The Rise of AI-Generated Phishing: Inside the Tactics, Risks, and Countermeasures for ChatGPT and BERT-Enabled Email Attacks

As technology advances, so do the tactics of cybercriminals. A recent development is the use of artificial intelligence (AI) in phishing attacks, which are designed to trick people into releasing sensitive information or downloading malware. Researchers have uncovered a new phishing email campaign that employs AI-powered language models, specifically ChatGPT and Google BERT, to create sophisticated email attacks.

The Rise of AI-Based Phishing Attacks

Threat actors have increasingly been relying on AI since November 2022. AI-based phishing is particularly worrisome because malicious actors can use machine learning models to create convincing scams that can be difficult to identify. They can imitate the writing styles of real people, leading targets to believe that they are receiving legitimate emails.

New phishing email campaign using ChatGPT and Google BARD

The new phishing campaign that researchers discovered is an example of an AI-based phishing attack that uses language models to generate convincing emails. ChatGPT and Google Bard are popular AI language models for text generation. These language models are fed with prior text inputs and use them to predict and generate new content based on the provided prompts.

AI-based security platforms like Trustify

As AI-based phishing attacks become more prevalent, organizations need to remain vigilant and take proactive steps to protect themselves. AI-based email security platforms such as Trustif are essential in fighting against such attacks. Trustif integrates AI, natural language processing (NLP), and machine learning technologies to identify and block malicious emails from entering an organization’s network.

The significance of phishing emails as a threat to organizations

Phishing attacks are an ongoing issue for organizations of all sizes as they often serve as an entry point for more serious security breaches. According to the FBI, phishing scams accumulated costs of over $4.2 billion between 2013 and 2020. Notably, phishing emails are often the initial point of attack before a more serious data breach occurs.

Case Study: Impersonation of Facebook in a Phishing Email

In one of the phishing emails discovered by researchers, the threat actor impersonated Facebook to gain access to a target’s login credentials. The email appeared to be legitimate, using the same logos, font, and layout as Facebook’s official email communications. Upon analysis, however, the researchers discovered that the email consisted of AI-generated text.

The discovery of AI-generated text in phishing emails raises safety concerns

The AI-generated text in phishing emails complicates security efforts as it can be challenging to discern between AI-generated and human-written emails. The use of chatbots or robotic voices for impersonation further complicates matters since AI-powered voices sound increasingly human-like.

The use of platforms like ChatGPT in generating convincing phishing emails and malware is concerning

Malicious actors can use language models like ChatGPT and Google Bard to generate convincing phishing emails that are difficult to distinguish from legitimate emails. AI-generated text can also be used for other kinds of cyberattacks, such as creating dangerous malware designed to infiltrate an organization’s network.

The emergence of vendor fraud through false invoices

Vendor fraud is another kind of cybercrime that has emerged, involving the creation of fraudulent invoices. Malicious actors use these invoices to trick companies into transferring funds or paying for fake products or services.

As sound technology continues to advance, cybercrime is also evolving and becoming much more sophisticated. As demonstrated by the new phishing email campaign that researchers uncovered, AI-based phishing attacks pose a significant threat to organizations. It’s crucial that organizations remain vigilant and take proactive measures to protect themselves. By investing in AI and machine learning-based security solutions, they can stay one step ahead of malicious actors and protect their sensitive data from harm.

Explore more

How Is AI Transforming Real-Time Marketing Strategy?

Marketing executives today are navigating an environment where consumer intentions transform at the speed of light, making the once-revered quarterly planning cycle appear like a relic from a slower, analog century. The traditional marketing roadmap, once etched in stone months in advance, has been rendered obsolete by a digital environment that moves faster than human planners can iterate. In an

What Is the Future of DevOps on AWS in 2026?

The high-stakes adrenaline rush of a manual midnight hotfix has officially transitioned from a badge of engineering honor to a glaring indicator of organizational systemic failure. In the current cloud landscape, elite engineering teams no longer view frantic, hand-typed commands as heroic; instead, they see them as a breakdown of the automated sanctity that governs modern infrastructure. The Amazon Web

How Is AI Reshaping Modern DevOps and DevSecOps?

The software engineering landscape has reached a pivotal juncture where the integration of artificial intelligence is no longer an optional luxury but a core operational requirement. Recent industry projections suggest that between 2026 and 2028, the percentage of enterprise software engineers utilizing AI code assistants will continue its rapid ascent toward seventy-five percent. This momentum indicates a fundamental departure from

Which Agencies Lead Global Enterprise Content Marketing?

The modern corporate landscape has effectively abandoned the notion that digital marketing is a series of independent creative bursts, replacing it with the requirement for a relentless, industrialized engine of communication. Large organizations now face the daunting task of maintaining a singular brand voice across dozens of territories, languages, and product categories, all while navigating increasingly complex buyer journeys. This

The 6G Readiness Checklist and the Future of Mobile Development

Mobile engineering stands at a historical crossroads where the boundary between physical sensation and digital transmission finally begins to dissolve into a single, unified reality. The transition from 4G to 5G was largely celebrated as a revolution in raw throughput, yet for many end users, the experience remained a series of modest improvements in video resolution and download speeds. In