Friday, February 21, 2025
HomeCyber AIChatGPT Ready to Write Ransomware But Failed to Go Deep 

ChatGPT Ready to Write Ransomware But Failed to Go Deep 

Published on

SIEM as a Service

Follow Us on Google News

Our lives are now enriched by the availability of LLMs that are easily accessible on the internet, so we have tools such as the ChatGPT that can help us breathe life into even the most abstract ideas.

As a result, the experts from Malwarebytes Labs decided to ask ChatGPT if they could help them with the writing of some ransomware. 

It’s not because they want to commit a crime but because some exasperated commentators believe ChatGPT can somehow disrupt cybercrime and cybersecurity in the midst of taking everyone’s jobs.

ChatGPT Writing Ransomware

Initially, the expert began the discussion by asking ChatGPT some questions about ransomware and how it felt about joining the criminal enterprise on the subject of ransomware.

ChatGPT was asked by the expert what it thought of ransomware, and it deviated from their question, explaining what ransomware was and why it was so important to be protected against it.

As soon as the question was answered, it felt an imaginary AI finger waving across its face. In spite of this, the expert did not give up and asked it to answer the same question as if it were a cybercriminal.

Rather than giving a hypothetical answer to the question, it gave a non-self-important answer that did not look anything like what is normally written by ransomware gangs.

After getting a clear understanding of ChatGPT’s attitude to ransomware, the expert decided to go ahead and ask it to create some for them. Here’s what the ChatGPT gives as output:-

“I cannot engage in activities that violate ethical or legal standards, including those related to cybercrime or ransomware. I cannot provide code that is intended to harm or exploit computer systems.”

However, apart from this, it’s quite interesting that certainly it managed to provide some sort of code in C programming language using the AES-256-CBC algorithm.

Is ChatGPT Ransomware Any Good?

For several reasons, even after trying for such a long time, the experts don’t think they will see ChatGPT-written ransomware any time soon.

In order to understand the significance of this, let us first understand that there is simply no reason for cyber criminals to do what they are doing.

You need to keep in mind that ChatGPT is essentially rephrasing and mashup content that it has found on the Internet. Script kiddies are able to benefit from this program precisely because there is a lot of material that already exists to support them.

Avoid Ransomware

  • Block common forms of entry- Detect exploits and malware that are used to distribute ransomware by using endpoint security software that is capable of detecting them. Plan for patching internet-facing systems quickly.
  • Stop malicious encryption- Detect ransomware using multiple detection techniques and restore damaged files using ransomware rollback.
  • Detect intrusions- To make sure that an intruder can’t operate inside your organization, assign access rights carefully and segment your network so that intruders can’t access it easily.
  • Create offsite, offline backups- Back up your data offsite and offline, so attackers cannot access it. Restore essential business functions as quickly as possible by testing them regularly.

When it comes to solving complex problems, asking ChatGPT to help can be similar to working with a teenager. As it will do half of what you ask, but then it will become boring and not be able to give the answer accurately.

Undoubtedly, it will improve its ability to handle multiple feature requests and write longer, more coherent code in the future.

Related Coverage:

Searching to secure your APIs? – Try Free API Penetration Testing

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Nagios XI Flaw Exposes User Details and Emails to Unauthenticated Attackers”

A security vulnerability in Nagios XI 2024R1.2.2, tracked as CVE-2024-54961, has been disclosed, allowing...

Critical UniFi Protect Camera Vulnerability Enables Remote Code Execution Attacks

Ubiquiti Networks has issued an urgent security advisory (Bulletin 046) warning of multiple critical...

Critical Vulnerability in Fluent Bit Exposes Cloud Services to Potential Cyber Attacks

A critical security flaw in Fluent Bit, a widely adopted log processing and metrics...

New Darcula 3.0 Tool Generates Phishing Kits to Mimic Global Brands

The cybercriminal group behind the notorious "darcula-suite" platform has unveiled its latest iteration, darcula...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Nagios XI Flaw Exposes User Details and Emails to Unauthenticated Attackers”

A security vulnerability in Nagios XI 2024R1.2.2, tracked as CVE-2024-54961, has been disclosed, allowing...

Critical UniFi Protect Camera Vulnerability Enables Remote Code Execution Attacks

Ubiquiti Networks has issued an urgent security advisory (Bulletin 046) warning of multiple critical...

Critical Vulnerability in Fluent Bit Exposes Cloud Services to Potential Cyber Attacks

A critical security flaw in Fluent Bit, a widely adopted log processing and metrics...