M. Chowdhury, Nafiz Rifat, Shadman Latif, M. Ahsan, Md Saifur Rahman, Rahul Gomes
{"title":"ChatGPT: The Curious Case of Attack Vectors' Supply Chain Management Improvement","authors":"M. Chowdhury, Nafiz Rifat, Shadman Latif, M. Ahsan, Md Saifur Rahman, Rahul Gomes","doi":"10.1109/eIT57321.2023.10187385","DOIUrl":null,"url":null,"abstract":"The field of Natural Language Processing has observed significant advancements in the development of sophisticated conversational Artificial Intelligence systems. ChatGPT is one such state-of-the-art conversational system that has attracted considerable interest and adoption. It enables developers to create highly interactive and engaging conversational applications using deep neural networks to produce human-like responses to user inputs. Such capabilities have made it popular in the threat actors' world. However, threat actors can abuse this chatbot to generate attack vectors as part of an operation. ChatGPT can be abused to produce practical and realistic communications that can be used in phishing attacks. These communications help the attack vectors distribution, i.e., prompt users to download and set up malware or disclose confidential information. ChatGPT has security measures to prevent malicious queries from generating attack vectors. However, the threat actors can circumvent such security controls through deception. This abusive use of ChatGPT makes the supply chain management of attack vectors effective and efficient. In this study, we presented evidence from various sources, showing how ChatGPT is abused to help the threat actors to improve each step of the attack vectors' supply chain management.","PeriodicalId":113717,"journal":{"name":"2023 IEEE International Conference on Electro Information Technology (eIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE International Conference on Electro Information Technology (eIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/eIT57321.2023.10187385","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
The field of Natural Language Processing has observed significant advancements in the development of sophisticated conversational Artificial Intelligence systems. ChatGPT is one such state-of-the-art conversational system that has attracted considerable interest and adoption. It enables developers to create highly interactive and engaging conversational applications using deep neural networks to produce human-like responses to user inputs. Such capabilities have made it popular in the threat actors' world. However, threat actors can abuse this chatbot to generate attack vectors as part of an operation. ChatGPT can be abused to produce practical and realistic communications that can be used in phishing attacks. These communications help the attack vectors distribution, i.e., prompt users to download and set up malware or disclose confidential information. ChatGPT has security measures to prevent malicious queries from generating attack vectors. However, the threat actors can circumvent such security controls through deception. This abusive use of ChatGPT makes the supply chain management of attack vectors effective and efficient. In this study, we presented evidence from various sources, showing how ChatGPT is abused to help the threat actors to improve each step of the attack vectors' supply chain management.