• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
IT Infrastructure, Network Security, News

That Didn’t Take Long: Hackers Are Beginning to Leverage ChatGPT

Hackers are beginning to explore how to incorporate ChatGPT into their hacking activities, according to Check Point Software.

January 9, 2023 Zachary Comeau Leave a Comment

ChatGPT, OpenAI, iOS, Mobile, App
stock.adobe.com/Rokas

OpenAI’s conversational AI chatbot ChatGPT has captured the attention of the tech industry, with the technology already helping IT professionals and developers create scripts and write code via a free preview. The use cases extend to essentially replacing or adding to search engines to help create a more engaging experience for users looking for information.

However, the chatbot’s ability to write code and solve technical problems is also opening another use case: hacking.

According to cybersecurity firm Check Point Software, analysis of several major underground hacking forums show that hackers are already using ChatGPT to develop malicious tools, especially for those threat actors without development skills.

In one case analyzed by Check Point’s researchers, a threat actor posted on a forum about experimenting with ChatGPT to recreate malware strains and techniques described in research publications and write-ups about common malware. One example included code of a Python-based stealer that searcher for common file types, copies them to a random folder inside the Temp folder, ZIPs them and uploads them to a hardcoded FTP server.

Indeed, the firm’s analysis of the script confirms the cybercriminals claims of creating a basic infostealer which searchers for 12 common file types, such as Microsoft Office documents, PDFs and images.

“If any files of interest are found, the malware copies the files to a temporary directory, zips them, and sends them over the web,” Check Point researchers write. “It is worth noting that the actor didn’t bother encrypting or sending the files securely, so the files might end up in the hands of 3rd parties as well.”

Another example analyzed by researchers is a simple Java snippet designed to download PuTTY, a common SSH and telnet client that runs covertly on a system using PowerShell. The script can be modified to download and run any program, including common malware families, researchers say.

The posts are consistent with the threat actor’s other posts, which include several scripts like automation of the post-exploitation phase, and a C++ program that attempts to phish for user credentials.

In short, this particular hacker spears to endeavor to show less technically capable hackers how to utilize ChatGPT for malicious purposes.

In another example of threat actors sharing how ChatGPT helped them create malware, a hacker posted on a forum a Python script which they said was the first they ever created with help from OpenAI. The script at first seems benign, but it actually includes several different functions that allow for simple modifications to turn the code into ransomware.

In Check Point’s third example of how ChatGPT can be used for malicious purposes, a cybercriminal posted about using the AI chat model to create a dark web marketplace to provide a platform for the automated trade of illegal or stolen goods such as financial information, malware or even drugs and weapons.

The company even asks ChatGPT itself how hackers can abuse OpenAi, and the chatbot replies that it is entirely possible. However, ChatGPT points to its own terms of service.

“It is important to note that OpenAI itself is not responsible for any abuse of its technology by third parties,” the chat responded to Check Point researchers. “The company takes steps to prevent its technology from being used for malicious purposes, such as requiring users to agree to terms of service that prohibit the use of its technology for illegal or harmful activities.”

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: ChatGPT, Check Point, Cybersecurity

Related Content:

  • Cloud, SASE, Aryaka How the Cloud is Redefining Media Production and…
  • Singlewire Software mass notification interview Singlewire Software on Mass Notification Solutions
  • URI catchbox 1 Catchbox Plus: The Mic Solution That Finally Gave…
  • Engaging virtual meeting with diverse participants discussing creative ideas in a bright office space during daylight hours Diversified Survey: Workplace AV Tech is Falling Short,…

Free downloadable guide you may like:

  • Practical Design Guide for Office SpacesPractical Design Guide for Office Spaces

    Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-face time with co-workers. When designing the office spaces — and meeting spaces in particular — enabling that connection between co-workers is crucial. But introducing the right collaboration technology in meeting spaces can […]

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.