X

Meta security reports reveals hackers using ChatGPT-related software to disguise malware

It’s no secret that the launch of ChatGPT and other language processing models has ushered in a new era of AI tools aimed at making our lives easier. However, according to security researchers at Meta, this public interest in AI has also led scammers and hackers to find new ways of injecting malware into people’s devices by disguising it as ChatGPT-related software.

In the Q1 security report, Meta says they identified at least 10 types of malware families posing as AI chatbot-related software such as web extensions and toolbars. And although these web extensions performed most of the advertised tasks, they secretly installed malware on devices, making detection even more difficult.

The ultimate goal of these fake web extensions is to run unauthorized ads from compromised business accounts across the internet. However, some of them also run the NodeStealer malware strain, which can steal passwords, loot cookies, and login information.

Meta’s stance

In an effort to counter this malicious activity, Meta says they have blocked over 1,000 links to ChatGPT-related malware on Instagram and WhatsApp. Additionally, since these threat actors upload the fake browser extensions to official stores like the Google Web Store, the company has also informed industry peers, researchers, and governments about these links.

Furthermore, Meta will also provide additional support to help any businesses impacted by the malware from these fake extensions and introduce new work accounts which will support existing single sign-on (SSO) credential services from organizations that are not linked to any personal Facebook accounts.

Cybercriminals are always eyeing the next big trend to take advantage of and craft their next attack, and ChatGPT is no exception. However, the fact that ChatGPT does not have an official app or web extension has made it easier for attackers to deceive unsuspecting people and scam them.

“In the months and years ahead, we’ll continue to highlight how these malicious campaigns operate, share threat indicators with our industry peers and roll out new protections to address new tactics,” says Meta.