Sunday, October 13, 2024
HomeCyber AIOver 100K+ Compromised ChatGPT Accounts on Dark Web Marketplaces

Over 100K+ Compromised ChatGPT Accounts on Dark Web Marketplaces

Published on

Malware protection

On illegal Dark Web Markets, more than 101,000 hacked accounts of the OpenAI language model ChatGPT were discovered.

These hacked credentials were found in the logs of information-stealing malware sold on illegal dark web markets.

Reports say in May 2023, there were 26,802 logs accessible that contained hacked ChatGPT accounts.

- Advertisement - SIEM as a Service

Info stealers are a sort of malware that gathers information from installed browsers on infected machines, including cookies, browsing history, bank card information, credentials saved in browsers, and other information, before sending it all to the malware operator.

Along with extensive information on the victim’s device, hackers can also gather information from emails and instant messengers.

Cyber intelligence firm, Group-IB says that most ChatGPT credentials for sale over the past year have been listed in the Asia-Pacific region. 

Rise of Compromised ChatGPT Accounts

Many employees are using chatbots to streamline their job, whether it be company communications or software development

ChatGPT, by default, keeps a record of all user inquiries and AI responses.

As a result, unauthorized access to ChatGPT accounts may reveal private or sensitive information that can be used to launch attacks specifically against businesses and their employees.

“Many enterprises are integrating ChatGPT into their operational flow.

Employees enter classified correspondences or use the bot to optimize proprietary code”, said Group-IB’s Dmitry Shestakov.

“Given that ChatGPT’s standard configuration retains all conversations, this could inadvertently offer a trove of sensitive intelligence to threat actors if they obtain account credentials.”

According to the information shared with Cyber Security News, a significant number of logs, including ChatGPT accounts, have been compromised by the infamous Raccoon information stealer.

Compromised ChatGPT accounts
Information stealers frequently exchange logs that include compromised data on dark web marketplaces.

The domain lists discovered in the logs and the information on the hacked host’s IP address are additional details about logs that are accessible on such markets.

Between June 2022 and May 2023, the Asia-Pacific area had the highest percentage (40.5%) of ChatGPT accounts that information stealers compromised.

Victims distribution

Consider disabling the platform’s chat saving option if you use ChatGPT to input sensitive data or delete such chats manually as soon as you’re done using the service.

Even if you do not save discussions to your ChatGPT account, the malware infection might still result in a data leak because many information stealers take screenshots of the compromised machine or carry out keylogging.

For this reason, people handling particularly sensitive data should only use solutions securely constructed locally and housed on their servers rather than entrusting any cloud-based services with it.

Looking For an All-in-One Multi-OS Patch Management Platform – 

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Threat Actor ProKYC Selling Tools To Bypass Two-Factor Authentication

Threat actors are leveraging a newly discovered deepfake tool, ProKYC, to bypass two-factor authentication...

Mozilla Warns Of Firefox Zero-Day Actively Exploited In Cyber Attacks

A critical use-after-free vulnerability affecting Firefox and Firefox Extended Support Release (ESR) is being...

SpyCloud Embeds Identity Analytics in Cybercrime Investigations Solution to Accelerate Insider and Supply Chain Risk Analysis & Threat Actor Attribution

IDLink, SpyCloud’s new automated digital identity correlation capability, is now core to its industry-leading...

Abusix and Red Sift Form New Partnership, Leveraging Automation to Mitigate Cyber Attacks

The agreement has marked over 600,000 fraudulent domains for takedown in just two months...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Threat Actor ProKYC Selling Tools To Bypass Two-Factor Authentication

Threat actors are leveraging a newly discovered deepfake tool, ProKYC, to bypass two-factor authentication...

Mozilla Warns Of Firefox Zero-Day Actively Exploited In Cyber Attacks

A critical use-after-free vulnerability affecting Firefox and Firefox Extended Support Release (ESR) is being...

Hackers Exploiting Zero-day Flaw in Qualcomm Chips to Attack Android Users

Hackers exploit a zero-day vulnerability found in Qualcomm chipsets, potentially affecting millions worldwide.The flaw,...