It has made sophisticated malware development accessible to less skilled attackers, amplified the scale and speed of cyberattacks, and exacerbated challenges faced by cybersecurity teams. SMEs must take proactive measures to protect themselves against these AI-powered cyber threats.

References: 1. Department for Science, Innovation and Technology’s 2024 Cyber Security Breaches Survey 2. IBM's X-Force team 2023 study 3. UK government’s Cyber Security Breaches Survey 2024

  1. The emergence of GhostGPT as a new cybersecurity threat has been attributed to its accessibility, allowing even novice hackers to launch damaging attacks, particularly targeting small to medium-sized businesses.
  2. The AI-powered tool not only creates malware and phishing content but also provides step-by-step attack advice, including setting up command-and-control infrastructure, bypassing endpoint detection systems, and exploiting specific software vulnerabilities.
  3. To counteract this evolving threat in the general-news and crime-and-justice landscape, small to medium-sized businesses are advised to prioritize regular software patching, the use of multi-factor authentication, employee awareness training, and the implementation of endpoint detection and response systems, among other measures.

Read also:

    Latest