Exploring the Dark Side of AI: Advanced Phishing Attack Design and Deployment Using ChatGPT

09/19/2023
by   Nils Begou, et al.
0

This paper explores the possibility of using ChatGPT to develop advanced phishing attacks and automate their large-scale deployment. We make ChatGPT generate the following parts of a phishing attack: i) cloning a targeted website, ii) integrating code for stealing credentials, iii) obfuscating code, iv) automating website deployment on a hosting provider, v) registering a phishing domain name, and vi) integrating the website with a reverse proxy. The initial assessment of the automatically generated phishing kits highlights their rapid generation and deployment process as well as the close resemblance of the resulting pages to the target website. More broadly, we demonstrate that recent advances in AI underscore the potential risks of its misuse in phishing attacks, which can lead to their increased prevalence and severity. This highlights the necessity for enhanced countermeasures within AI systems.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/28/2020

AI in the "Real World": Examining the Impact of AI Deployment in Low-Resource Contexts

As AI becomes integrated throughout the world, its potential for impact ...
research
08/04/2023

Vulnerabilities in AI Code Generators: Exploring Targeted Data Poisoning Attacks

In this work, we assess the security of AI code generators via data pois...
research
10/04/2021

Leaked-Web: Accurate and Efficient Machine Learning-Based Website Fingerprinting Attack through Hardware Performance Counters

Users' website browsing history contains sensitive information, like hea...
research
04/15/2020

Advanced Evasion Attacks and Mitigations on Practical ML-Based Phishing Website Classifiers

Machine learning (ML) based approaches have been the mainstream solution...
research
02/15/2018

Optimizing Precision for Open-World Website Fingerprinting

Traffic analysis attacks to identify which web page a client is browsing...
research
03/21/2019

On Preempting Advanced Persistent Threats Using Probabilistic Graphical Models

This paper presents PULSAR, a framework for pre-empting Advanced Persist...
research
03/07/2018

A first look at browser-based Cryptojacking

In this paper, we examine the recent trend towards in-browser mining of ...

Please sign up or login with your details

Forgot password? Click here to reset