{"id":16321,"date":"2023-07-26T20:05:26","date_gmt":"2023-07-26T20:05:26","guid":{"rendered":"https:\/\/gridinsoft.com\/blogs\/?p=16321"},"modified":"2025-12-15T05:58:40","modified_gmt":"2025-12-15T05:58:40","slug":"fraudgpt-phishing","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/fraudgpt-phishing\/","title":{"rendered":"FraudGPT Offers Phishing Email Generation to Cybercriminals"},"content":{"rendered":"<p>It&#8217;s not just IT companies racing to <strong>develop AI-powered chatbots<\/strong>. Cybercriminals have also joined the fray. Recent reports indicate that a developer has built a dangerous AI chatbot called &#8220;FraudGPT&#8221; that <strong>enables users to engage in malicious activities<\/strong>.<\/p>\n<p>Earlier this month, security experts uncovered a hacker working on WormGPT. Also, the chatbot enables users to <strong>create viruses and phishing emails<\/strong>. Recently, another malicious chatbot, FraudGPT, has been detected and sold on different <a href=\"https:\/\/gridinsoft.com\/blogs\/over-100k-chatgpt-accounts-compromised\/\">marketplaces on the dark web<\/a> and through Telegram accounts.<\/p>\n<h2>About FraudGPT<\/h2>\n<p>A harmful AI tool called FraudGPT has been created to <strong>replace the well-known AI chatbot ChatGPT<\/strong>. This tool is intended to aid cybercriminals in their illegal endeavors by giving them improved techniques for <strong>initiating phishing attacks<\/strong> and developing malicious code.<\/p>\n<p>It is suspected that the <a href=\"https:\/\/gridinsoft.com\/blogs\/wormgpt-for-phishing-attacks\/\">same group that developed WormGPT<\/a> is also responsible for creating FraudGPT. This group is focused on creating various tools for different groups. It&#8217;s like how startups test <strong>multiple techniques to identify their target market<\/strong>. There have been no reported incidents of active attacks using FraudGPT tools.<\/p>\n<p>FraudGPT is a tool that goes <a href=\"https:\/\/gridinsoft.com\/phishing\">beyond just phishing attacks<\/a>. It can be used to write harmful code, <strong>create malware and hacking tools<\/strong> that are difficult to detect and find weaknesses in an organization&#8217;s technology. Attackers can use it to <strong>craft convincing emails<\/strong> that make it more probable for victims to click on harmful links and pinpoint and choose their targets more accurately.<\/p>\n<figure id=\"attachment_16325\" aria-describedby=\"caption-attachment-16325\" style=\"width: 1200px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/FraudGPT-bot-dark-web.webp\" alt=\"About FraudGPT\" width=\"1200\" height=\"516\" class=\"size-full wp-image-16325\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/FraudGPT-bot-dark-web.webp 1200w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/FraudGPT-bot-dark-web-300x129.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/FraudGPT-bot-dark-web-1024x440.webp 1024w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/FraudGPT-bot-dark-web-768x330.webp 768w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><figcaption id=\"caption-attachment-16325\" class=\"wp-caption-text\">Screenshot of FraudGPT for sale on Dark Web Forums<\/figcaption><\/figure>\n<p>FraudGPT is being <strong>sold on various dark web marketplaces<\/strong> and the Telegram platform. It is offered through a subscription-based model, with prices ranging from $200 per month to $1,700 per year. However, it&#8217;s <strong>important to note that using such tools is illegal<\/strong> and unethical, and staying away from them is recommended.<\/p>\n<h2>FraudGPT Efficiency<\/h2>\n<p>There are concerns among security experts about the <strong>effectiveness of AI-powered threat tools<\/strong> like FraudGPT. Some experts argue that the features these tools offer are not substantially different from what attackers <a href=\"https:\/\/gridinsoft.com\/blogs\/chat-gpt-phishing-scams\/\">can achieve with ChatGPT<\/a>. Additionally, there is limited research on whether AI-generated phishing lures are <strong>more effective than those created by humans<\/strong>.<\/p>\n<figure id=\"attachment_16346\" aria-describedby=\"caption-attachment-16346\" style=\"width: 1600px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/TheFraudExplorer-with-FraudGPT.webp\" alt=\"FraudGPT Efficiency\" width=\"1600\" height=\"822\" class=\"size-full wp-image-16346\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/TheFraudExplorer-with-FraudGPT.webp 1600w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/TheFraudExplorer-with-FraudGPT-300x154.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/TheFraudExplorer-with-FraudGPT-1024x526.webp 1024w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/TheFraudExplorer-with-FraudGPT-768x395.webp 768w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/TheFraudExplorer-with-FraudGPT-1536x789.webp 1536w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/TheFraudExplorer-with-FraudGPT-1568x806.webp 1568w\" sizes=\"auto, (max-width: 1600px) 100vw, 1600px\" \/><figcaption id=\"caption-attachment-16346\" class=\"wp-caption-text\">Anti-fraud software detects unethical behavior FraudGPT<\/figcaption><\/figure>\n<p>It&#8217;s important to note that introducing FraudGPT <strong>provides cybercriminals with a new tool<\/strong> to carry out multi-step attacks more efficiently. Additionally, the advancements in chatbots and deepfake technology could lead to even more sophisticated campaigns, which would only <strong>compound the challenges malware presents<\/strong>.<\/p>\n<p>It is unclear whether either <strong>chatbot can hack computers<\/strong>. However, Netenrich warns that such technology could facilitate the creation of more convincing phishing emails and other fraudulent activities by hackers. The company also acknowledges that criminals will always <strong>seek to enhance their criminal abilities<\/strong>. It is possible by leveraging the tools that are made available to them.<\/p>\n<h2>How to Protect Against FraudGPT<\/h2>\n<p>The advancements in AI offer <strong>new and innovative ways<\/strong> to approach problems, but prioritizing prevention is essential. Here are some strategies you can use:<\/p>\n<ul>\n<li>\n<p><strong>Business Email Compromise-Specific Training<\/strong><br \/>\nOrganizations should implement comprehensive and regularly updated training programs to combat <a href=\"https:\/\/loaris.app\/blogs\/what-is-business-email-compromise\/\" target=\"_blank\" rel=\"noopener nofollow\">business email compromise (BEC) attacks<\/a>, particularly those aided by AI. Employees should be educated on the nature of BEC threats, how AI can worsen them, and the <strong>methods used by attackers<\/strong>. This training should be integrated into employees&#8217; ongoing professional growth.<\/p>\n<\/li>\n<li>\n<p><strong>Enhanced Email Verification Measures<\/strong><br \/>\n\tOrganizations should implement strict email verification policies to protect themselves from AI-driven Business Email Compromise (BEC) attacks. These policies should <strong>include setting up email systems<\/strong> that notify the authorities about any communication containing specific words associated with BEC attacks, for instance, &#8220;urgent,&#8221; &#8220;sensitive,&#8221; or &#8220;wire transfer.&#8221; Additionally, they should establish systems that automatically identify when emails from external sources mimic those of internal executives or vendors. By doing these, organizations ensure that they thoroughly <strong>examine potentially harmful emails<\/strong> before taking action.<\/p>\n<\/li>\n<\/ul>\n<p style=\"padding-top:15px;padding-bottom:15px;\"><a href=\"\/download\/antimalware\" rel=\"nofollow\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"\/blogs\/wp-content\/uploads\/2022\/07\/env02.webp\" alt=\"FraudGPT Offers Phishing Email Generation to Cybercriminals\" width=\"798\" height=\"336\" class=\"aligncenter size-full\" title=\"\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>It&#8217;s not just IT companies racing to develop AI-powered chatbots. Cybercriminals have also joined the fray. Recent reports indicate that a developer has built a dangerous AI chatbot called &#8220;FraudGPT&#8221; that enables users to engage in malicious activities. Earlier this month, security experts uncovered a hacker working on WormGPT. Also, the chatbot enables users to [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":16335,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[15],"tags":[444,619,131,1422],"class_list":{"0":"post-16321","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security-news","8":"tag-ai","9":"tag-cybersecurity","10":"tag-phishing","11":"tag-wormgpt"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/GS_Blog_banner_FraudGPT-Offers-Phishing-Email-Generation-to-Cybercriminals_1280x674.webp","author_info":{"display_name":"Stephanie Adlam","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/adlam\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/16321","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=16321"}],"version-history":[{"count":17,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/16321\/revisions"}],"predecessor-version":[{"id":16349,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/16321\/revisions\/16349"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/16335"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=16321"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=16321"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=16321"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}