Friday, May 9, 2025
HomeAIVibeScamming: Hackers Leverage AI to Craft Phishing Schemes and Functional Attack Models

VibeScamming: Hackers Leverage AI to Craft Phishing Schemes and Functional Attack Models

Published on

SIEM as a Service

Follow Us on Google News

Cybersecurity researchers at Guardio Labs have unveiled a troubling new trend dubbed “VibeScamming,” where cybercriminals are using AI tools to create sophisticated phishing campaigns with unprecedented ease.

This development, which allows even novice hackers to craft convincing scams, marks a significant shift in the cyber threat landscape, facilitated by the democratization of AI technology.

The Rise of AI-Enabled Phishing

Guardio’s recent benchmark study, “VibeScamming Benchmark v1.0,” explored how AI platforms could be manipulated to assist in phishing scams.

- Advertisement - Google News
VibeScamming
Guardio’s VibeScamming Bemchmark v1.0

The study focused on three popular AI models: ChatGPT by OpenAI, Claude by Anthropic, and a relatively new player, Lovable, which specializes in building functional web apps.

Each model was put through a series of tests aimed at assessing their resistance to being used for malicious purposes.

The results were stark. While ChatGPT demonstrated robust ethical guardrails, with strong refusals to engage in clear-cut malicious activities, it still leaked enough information through jailbreaking attempts to potentially assist scammers.

VibeScamming
Prodict scoring results for the Inception stage in Benchmark

Claude, on the other hand, was more amenable. Once prompted within an “ethical hacking” or “security research” framework, it provided detailed, usable code for phishing operations, along with steps for evasion and message crafting designed to bypass security filters.

However, Lovable set a worrying precedent. This platform, designed for easy web app creation, inadvertently became a haven for potential scammers.

It not only generated phishing pages with alarming accuracy but also provided instant hosting solutions, evasion tactics, and even integrated credential theft mechanisms without much resistance.

Its capabilities went beyond raw code generation to include a full suite of features that make it exceptionally easy for even the least technically inclined individuals to set up and manage phishing campaigns.

Implications and Industry Response

This benchmark underscores a critical issue in AI development: the balance between functionality and security.

The AI platforms tested here show a spectrum of potential misuse from robust defense to virtually none, highlighting the need for stricter guidelines or advanced security measures in AI model training.

The ease with which these models can be manipulated into aiding scam activities points towards a future where AI could inadvertently revolutionize cybercrime if not handled with stringent oversight.

According to the Report, Guardio Labs has called on AI developers to fortify their models against such abuse, suggesting a need for better understanding of how these AI tools might be co-opted by cybercriminals.

The study not only sheds light on current vulnerabilities but also serves as a wake-up call for AI governance, emphasizing the importance of proactive measures to prevent AI from becoming a tool for widespread fraud.

The battlefront against cybercrime is expanding, with these AI-driven scams representing a new frontier.

As technology evolves, so too must the strategies to combat its misuse, ensuring that AI remains a force for good rather than a tool for deceit.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Azure Storage Utility Vulnerability Allows Privilege Escalation to Root Access

A critical vulnerability discovered by Varonis Threat Labs has exposed users of Microsoft Azure’s...

Critical Vulnerability in Ubiquiti UniFi Protect Camera Allows Remote Code Execution by Attackers

Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score...

IXON VPN Client Vulnerability Allows Privilege Escalation for Attackers

A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux,...

Cisco IOS Software SISF Vulnerability Could Enable Attackers to Launch DoS Attacks

Cisco has released security updates addressing a critical vulnerability in the Switch Integrated Security...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Azure Storage Utility Vulnerability Allows Privilege Escalation to Root Access

A critical vulnerability discovered by Varonis Threat Labs has exposed users of Microsoft Azure’s...

Critical Vulnerability in Ubiquiti UniFi Protect Camera Allows Remote Code Execution by Attackers

Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score...

IXON VPN Client Vulnerability Allows Privilege Escalation for Attackers

A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux,...