Sunday, July 14, 2024

ChatGPT Can Be Used to Create Dangerous Polymorphic Malware

The cybersecurity experts at CyberArk have provided information on the mechanism by which the ChatGPT AI chatbot can produce a new strain of polymorphic malware.

Polymorphic malware could be easily made using ChatGPT. With relatively little effort or expenditure on the part of the attacker, this malware’s sophisticated capabilities can readily elude security tools and make mitigation difficult.

Malicious software called ‘Polymorphic Malware’ has the capacity to alter its source code in order to avoid detection by antivirus tools. It is a very potent threat because it may quickly change and propagate before security systems can catch it.

ChatGPT and Polymorphic Malware

According to researchers, getting around the content filters that prevent the chatbot from developing dangerous software is the first step. The bot was instructed to complete the task while adhering to a number of constraints, and the researchers were given a working code as an outcome.

It is been observed that the ChatGPT system doesn’t appear to use its content filter while utilizing the API. Researchers say the reason for this is unknown.

OpenAI's ChatGPT Can Create Polymorphic Malware
Basic DLL injection into explorer.exe

“In other words, we can mutate the output on a whim, making it unique every time. Moreover, adding constraints like changing the use of a specific API call makes security products’ lives more difficult,” researchers.

The ability of ChatGPT to quickly create and continuously mutate injectors is one of its significant features.

It is feasible to develop a polymorphic programme that is highly evasive and challenging to detect by repeatedly asking the chatbot and obtaining a different piece of code each time, say the researchers.

Researches indicate that attackers can create a wide variety of malware by utilizing ChatGPT’s capacity to generate various persistence tactics, malicious payloads, and anti-VM modules.
Interactions between the C&C, ChatGPT, and the Malware

The main drawback of this strategy is that, after it has infected the target computer, the malware is built of clearly malicious code, making it easy to find by security tools like antivirus, EDRs, etc. 

This frequently takes the form of plugins, like DLLs that are loaded into memory in a reflective manner, or by running PowerShell scripts, leaving it susceptible to detection and disruption by these security measures.

Researchers explain that it is easy to obtain new code or alter old code by requesting certain capabilities from ChatGPT, such as code injection, file encryption, or persistence. This leads to polymorphic malware that frequently does not display suspicious logic when in memory and does not behave maliciously when placed on a disc.

As it finally executes and runs Python code, its high level of modularity and adaptability will allow it to get around security technologies that rely on signature-based detection, including Anti-Malware Scanning Interface (AMSI).

Final Word

For security experts, the use of ChatGPT’s API in malware can pose serious difficulties. It’s crucial to keep in mind that this is a very real problem, not just a speculative one. Being informed and on the lookout is crucial in this field because it is continuously changing.

Network Security Checklist – Download Free E-Book


Latest articles

mSpy Data Breach: Millions of Customers’ Data Exposed

mSpy, a widely used phone spyware application, has suffered a significant data breach, exposing...

Advance Auto Parts Cyber Attack: Over 2 Million Users Data Exposed

RALEIGH, NC—Advance Stores Company, Incorporated, a prominent commercial entity in the automotive industry, has...

Hackers Using ClickFix Social Engineering Tactics to Deploy Malware

Cybersecurity researchers at McAfee Labs have uncovered a sophisticated new method of malware delivery,...

Coyote Banking Trojan Attacking Windows Users To Steal Login Details

Hackers use Banking Trojans to steal sensitive financial information. These Trojans can also intercept...

Hackers Created 700+ Fake Domains to Sell Olympic Games Tickets

As the world eagerly anticipates the Olympic Games Paris 2024, a cybersecurity threat has...

Japanese Space Agency Spotted zero-day via Microsoft 365 Services

The Japan Aerospace Exploration Agency (JAXA) has revealed details of a cybersecurity incident that...

Top 10 Active Directory Management Tools – 2024

Active Directory Management Tools are essential for IT administrators to manage and secure Active...
Guru baran
Guru baran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles