Thursday, April 3, 2025
HomeCyber Security NewsOpenAI Shuts Down Accounts Used to Generate Phishing Emails & Malware

OpenAI Shuts Down Accounts Used to Generate Phishing Emails & Malware

Published on

SIEM as a Service

Follow Us on Google News

While Artificial Intelligence holds immense potential for good, its power can also attract those with malicious intent. 

State-affiliated actors, with their advanced resources and expertise, pose a unique threat, leveraging AI for cyberattacks that can disrupt infrastructure, steal data, and even harm individuals.

“We terminated accounts associated with state-affiliated threat actors. Our findings show our models offer only limited, incremental capabilities for malicious cybersecurity tasks.”

OpenAI teamed up with Microsoft Threat Intelligence to disrupt five state-affiliated groups attempting to misuse their AI services for malicious activities.

Document
Live Account Takeover Attack Simulation

How do Hackers Bypass 2FA?

Live attack simulation Webinar demonstrates various ways in which account takeover can happen and practices to protect your websites and APIs against ATO attacks.

State-affiliated groups

Two groups linked to China, known as Charcoal Typhoon and Salmon Typhoon,

The Iranian threat actor “Crimson Sandstorm,” North Korea’s “Emerald Sleet,” and Russia-affiliated group “Forest Blizzard.”

Charcoal Typhoon: Researched companies and cybersecurity tools, likely for phishing campaigns.

Salmon Typhoon: Translated technical papers, gathered intelligence on agencies and threats, and researched hiding malicious processes.

Crimson Sandstorm: Developed scripts for app and web development, crafted potential spear-phishing content, and explored malware detection evasion techniques.

Emerald Sleet: Identified security experts, researched vulnerabilities, assisted with basic scripting, and drafted potential phishing content.

Forest Blizzard: Conducted open-source research on satellite communication and radar technology while also using AI for scripting tasks.

OpenAI’s latest security assessments, conducted with experts, show that while malicious actors attempt to misuse AI like GPT-4, its capabilities for harmful cyberattacks remain relatively basic compared to readily available non-AI tools.

OpenAI strategy

Proactive Defense: actively monitor and disrupt state-backed actors misusing platforms with dedicated teams and technology.

Industry Collaboration: work with partners to share information and develop collective responses against malicious AI use.

Continuously Learning: analyze real-world misuse to improve safety measures and stay ahead of evolving threats.

Public Transparency: share insights about malicious AI activity and actions to promote awareness and preparedness.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Secure Ideas Achieves CREST Accreditation and CMMC Level 1 Compliance

Secure Ideas, a premier provider of penetration testing and security consulting services, proudly announces...

New Phishing Campaign Targets Investors to Steal Login Credentials

Symantec has recently identified a sophisticated phishing campaign targeting users of Monex Securities (マネックス証券),...

UAC-0219 Hackers Leverage WRECKSTEEL PowerShell Stealer to Extract Data from Computers

In a concerning development, CERT-UA, Ukraine's Computer Emergency Response Team, has reported a series...

Hunters International Linked to Hive Ransomware in Attacks on Windows, Linux, and ESXi Systems

Hunters International, a ransomware group suspected to be a rebrand of the infamous Hive...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

New Phishing Campaign Targets Investors to Steal Login Credentials

Symantec has recently identified a sophisticated phishing campaign targeting users of Monex Securities (マネックス証券),...

UAC-0219 Hackers Leverage WRECKSTEEL PowerShell Stealer to Extract Data from Computers

In a concerning development, CERT-UA, Ukraine's Computer Emergency Response Team, has reported a series...

Hunters International Linked to Hive Ransomware in Attacks on Windows, Linux, and ESXi Systems

Hunters International, a ransomware group suspected to be a rebrand of the infamous Hive...