The Times Australia
The Times World News

.
The Times Real Estate

.

FraudGPT and other malicious AIs are the new frontier of online threats. What can we do?

  • Written by Bayu Anggorojati, Assistant Professor, Cyber Security, Monash University



The internet, a vast and indispensable resource for modern society, has a darker side where malicious activities thrive.

From identity theft[1] to sophisticated malware attacks[2], cyber criminals keep coming up with new scam methods.

Widely available generative artificial intelligence (AI) tools have now added a new layer of complexity to the cyber security landscape. Staying on top of your online security is more important than ever.

The rise of dark LLMs

One of the most sinister adaptations of current AI is the creation of “dark LLMs[3]” (large language models).

These uncensored versions of everyday AI systems like ChatGPT are re-engineered for criminal activities. They operate without ethical constraints and with alarming precision and speed.

Cyber criminals deploy dark LLMs[4] to automate and enhance phishing campaigns, create sophisticated malware and generate scam content.

To achieve this, they engage in LLM “jailbreaking”[5] – using prompts to get the model to bypass its built-in safeguards and filters.

For instance, FraudGPT[6] writes malicious code, creates phishing pages and generates undetectable malware. It offers tools for orchestrating diverse cybercrimes, from credit card fraud[7] to digital impersonation[8].

FraudGPT is advertised on the dark web and the encrypted messaging app Telegram. Its creator openly markets its capabilities, emphasising the model’s criminal focus.

Another version, WormGPT[9], produces persuasive phishing emails that can trick even vigilant users. Based on the GPT-J[10] model, WormGPT is also used for creating malware and launching “business email compromise[11]” attacks – targeted phishing of specific organisations.

What can we do to protect ourselves?

Despite the looming threats, there is a silver lining. As the challenges have advanced, so have the ways we can defend against them.

AI-based threat detection tools can monitor malware and respond to cyber attacks more effectively. However, humans need to stay in the mix to keep an eye on how these tools respond, what actions they take, and whether there are vulnerabilities to fix.

You may have heard keeping your software up to date is crucial for security. It might feel like a chore, but it really is a critical defence strategy. Updates patch up the vulnerabilities that cyber criminals try to exploit.

Are your files and data regularly backed up? It’s not just about preserving files in case of a system failure. Regular backups are a fundamental protection strategy. You can reclaim your digital life without caving to extortion if you are targeted by a ransomware attack[12] – when criminals lock up your data and demand a ransom payment before they release it.

Cyber criminals who send phishing messages can leave clues[13] like poor grammar, generic greetings, suspicious email addresses, overly urgent requests or suspicious links. Developing an eye for these signs is as essential as locking your door at night.

If you don’t already use strong, unique passwords[14] and multi-factor authentication, it’s time to do so. This combination multiplies your security, making it dramatically more difficult for criminals to access your accounts.

Read more: What is multi-factor authentication, and how should I be using it?[15]

What can we expect in the future?

Our online existence will continue to intertwine with emerging technologies like AI. We can expect more sophisticated cyber crime tools to emerge, too.

Malicious AI will enhance phishing[16], create sophisticated malware[17] and improve data mining for targeted attacks[18]. AI-driven hacking tools will become widely available and customisable.

In response, cyber security will have to adapt, too. We can expect automated threat hunting, quantum-resistant encryption[19], AI tools that help to preserve privacy[20], stricter regulations and international cooperation.

The role of government regulations

Stricter government regulations on AI[21] are one way to counter these advanced threats. This would involve mandating the ethical development and deployment of AI technologies, ensuring they are equipped with robust security features[22] and adhere to stringent standards[23].

In addition to tighter regulations, we also need to improve how organisations respond to cyber incidents and what mechanisms there are for mandatory reporting[24] and public disclosure[25].

By requiring companies to promptly report cyber incidents, authorities can act swiftly. They can mobilise resources to address breaches before they escalate into major crises.

This proactive approach can significantly mitigate the impact of cyber attacks, preserving both public trust and corporate integrity[26].

Furthermore, cyber crime knows no borders. In the era of AI-powered cyber crime, international collaboration is essential. Effective global cooperation can streamline how authorities track and prosecute cyber criminals, creating a unified front against cyber threats.

As AI-powered malware proliferates, we’re at a critical junction in the global tech journey: we need to balance innovation (new AI tools, new features, more data) with security and privacy.

Overall, it’s best to be proactive about your own online security. That way you can stay one step ahead in the ever-evolving cyber battleground.

References

  1. ^ identity theft (www.cnet.com)
  2. ^ malware attacks (www.securitymagazine.com)
  3. ^ dark LLMs (arxiv.org)
  4. ^ Cyber criminals deploy dark LLMs (github.com)
  5. ^ LLM “jailbreaking” (www.ft.com)
  6. ^ FraudGPT (abnormalsecurity.com)
  7. ^ credit card fraud (www.cnbc.com)
  8. ^ digital impersonation (www.forbes.com)
  9. ^ WormGPT (slashnext.com)
  10. ^ GPT-J (huggingface.co)
  11. ^ business email compromise (www.cyber.gov.au)
  12. ^ ransomware attack (theconversation.com)
  13. ^ clues (consumer.ftc.gov)
  14. ^ strong, unique passwords (theconversation.com)
  15. ^ What is multi-factor authentication, and how should I be using it? (theconversation.com)
  16. ^ enhance phishing (www.metacompliance.com)
  17. ^ sophisticated malware (www.tandfonline.com)
  18. ^ data mining for targeted attacks (www.ibm.com)
  19. ^ quantum-resistant encryption (www.technologyreview.com)
  20. ^ AI tools that help to preserve privacy (www.microsoft.com)
  21. ^ government regulations on AI (theconversation.com)
  22. ^ robust security features (theconversation.com)
  23. ^ stringent standards (www.connectwise.com)
  24. ^ there are for mandatory reporting (theconversation.com)
  25. ^ public disclosure (theconversation.com)
  26. ^ corporate integrity (theconversation.com)

Read more https://theconversation.com/fraudgpt-and-other-malicious-ais-are-the-new-frontier-of-online-threats-what-can-we-do-234820

The Times Features

An Introduction to Complete Hip Replacement Surgery

Hip replacement or total hip arthroplasty is a relatively common medical procedure to regain mobility and bring an end to incessant pain in victims of extreme pain in the hip joi...

2 in 3 Melbourne Families Are Downsizing—But Not for the Reason You Think, Says Big Stuff Movers

MELBOURNE, AUSTRALIA — [16-05-25] — In a city known for its vibrant culture and sprawling suburbs, a quiet revolution is underway. According to recent internal data from Big Stuf...

Runway With a Hug: Gary Bigeni’s Colourful Comeback

By Cesar Ocampo Photographer | AFW 2025 Some designers you photograph once, admire from afar, and move on. But others — like Gary Bigeni — pull you in and never let go. Not becaus...

Tassie’s best pie enters NSW with the launch National Pies’ new fresh range

Fresh from Tasmanian Bakeries in Hobart, National Pies has just delivered Tassie’s best-selling pie to the ready meals aisles of Woolworths stores across NSW.  The delicious roll o...

IORDANES SPYRIDON GOGOS RUNWAY | AFW 2025

Fifth Collection by ISG | Words + Photography by Cesar Ocampo Some runway shows are about the clothes. Others are about the culture they carry. With Iordanes Spyridon Gogos, it’s ...

AJE Resort ‘26 — “IMPRESSION”

Photographed by Cesar Ocampo | AFW 2025 Day 3, Barangaroo Pier Pavilion There are runways, and then there are moments. Aje’s Resort ‘26 collection, IMPRESSION, wasn’t just a fashi...

Times Magazine

Senior of the Year Nominations Open

The Allan Labor Government is encouraging all Victorians to recognise the valuable contributions of older members of our community by nominating them for the 2025 Victorian Senior of the Year Awards.  Minister for Ageing Ingrid Stitt today annou...

CNC Machining Meets Stage Design - Black Swan State Theatre Company & Tommotek

When artistry meets precision engineering, incredible things happen. That’s exactly what unfolded when Tommotek worked alongside the Black Swan State Theatre Company on several of their innovative stage productions. With tight deadlines and intrica...

Uniden Baby Video Monitor Review

Uniden has released another award-winning product as part of their ‘Baby Watch’ series. The BW4501 Baby Monitor is an easy to use camera for keeping eyes and ears on your little one. The camera is easy to set up and can be mounted to the wall or a...

Top Benefits of Hiring Commercial Electricians for Your Business

When it comes to business success, there are no two ways about it: qualified professionals are critical. While many specialists are needed, commercial electricians are among the most important to have on hand. They are directly involved in upholdin...

The Essential Guide to Transforming Office Spaces for Maximum Efficiency

Why Office Fitouts MatterA well-designed office can make all the difference in productivity, employee satisfaction, and client impressions. Businesses of all sizes are investing in updated office spaces to create environments that foster collaborat...

The A/B Testing Revolution: How AI Optimized Landing Pages Without Human Input

A/B testing was always integral to the web-based marketing world. Was there a button that converted better? Marketing could pit one against the other and see which option worked better. This was always through human observation, and over time, as d...

LayBy Shopping