
Hacking with ChatGPT: Five A.I. Based Attacks for Offensive Security
ChatGPT may represent one of the biggest disruptions in modern history with it's powerful A.I based chatbot. But within weeks of ChatGPT's release, security researchers discovered several cases of people using ChatGPT for everything from malware development to exploit coding. In this video, take a look at the five ways attackers are utilizing ChatGPT for wrong doing. 0:14 Intro to ChatGPT / Natural Language Processing (NLP) & GPT 1:28 Using ChatGPT for Vulnerability Discovery 1:56 Vulnerability Prompts to Utilize 3:10 Writing Exploits 3:35 Exploit Prompts to Utilize 4:33 Malware Development 5:00 Malware Examples (Stealers, Command & Control) 5:42 Polymorphic Malware Development Using ChatGPT 6:21 A.I. Based Phishing using NLP (Natural Language Processing) 7:20 ChatGPT Advantages over Traditional Phishing Messages 7:41 Custom Messages Using GPT-3 8:04 Using Macros and LOLBINs 9:33 GPT-3 vs GPT-4 (Coming Soon) 9:56 Cybersecurity Considerations and Predictions
Hacking with ChatGPT: Five A.I. Based Attacks for Offensive Security
Introduction to Chat GBT
This section introduces Chat GBT, an AI chatbot that combines natural language processing (NLP) with the GPT-3 framework. It explains how NLP allows the model to understand human input, while GPT-3 uses over 175 billion data points to find answers.
Chat GBT Capabilities
- Chat GBT combines NLP and the GPT-3 framework to provide human-like responses.
- NLP processes user input and runs it through a neural network similar to the human brain.
- The hype around Chat GBT is real, with many success stories of people using it for various purposes.
Utilization of Chat GBT
This section discusses how people are utilizing Chat GBT for new business ventures, coding, and more. It also mentions that attackers have found ways to exploit Chat GBT for malicious purposes.
Positive Utilization of Chat GBT
- People are using Chat GBT for new business ventures and complex coding tasks.
- It offers accurate debugging and code writing capabilities.
Malicious Utilization of Chat GBT
- Attackers have discovered ways to utilize Chat GBT for nefarious purposes.
- Underground forums revealed instances of attackers using it for different types of attacks.
Top Five Ways Attackers Use Chat GPT
This section highlights the top five ways attackers are currently using Chat GPT for various kinds of attacks. It also mentions circumventing built-in security measures.
Finding Vulnerabilities in Code
- Programmers use Chat GPT's debugging ability to find bugs in code.
- Attackers can also utilize it to find security vulnerabilities by framing requests as a security researcher.
Exploiting Vulnerabilities
- Chat GPT can provide step-by-step instructions and exploit codes to utilize the found vulnerabilities.
- Researchers have successfully exploited vulnerabilities in popular applications using Chat GPT.
Commoditization of Attack Process
This section discusses how Chat GPT has commoditized traditionally complex steps in the attack process, making them accessible to script kiddies and junior hacking enthusiasts.
Utilizing Chat GPT for Exploits
- Researchers have used Chat GPT to find and write exploits for known applications.
- It provides all the necessary tools and payloads for successful exploitation.
Writing Complex Code with Chat GPT
This section highlights how attackers are leveraging the power of machine learning through Chat GPT to write powerful and complex code in any language. It also mentions the development of advanced malware by attackers.
Writing Advanced Malware
- Attackers are using Chat GPT to create advanced malware and other malicious tools.
- Examples include writing Python-based dealers that search for common file types.
Conclusion
Chat GBT combines NLP with the GPT-3 framework, offering human-like responses. While it has positive applications such as debugging code, attackers have found ways to exploit it for malicious purposes. They use it to find vulnerabilities, exploit them, and even write advanced malware. The power of machine learning through Chat GBT has made traditionally complex processes more accessible to a wider range of individuals.
The Threat of Polymorphic Malware
This section discusses the use of chat GPT's API to create polymorphic malware, which changes its code every time it is executed to evade signature-based detection from antivirus tools. The Cyber Arc cyber security team explains how they bypassed built-in safeguards on the web version and created a new type of undetectable malware.
Polymorphic Malware Creation
- Chat GPT's API was used by the Cyber Arc team to create polymorphic malware.
- Polymorphic malware changes its code with each execution, making it difficult for antivirus tools to detect.
- By evading signature-based detection, this type of malware can infect victims without being detected.
Bypassing Safeguards
- The Cyber Arc team wrote a technical write-up explaining how they bypassed built-in safeguards on the web version using the API directly in Python code.
- This allowed them to create a new type of malware that remains undetectable by traditional antivirus engines.
Natural Language Processing (NLP) Capabilities
- Chat GPT's success is attributed to its natural language processing (NLP) capabilities.
- It can write and respond to requests in a way that is indistinguishable from a human.
- These NLP capabilities have been utilized for various purposes such as creating marketing materials, sales scripts, screenplays, and even phishing emails.
Utilizing Chat GPT for Phishing Emails
This section explores how Chat GPT can be used to craft convincing phishing emails at scale. Its ability to generate well-written texts makes it difficult to distinguish from human-written emails.
Crafting Phishing Emails
- Chat GPT's writing capability can be utilized for crafting phishing emails at scale.
- Instead of asking for a specific phishing email, one can ask it to craft an email about a specific topic, such as year-end bonuses for targeted companies.
- The writing style can be adjusted to sound warm and friendly or more business-focused, depending on the desired approach.
Creating Lifelike Emails
- Chat GPT's ability to write exceptionally well allows phishing emails to appear realistic and indistinguishable from human-written ones.
- Attackers can ask Chat GPT to write the email in the form of a famous person or celebrity, further enhancing its lifelike nature.
- This enables attackers from different countries to create phishing emails in any language without translation errors.
Exploiting Macros and Living Off the Land Binaries (LOLbins)
This section explains how Chat GPT can be used to create macros and modify code for malicious purposes. It also introduces LOLbins, which are trusted pre-installed system tools used to spread malware.
Creating Macros
- Chat GPT can be utilized to create macros that automatically run when a file like a spreadsheet is opened.
- Attackers can embed links or files into phishing emails generated by Chat GPT, which victims may unknowingly click on.
- These macros can execute various actions based on the attacker's instructions.
Modifying Code with LOLbins
- Chat GPT can assist in modifying code written for regular applications like terminal or calculator.
- By changing the code from executing regular applications to living off the land binaries (LOLbins), attackers can use trusted system tools to spread malware.
- This technique allows them to bypass firewalls and open up victims' systems for further attacks.
AI's Impact on Security
This section highlights how AI advancements, such as Chat GPT's capabilities, are changing the landscape of cybersecurity. It emphasizes the need for security professionals to stay updated with AI advances and find innovative ways to utilize AI for defense.
AI's Growing Influence
- Chat GPT is based on the GPT-3 learning model, which currently has 175 billion parameters.
- The upcoming GPT-4 (gp34) will have 170 trillion parameters, making it a hundred times more powerful than Chat GPT.
- AI's rapid advancement is outpacing the capabilities of traditional security measures.
Changing Attack Surface
- AI advancements have made traditionally complex attacks easier for even amateur attackers to deploy.
- This leads to an increase in less sophisticated attacks but also provides advanced attackers with new capabilities and tools.
- Security professionals must keep up with AI advances and think innovatively to utilize AI for defense against evolving threats.
Conclusion and Call for Innovative Use of AI
This section concludes by encouraging individuals to embrace the power of AI and find ways to leverage its capabilities for improvement rather than fearing job replacement. It emphasizes the need for innovative use of AI in various processes, including cybersecurity defense.
Embracing AI's Potential
- Instead of worrying about job replacement, individuals should focus on utilizing AI's capabilities to enhance processes and improve efficiency.
- The power of AI can be harnessed in various fields, including cybersecurity defense.
Call for Innovation
- Security professionals need to stay updated with AI advancements and think creatively about how to leverage its potential for defense purposes.
- Adversaries are already using AI offensively, so it is crucial to develop innovative strategies that utilize AI effectively in security practices.