Arabic Arabic Chinese (Simplified) Chinese (Simplified) Dutch Dutch English English French French German German Italian Italian Portuguese Portuguese Russian Russian Spanish Spanish
| (844) 627-8267

ChatGPT Used by North Korean Hackers to Scam LinkedIn Users | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | #hacking | #aihp

While North Korea is famously shady about its internal operations, it’s understood that the money raised from its criminal activities is being used to finance its ballistic missile and nuclear programs, according to a UN panel of experts.

These attacks, which appear to primarily target employees from global cyber security, global defense, and crypto companies, take place on a number of social media platforms like Facebook, WhatsApp, Discord, and Telegram. However, the majority of phishing scams seem to be targeting users on the professional networking site LinkedIn.

According to Erin Plante, vice-president of cyber security company Chainalysis, North Korean hacking groups use the AI tool to create polished and credible-looking recruiter profiles on LinkedIn. Generative AI helps with chatting, sending messages, creating images and new identities — all the things you need to build that close relationship with your target,” Plante explained.

“The attacks are getting very sophisticated — we are not talking about a badly worded email that says ‘click on this link,’-  Erin Plante, vice-president of cyber security company Chainalysis.

North Korean phishing campaigns are nothing new, with Lazurus – a prominent state-backed cybergang that has been active since 2009 – hitting headlines last year for posing as a Meta recruiter when targeting a Spanish aerospace company. However, Plante believes the scams are becoming increasingly convincing, due to the rapid advancement of LLM models.

Plante highlighted one case where a senior engineer at a Japanese cryptocurrency exchange was fooled into conducting a “technical exercise” by a fake LinkedIn recruiter, which resulted in his company’s system becoming infected with North Korean spyware.

The hacking groups also invest lengthy amounts of time into these campaigns to make their requests seem as legitimate as possible. “These are detailed profiles on LinkedIn and other social media platforms, which they use to build relationships over weeks and months,” she explains.


Click Here For The Original Story From This Source.


Click Here For The Original Source.