Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

White House budget requests cut tribal college and university funding

Reed & McKay announces new CEOs when Fred Stratford retires

More than 70 organizations in multiple sectors targeted by China-linked cyberspy groups

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » Openai is a ChatGpt account used by hacker groups in Russia, Iran and China
Identity

Openai is a ChatGpt account used by hacker groups in Russia, Iran and China

userBy userJune 9, 2025No Comments5 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Openai bans ChatGpt accounts

Openai has revealed that it has banned a set of ChatGPT accounts, which are likely run by Russian-speaking threat actors and two Chinese national hacking groups, to support investigations into malware development, social media automation, and US satellite communications technology.

” [Russian-speaking] The actors used our model to help develop and refine Windows malware, and assisted in debugging code and setting up command and control infrastructure in multiple languages.

The GO-based malware campaign is called Scopeep by artificial intelligence (AI) companies. There is no evidence that the activity is essentially widespread.

For each OpenAI, threat actors signed up for ChatGPT using temporary email accounts, and used each account they created to have one conversation, making a single incremental improvement to malicious software. They then abandoned their account and moved to the next account.

This practice of fine-tuning the code using a network of accounts emphasizes that it focuses on enemy operational security (OPSEC), Openai added.

The attackers then distributed AI-assisted malware through publicly available code repository that impersonated the legitimate video game Crosshair Overlay tool called Crosshair X.

Cybersecurity

“From there, malware is designed to initiate multi-stage processes to escalate privileges, establish stealth persistence, notify threat actors, and remove sensitive data while avoiding detection,” Openai said.

“The malware is designed to escalate privileges by restarting with ShellexeCuteW and attempts to avoid detection by programmatically removing it from Windows’ Defender using PowerShell, suppressing console windows and injecting timing delays.”

Other tactics built into Scopecreep include using base64 encoding to obfuscate payloads, DLL sideload technology, and the Sox5 proxy to hide the source IP address.

The ultimate goal of malware is to harvest the credentials, tokens and cookies stored in web browsers and remove them from the attacker. You can also alert a telegram channel run by threat actors when new victims compromise.

Openai asked the model to debug GO code snippets related to HTTPS requests, and asked to help use PowerShell commands using GO to change Windows Defender settings, particularly when it comes to adding antivirus exclusions.

The second group of ChatGPT accounts disabled by OpenAI is said to be related to two hacking groups attributed to China: ATP5 (aka Bronze Fleetwood, Keyhole Panda, Manganese, UNC2630) and APT15 (aka Free, Nylon Typhoon, Playful Taurus, Royal Panda, Vixenpanda)

On the other hand, one subset has modified the scripts and troubleshooted system configurations on issues related to open source research on various entities and technical topics of interest.

“Another subset of threat actors appeared to be engaging in developing support activities such as Linux systems management, software development, and infrastructure setup,” Openai said. “For these activities, threat actors used the models to perform research into configuration troubleshooting, software changes and implementation details.”

This consisted of asking for software packages for offline deployment and advice on configured firewalls and nameservers. Threat actors engaged in both web and Android app development activities.

Additionally, clusters related to China work on brute force scripts that can be split into FTP servers, automate penetration testing using large-scale language models (LLM) and manage fleets of Android devices, allowing them to use Facebook, Instag, Tiktok, X.

Cybersecurity

Some of the other observed malicious activity clusters utilize ChatGPT in a malicious way.

The network, consistent with the North Korean IT Worker Scheme, has used Openai’s model to promote a deceptive employment campaign by developing materials that could promote IT, software engineering, and other remote jobs around the world. Tiktok, and X Operation High Five are Philippine origin activities that generate English and taglish on topics related to the current event of Philippines, for sharing between Philippines and Tiktok Operation Focus for sharing on Facebook and Tiktok Operation Focus. Translation of emails and messages from China to English as part of exploitation tools and social engineering suspicions attempts Helgorand’s biting tactics. This used the open model to generate Russian content about Germany’s 2025 elections, criticising the US and NATO, and using the Chinese Oria model using the Chinese origin model using the Telegram and the Unclays model of X Operation. Topics of US political discourse for sharing in Bluesky and X Storm-2035. Using Openai’s model, he generated short comments in English and Spanish, praised Latino rights, Scottish independence, Irish reunion, Palestinian rights, Palestinian rights, and Iranian military and rading clergy for praised Iranian military and rading clergy for sharing X by sharing Iranian military and rading accounts. Cambodian and Origin activities that may likely be Cambodian activity related to Chinese-run task fraud using Openai’s model to generate short recruitment style messages for incorrect numbers, English, Spanish, Swahili, Kinyarwanda, German, Haitian Creoles

“Some of these companies were operating by charging a substantial participation fee for new recruits and then using some of those funds to maintain engagement only enough to pay the existing ’employees’,” said Ben Nimmo, Albert Zhang, Sophia Farquhar, Max Murphy and Kimo Bumanglag of Openai. “This structure is a hallmark of task fraud.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleFounders of Layerzero, SEI, Selini Capital and Plume Back Hyper-Personalized AI Crypto Discovery Engine
Next Article UK FCA will work with Nvidia to get banks to experiment with AI
user
  • Website

Related Posts

More than 70 organizations in multiple sectors targeted by China-linked cyberspy groups

June 9, 2025

Two different botnets exploiting a vulnerability in Wazuh Server to launch a Mirai-based attack

June 9, 2025

Chrome 0-Day, Data Wipers, Misused Tools and Zero-Click iPhone Attacks

June 9, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

White House budget requests cut tribal college and university funding

Reed & McKay announces new CEOs when Fred Stratford retires

More than 70 organizations in multiple sectors targeted by China-linked cyberspy groups

Two different botnets exploiting a vulnerability in Wazuh Server to launch a Mirai-based attack

Trending Posts

Sana Yousaf, who was the Pakistani Tiktok star shot by gunmen? |Crime News

June 4, 2025

Trump says it’s difficult to make a deal with China’s xi’ amid trade disputes | Donald Trump News

June 4, 2025

Iraq’s Jewish Community Saves Forgotten Shrine Religious News

June 4, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Meta of lectures investing more than $100 billion in Silicon Valley’s top AI startups

Galaxy Ventures Backs Rise Chain, $8 million raised to launch the fastest zone for real-time apps on Ethereum

Qualcomm acquires Alphawave for $2.4 billion and expands into the AI ​​data center market

Founders of Layerzero, SEI, Selini Capital and Plume Back Hyper-Personalized AI Crypto Discovery Engine

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.