Saturday, July 19, 2025
25.2 C
Tallinn

ChatGPT: What Cybersecurity Dangers Lurk Behind This Impressive New Technology?

ChatGPT, a chatbot that uses deep learning techniques to generate text and conversations that can convince basically anyone that it was written by a real person

JOHANNESBURG, South Africa, February 17, 2023/ — It is now possible to use a publicly available artificial chatbot to generate a complete infection chain, possibly beginning with a spear phishing email written in entirely convincing, human-like language and eventually causing a complete takeover of a company’s computer systems.

Researchers at Checkpoint recently created such a plausible phishing email as a test. They only used ChatGPT, a chatbot that uses deep learning techniques to generate text and conversations that can convince basically anyone that it was written by a real person.

Anna Collard, SVP Content Strategy & Evangelist KnowBe4 Africa

In reality, there are many potential cybersecurity dangers wrapped up in this impressive technology developed by OpenAI and currently available online for free.

Here are just a few of them:

Social engineering: ChatGPT’s powerful language model can be used to generate realistic and convincing phishing messages, making it easier for attackers to trick victims into providing sensitive information or downloading malware.

Scamming: The generation of text through ChatGPT’s language models allows attackers to create fake ads, listings and many other forms of scamming material.

Impersonation: ChatGPT can be used to create a convincing digital copy of an individual’s writing style, allowing attackers to impersonate their target in a text-based setting, such as in an email or text message.

Automation of attacks: ChatGPT can also be used to automate the creation of malicious messages and phishing emails making it possible for attackers to launch large-scale attacks more efficiently.

Spamming: The language model can be fine-tuned to produce large amounts of low-quality content, which can be used in a variety of contexts, including as spam comments on social media or in spam email campaigns.

All five points above are legit threats to companies and all internet users that will only become more prevalent as OpenAI continues to train its model.

If the list managed to convince you, the technology succeeded in its purpose, although in this instance not with malicious intent.

All the text from points one to five was actually written by ChatGPT with minimal tweaks for clarity. The tool is so powerful it can convincingly identify and word its own inherent dangers to cybersecurity.

However, there are mitigating steps individuals and companies can take, including new-school security awareness training. Cybercrime is moving at light speed. A few years ago, cybercriminals used to specialize in identity theft, but now they take over your organisation’s network, hack into your bank accounts, and steal tens or hundreds of thousands of rands.

An intelligent platform like ChatGPT may have been created with the best intentions, but it only adds to the burden on internet users to always stay vigilant, trust their instincts and always know the risks involved in clicking on any link or opening an attachment.

By Anna Collard

Anna Collard is SVP Content Strategy & Evangelist at KnowBe4 Africa

Hot this week

U.S. Hails Qatar-Brokered DRC-M23 Declaration as Step Toward Lasting Peace

WASHINGTON (Chatnewstv.com) — The United States on Saturday welcomed...

Op-Ed: Hamas At A Crossroads By Ehud Yaari

Today's Hamas is a very different organization from the...

AIPAC Applauds House for Overwhelming Rejection of Cuts to Israeli Missile Defense

WASHINGTON (Chatnewstv.com) — The American Israel Public Affairs Committee...

Bayern keeper Peretz to join SV Hamburg on loan

Agency Report - Bayern Munich reserve goalkeeper Daniel Peretz is...

U.S. Rejects 2024 WHO Health Amendments (2005)

WASHINGTON (Chatnewstv.com) — The United States on Friday formally...

Latest

U.S. Hails Qatar-Brokered DRC-M23 Declaration as Step Toward Lasting Peace

WASHINGTON (Chatnewstv.com) — The United States on Saturday welcomed...

Op-Ed: Hamas At A Crossroads By Ehud Yaari

Today's Hamas is a very different organization from the...

AIPAC Applauds House for Overwhelming Rejection of Cuts to Israeli Missile Defense

WASHINGTON (Chatnewstv.com) — The American Israel Public Affairs Committee...

Bayern keeper Peretz to join SV Hamburg on loan

Agency Report - Bayern Munich reserve goalkeeper Daniel Peretz is...

U.S. Rejects 2024 WHO Health Amendments (2005)

WASHINGTON (Chatnewstv.com) — The United States on Friday formally...

Germany deports 81 Afghan offenders on repatriation flight

Agency Report - Germany deported 81 Afghans back to Afghanistan...

EU Extends Gas Storage Rules by Two Years to Safeguard Winter Energy Supply

BRUSSELS (Chatnewstv.com) — The Council of the European Union...

EU Delays Battery Due Diligence Rules to 2027 to Ease Industry Burden

BRUSSELS (Chatnewstv.com) — The Council of the European Union...
spot_img

Related Articles

Popular Section

spot_imgspot_img

MORE FROM CHATNEWSTV

Op-Ed: Hamas At A Crossroads By Ehud Yaari

Today's Hamas is a very different organization from the one we knew from its formal establishment in December 1987 through its surprise attack on...

Even after the One Big Beautiful Bill, Loopholes Allow Illegal Alien Adults to Receive Welfare and Other Benefits By Matt Weidinger

One major set of policies Republicans touted in their One Big Beautiful Bill (now officially Public Law 119-21, signed on July 4, 2025) sought to end government benefit...

Seats of Power: Aides, hyenas and why some level of dictatorship is needed in a growing democracy

Handlers could be full of mischief or just manipulators. Most Leaders don't have a full grasp of what is going on.  While their 'loyal'...

Op-Ed: Why Nigeria’s Election Petition System is Unconstitutional By Chidi Anselm Odinkalu

“Sovereignty belongs to the people of Nigeria from whom government through this Constitution derives all its powers and authority.” Section 14(2), Constitution of the...

Op-Ed: Security chiefs, editors, ‘off-the-record’ and other confidential rules by Yushau A. Shuaib

A recent debate has reignited an enduring ethical dilemma in media circles: what should or should not be published? By its very nature, journalism thrives...

Op-Ed: The Imperialism of Foreign Religions By Austin Orette

While Africans opine about imperialism of the west and others, the least talked about and the most lethal of all the isms, is the...

Op-Ed: The Age of the Judicial Impostor in Nigeria Must End By Chidi Anselm Odinkalu

A little over two decades ago, away from its perception as a shrine for the resolution of the most rarefied disputes in the country,...

Iran’s Nuclear Program: How India Can Play a Big Role By Michael Rubin

A shaky ceasefire may now exist after 12 days of Israeli airstrikes on Iran, Iranian missile barrages against Israel, and the U.S. use of...

Op-Ed: The Nyesom Wike That Many Don’t Know: A Testament To Statesmanship By Lawrence Pepple

It is no longer a secret that before the ink had dried on the handing-over and taking-over documents, and before we could roll out...