Use ChatGPT to generate malicious code and phishing e-mail
ChatGPT is programmed to actively refuse requests to generate illegal content, such as requests to build harmful code to steal data or send phishing emails.
According to a recent study by security firm Check Point Research, hackers have now identified a simple way to circumvent these restrictions and use them to sell unlawful services over the Internet’s underground forums.
Hackers took advantage of this technical flaw by exploiting an application programming interface for text-davinci-003, one of OpenAI’s GPT-3 models. GPT-3 is a model variation created primarily for chatbot applications. OpenAI provides GPT-3 APIs and other modeling APIs for developers to integrate AI bots into their applications. Nevertheless, there are no limits on harmful content in this version of API-GPT3.
Malicious content like phishing emails and harmful code can be generated in this manner without the same restrictions that ChatGPT puts on ordinary users.
A user of an underground forum posted a photo demonstrating that ChatGPT can fulfill any request.
The fact that hackers can use this ChatGPT gap to create dangerous material such as malicious code and phishing emails has prompted many concerns, particularly about the dangers to corporate email systems.
Hackers will prioritize targeting and exploiting businesses and organizations. In addition to financial gain, the ability to simply write dangerous code in phishing emails sent through ChatGPT flaws can result in common repercussions such as data loss and system downtime that harm the company’s image and reputation, etc.
What is the solution for businesses?
Implementing an email security solution can allow firms to operate more sustainably in the face of threats, particularly phishing emails. One such solution is the EG-Platform (Email Gateway).
EG-Platform will scan incoming emails in the virtual area paired with AI technology to handle even the most recent viruses for phishing emails containing dangerous codes. When a threat is discovered, the system converts the malicious URL into an image. The EG-Platform will next examine a number of other signals, such as email headers, email domains, sender IPs, and so on, to ensure that the proper false email is banned. The business email will thereafter be safeguarded and segregated from attack
Learn more about: How to effectively protect commercial e-mail
EG-Platform system blocks phishing and malicious emails
Whether you need to learn or experience the Mail Gateway EG-Platform service, email firewall technology can help you. For assistance, please call (028) 7306 8789, or firstname.lastname@example.org or send email to email@example.com for expert support and consultation.