{"id":20080,"date":"2023-03-24T16:08:27","date_gmt":"2023-03-24T15:08:27","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=20080"},"modified":"2023-03-24T16:08:29","modified_gmt":"2023-03-24T15:08:29","slug":"cdt-watch-march-2023","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/03\/cdt-watch-march-2023\/","title":{"rendered":"CDT Watch \u2013 March 2023"},"content":{"rendered":"\n<ul>\n<li>An overview of the different cybercriminal uses case of ChatGPT<\/li>\n<li>The one year report about the cyber operations between Ukraine and Russia, by the CERT-EU<\/li>\n<\/ul>\n<h1 style=\"text-align: center;\">CHATGPT<\/h1>\n<h2 style=\"text-align: center;\">What opportunities for the underground world of cybercrime ?<\/h2>\n<h2>\u00a0<\/h2>\n<h2 style=\"text-align: left;\"><strong>Need a refresh about ChatGPT?<\/strong><\/h2>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-20082 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/03\/Image1-1.png\" alt=\"\" width=\"1129\" height=\"231\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/03\/Image1-1.png 1129w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/03\/Image1-1-437x89.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/03\/Image1-1-71x15.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/03\/Image1-1-768x157.png 768w\" sizes=\"auto, (max-width: 1129px) 100vw, 1129px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 1 &#8211; Screenshot from ChatGPT when prompted &#8220;Introduce ChatGPT in a funny way and at the first person&#8221;<\/em><\/p>\n<p>\u00a0<\/p>\n<p style=\"text-align: justify;\">Unless living under a rock, you have heard about the incredibly notorious <span style=\"color: #503078;\"><strong>AI powered chatbot<\/strong> <\/span>developed by OpenAI: Chat GPT, a tool that relies on the Generative Pre-trained Transformer architecture. But just in case, you must know that ChatGPT has been trained on a <span style=\"color: #503078;\"><strong>vast amount of data from the Internet<\/strong> <\/span>and is able to <span style=\"color: #503078;\"><strong>understand human speech<\/strong><\/span> and <span style=\"color: #503078;\"><strong>interact<\/strong> <\/span>with users. Chat GPT has not finished to be talked about: on March 14<sup>th<\/sup> 2023, Open AI has announced the <strong><span style=\"color: #503078;\">arrival of Chat GPT 4.0<\/span><a href=\"#_edn1\" name=\"_ednref1\">[i]<\/a><\/strong>.<\/p>\n<p style=\"text-align: justify;\">The growing popularity and potential future applications of ChatGPT have also caught the attention of cybercriminals. Nord VPN&#8217;s examination of Dark Web posts from January 13th to February 13th revealed a significant increase in Darkweb forum threads discussing ChatGPT, <span style=\"color: #503078;\"><strong>jumping from 37 to 91 in just a month<\/strong><\/span>. The main topics of these threads included:<\/p>\n<ul style=\"text-align: justify;\">\n<li>Breaking ChatGPT<\/li>\n<li>Using ChatGPT to create Dark Web Marketplace scripts<\/li>\n<li>A new ChatGPT Trojan Binder<\/li>\n<li>ChatGPT as a phishing tool with answers indistinguishable from humans<\/li>\n<li>ChatGPT trojan<\/li>\n<li>ChatGPT jailbreak 2.0<\/li>\n<li>Progression of ChatGPT malware<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-20084 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/03\/Image2.jpg\" alt=\"\" width=\"245\" height=\"230\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/03\/Image2.jpg 245w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/03\/Image2-203x191.jpg 203w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/03\/Image2-42x39.jpg 42w\" sizes=\"auto, (max-width: 245px) 100vw, 245px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 2 &#8211; Screenshot from CheckPoint: Cybercriminal is using ChatGPT to improve Infostealer\u2019s code<\/em><\/p>\n<p>\u00a0<\/p>\n<p style=\"text-align: justify;\">These threads give a first <span style=\"color: #503000;\"><strong><span style=\"color: #503078;\">interesting overview of all the rogue usage that can involves ChatGPT or be carried out via the chatbot<\/span>.<\/strong><\/span> Another key security concern could also be included in this list when thinking about ChatGPT\u2019s limitations in terms of cybersecurity, which is the risk of personal and\/or corporate data leak, that could lead to identity theft, fraud, or other malicious uses.<\/p>\n<p style=\"text-align: justify;\"><strong>\u00a0<\/strong><\/p>\n<h2 style=\"text-align: justify;\"><strong>What are the plausible cybercriminal use cases?<\/strong><\/h2>\n<p style=\"text-align: justify;\"><strong><em> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-20086 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/03\/Image3-1.png\" alt=\"\" width=\"883\" height=\"468\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/03\/Image3-1.png 883w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/03\/Image3-1-360x191.png 360w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/03\/Image3-1-71x39.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/03\/Image3-1-768x407.png 768w\" sizes=\"auto, (max-width: 883px) 100vw, 883px\" \/><\/em><\/strong><\/p>\n<p style=\"text-align: center;\"><strong><em>\u00a0<\/em><\/strong><em>Figure 3 &#8211; Screenshot of a ChatGPT answer when prompted \u201cTalk at the first person about possible cybercriminal usage of ChatGPT\u201d<\/em><\/p>\n<p>\u00a0<\/p>\n<h3 style=\"text-align: justify;\"><strong>Use Case #1 \u2013 Support malware creation and kill chain attack<\/strong><\/h3>\n<p style=\"text-align: justify;\">ChatGPT is designed to decline inappropriate requests but there are ways to bypass its restrictions and generate malicious code. For example, instead of directly requesting a ransomware script, users can describe step-by-step functions needed for such a script, ultimately receiving functional parts of malicious code.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-20088 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/03\/Image4-2.png\" alt=\"\" width=\"569\" height=\"460\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/03\/Image4-2.png 569w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/03\/Image4-2-236x191.png 236w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/03\/Image4-2-48x39.png 48w\" sizes=\"auto, (max-width: 569px) 100vw, 569px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 4 \u2013 Screenshot of a ChatGPT answer to the request \u201cWrite me a function named &#8220;find_files&#8221; in Python that searches all files that end up with &#8220;txt, pdf, docx, ppt, xlsm&#8221; starting from the root directory and that return all paths of files that match with the criteria\u201d.<\/em><\/p>\n<p>\u00a0<\/p>\n<p style=\"text-align: justify;\">It has been proven possible to use ChatGPT to insert harmful code into a commonly used <a href=\"https:\/\/www.cyberark.com\/resources\/threat-research-blog\/chatting-our-way-into-creating-a-polymorphic-malware\">computer program and create programs that constantly change their appearance<\/a>, making them harder for security software to detect and block and to obtain an <a href=\"https:\/\/research.checkpoint.com\/2022\/opwnai-ai-that-can-save-the-day-or-hack-it-away\/\">entire process of an artificial intelligence-driven cyberattack<\/a>, starting with targeted phishing emails and ending with gaining unauthorized access to someone&#8217;s computer.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-20090 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/03\/Image5.png\" alt=\"\" width=\"569\" height=\"440\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/03\/Image5.png 569w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/03\/Image5-247x191.png 247w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/03\/Image5-50x39.png 50w\" sizes=\"auto, (max-width: 569px) 100vw, 569px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 5 &#8211; Screenshot from CheckPoint: Example of the ability to create a malware code without anti-abuse restrictions in a Telegram bot utilizing the OpenAI API<\/em><\/p>\n<p>\u00a0<\/p>\n<p style=\"text-align: justify;\">However, as highlighted by <a href=\"https:\/\/www.ncsc.gov.uk\/blog-post\/chatgpt-and-large-language-models-whats-the-risk\">NCSC<\/a> and <a href=\"https:\/\/www.kaspersky.fr\/blog\/chatgpt-cybersecurity\/20052\/\">Kaspersky<\/a>, <span style=\"color: #503078;\"><strong>using ChatGPT<\/strong><\/span> for creating malware is not that reliable, due to potential errors and logical loopholes in the generated code, and even if it provides a certain level of support, <span style=\"color: #503078;\"><strong>the tool doesn\u2019t currently reach the level of cyber professional.<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\"><strong>\u00a0<\/strong><\/p>\n<h3 style=\"text-align: justify;\"><strong>Use Case #2 \u2013 Discover and exploit vulnerabilities<\/strong><\/h3>\n<p style=\"text-align: justify;\">When it comes to code vulnerabilities, ChatGPT raises several challenges in terms of detection and exploitation.<\/p>\n<p style=\"text-align: justify;\">In terms of <span style=\"color: #503078;\"><strong>detection<\/strong><\/span>, ChatGPT is currently able to detect vulnerabilities in any piece of code submitted if properly prompted to do so, but it can also debug code. For example, when a computer security researcher asked ChatGPT to solve a capture-the-flag challenge, it successfully detected a buffer overflow vulnerability and wrote code to exploit it, with only a minor error that was later corrected.<\/p>\n<p style=\"text-align: justify;\">In terms of <span style=\"color: #503078;\"><strong>exploitation<\/strong><\/span>, the risks posed by ChatGPT, and more generally Large Language Models (LLMs) can be used to produce malicious code or exploits despite restrictions, as they can be bypassed. Additionally, LLMs may generate vulnerable and misaligned code, and while future models will be trained to produce more secure code, it&#8217;s not the case yet. Moreover, some security researchers remain skeptical about AI&#8217;s ability to create modern exploits that require new techniques.<\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h3 style=\"text-align: justify;\"><strong>Use Case #3 \u2013 Create persuasive content for phishing and scam operations<\/strong><\/h3>\n<p style=\"text-align: justify;\">Creating persuasive text is a major strength of GPT-3.5\/ChatGPT, and GPT-4 performs even better in this area. Consequently, it&#8217;s highly probable that automated spear phishing attacks using chatbots already exist. Crafting targeted phishing messages for individual victims is more resource-intensive, which is why this technique is typically reserved for specific attacks.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-20092 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/03\/Image6.jpg\" alt=\"\" width=\"266\" height=\"254\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/03\/Image6.jpg 266w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/03\/Image6-200x191.jpg 200w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/03\/Image6-41x39.jpg 41w\" sizes=\"auto, (max-width: 266px) 100vw, 266px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 6 &#8211; Screenshot from chatGPT, pishing mail generation<\/em><\/p>\n<p>\u00a0<\/p>\n<p style=\"text-align: justify;\">ChatGPT has the potential to significantly change this dynamic, as it allows cybercriminals to <span style=\"color: #503078;\"><strong>produce personalized and compelling messages for each target<\/strong>.<\/span> To include all necessary components, however, the chatbot requires detailed instructions.<\/p>\n<p style=\"text-align: justify;\">A notable advantage of ChatGPT is its capability to interact and create content in multiple languages, complete with reliable translation. In the past, this was a key way to identify scams and phishing attempts. While some methods are being developed to detect content created by ChatGPT, they haven&#8217;t yet proven entirely effective.<\/p>\n<p style=\"text-align: justify;\">This poses a significant risk to all companies, as it makes their employees more susceptible to such attacks and may expose their resources if passwords are stolen in this manner. As mentioned earlier, it is essential to raise awareness about this issue while also strengthening authentication methods, such as implementing two-factor authentication as a potential solution.<\/p>\n<p style=\"text-align: justify;\">Interestingly, other uses have been made of ChatGPT notoriety to develop scams without using the tool itself, such as <strong><span style=\"color: #503078;\">phishing mails\/Scams<\/span><\/strong> in order to push towards the purchase of a (fake)<span style=\"color: #503078;\"><strong> ChatGPT subscription<\/strong> <\/span>and <a href=\"https:\/\/www.hackread.com\/scammers-chatgpt-phishing-scam\/?web_view=true\">to provide personal data details<\/a><\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h3 style=\"text-align: justify;\"><strong>Use Case #4 Exploit companies\u2019 data<\/strong><\/h3>\n<p style=\"text-align: justify;\">ChatGPT has been trained on a massive amount of internet data, including personal sites and media content, meaning that it may have access to personal data that is currently hard to remove or control, as no &#8220;right to be forgotten&#8221; measures exist to date. Consequently, ChatGPT&#8217;s compliance with regulations like GDPR is under debate. GPT-4 can manage basic tasks related to personal and geographic information, such as identifying locations connected to phone numbers or educational institutions. By combining these capabilities, GPT-4 could be used to <span style=\"color: #503078;\"><strong>identify individuals when paired with external data.<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\">Another significant concern is the <span style=\"color: #503078;\"><strong>sensitive information<\/strong><\/span> users might <span style=\"color: #503078;\"><strong>provide through prompts<\/strong><\/span>. Users could inadvertently share confidential information when seeking assistance or using the chatbot for tasks, like reviewing and enhancing a draft contract. This information may appear in future responses to other users&#8217; prompts. They might not only find their confidential documents or research leaked on such platforms due to employees&#8217; inattention, but also reveal <span style=\"color: #503078;\"><strong>information about their system or employees<\/strong><\/span> which will be used by hacker to <span style=\"color: #503078;\"><strong>facilitate an intrusion<\/strong><\/span>. The primary course of action should be to increase awareness on this subject by providing formation and explanation or to restrict access to the website in the sensitive domains until there is a better comprehension of how data is utilized.<\/p>\n<p style=\"text-align: justify;\">Not only the real ChatGPT can be used for this objective, but the creation of <span style=\"color: #503078;\"><strong>other chatbots<\/strong><\/span> using the same model as ChatGPT but configured to <span style=\"color: #503078;\"><strong>trick victims into disclosing sensitive information<\/strong><\/span> or <span style=\"color: #503078;\"><strong>downloading malware <\/strong><\/span>has also been observed.<\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h3 style=\"text-align: justify;\"><strong>Use Case #5 Disinformation campaigns <\/strong><\/h3>\n<p style=\"text-align: justify;\">ChatGPT can be used to quickly write very convincing articles and speeches <a href=\"https:\/\/www.nextinpact.com\/article\/70999\/chatgpt-bard-et-autres-agents-desinformation-massive\">based on fake news.<\/a> The American startup Newsguard <a href=\"https:\/\/www.newsguardtech.com\/misinformation-monitor\/jan-2023\/\">has conducted an experience<\/a> on ChatGPT to demonstrate its disinformation potential: on 100 fake information submitted to ChatGPT, the tool has produced fake detailed articles, essays and TV scripts for 80 of them, including significant topics such as Covid-19 and Ukraine<a href=\"#_edn2\" name=\"_ednref2\">[ii]<\/a>.<\/p>\n<p style=\"text-align: justify;\">As highlighted (again) by the war between Ukraine and Russia, <a href=\"https:\/\/www.nytimes.com\/2023\/02\/08\/technology\/ai-chatbots-disinformation.html\">the crucial role of information and disinformation<\/a> through cyber channels, can have significant consequences.<\/p>\n<h3 style=\"text-align: justify;\"><strong>Use Case #6 Create darknet marketplace<\/strong><\/h3>\n<p style=\"text-align: justify;\">Cybercriminals have also been observed using ChatGPT to support <span style=\"color: #503078;\"><strong>the creation of DarkWeb marketplaces<\/strong>.<\/span> ChekPoint has illustrated this phenomenon with some examples<a href=\"#_edn3\" name=\"_ednref3\">[iii]<\/a>:<\/p>\n<ul style=\"text-align: justify;\">\n<li>A cybercriminal post on a Darkweb forum showing how to code with ChatGPT a DarkWeb Market script that does not rely on Python or Java Script, using third-party API to get up-to-date cryptocurrency (Monero, Bitcoin and Etherium) prices as part of the Dark Web market payment system.<\/li>\n<li>Dark web discussions threads linked to fraudulent usage of ChatGPT, such as how to generate an e-book or a short chapter using ChatGPT and then sell its content online.<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<p style=\"text-align: justify;\"><strong> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-20094 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/03\/Image7.png\" alt=\"\" width=\"675\" height=\"242\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/03\/Image7.png 675w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/03\/Image7-437x157.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/03\/Image7-71x25.png 71w\" sizes=\"auto, (max-width: 675px) 100vw, 675px\" \/><\/strong><\/p>\n<p style=\"text-align: center;\"><em>Figure 2 &#8211; Screenshot from CheckPoint: Multiple threads in the underground forums on how to use ChatGPT for fraud activity<\/em><\/p>\n<p style=\"text-align: justify;\"><strong>\u00a0<\/strong><\/p>\n<h2 style=\"text-align: justify;\"><strong>What are the key take aways? <\/strong><\/h2>\n<p style=\"text-align: justify;\">Even if ChatGPT tends to lack of the necessary level of features, it can still be a useful tool to facilitate cyberattacks. Even if it is an obvious support tool mostly for script kiddies and unexperimented actors, ChatGPT &#8211; as any AI tool &#8211; can be a facilitator for any type of hackers, either to completely conceive a malware, to accelerate malicious actions such as phishing or to increase the sophistication level of cyberattacks.<\/p>\n<p style=\"text-align: justify;\">With the release of GPT-4, OpenAI has made efforts to counter inappropriate requests, however ChatGPT \u00a0still raise serious security issues and challenges for business security. It is important to keep in mind that the malicious use cases detailed in the previous section are only hypothetical scenarios: malicious use of ChatGPT has already been observed and it is essential to convey strong cybersecurity messages on the topic:<\/p>\n<ul style=\"text-align: justify;\">\n<li>Don&#8217;t include sensitive info in queries to\u00a0<a href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=chatgpt&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7041697316570849280\">#ChatGPT<\/a> : Avoid personal\/sensitive information sharing while using ChatGPT<\/li>\n<li>Stay informed and vigilant: AI-related topics are evolving quickly, it is central to stay put regarding tools evolution (e.g. release of Chat GPT 4.0), and new security topics that can emerged over time<\/li>\n<li>Scams and phishing are likely to become more and more realistic in their crafting: continue raising awareness about this risk and train yourself and your ecosystem<\/li>\n<li>Basic cybersecurity practices are still true: have a regular vulnerability management, set up doble authentication, train your teams and raise awareness\u2026<\/li>\n<li>ChatGPT opening the door to the possibility of creating realistic fake content, it is central to stay informed about tooling initiatives aiming at detecting machine-written text such as <a href=\"https:\/\/gptzero.me\/\">GPT Zero<\/a>, a tool developed by Princeton student (<em>Note: OpenAI is also working on a tool to detect machine-written text, but is for now far from being perfect since it <\/em><a href=\"https:\/\/www.nextinpact.com\/article\/70999\/chatgpt-bard-et-autres-agents-desinformation-massive\"><em>detect machine-written text only one in four times<\/em><\/a>)<\/li>\n<\/ul>\n<h1 style=\"text-align: center;\">Reading of the Month<\/h1>\n<h1 style=\"text-align: center;\">CERT-EU : RUSSIA&#8217;S WAR ON UKRAINE: ONE YEAR OF CYBER OPERATIONS<\/h1>\n<p style=\"text-align: justify;\"><strong> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-20096 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/03\/Image8.png\" alt=\"\" width=\"233\" height=\"190\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/03\/Image8.png 233w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/03\/Image8-48x39.png 48w\" sizes=\"auto, (max-width: 233px) 100vw, 233px\" \/><\/strong><\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/cert.europa.eu\/static\/MEMO\/2023\/TLP-CLEAR-CERT-EU-1YUA-CyberOps.pdf\">https:\/\/cert.europa.eu\/static\/MEMO\/2023\/TLP-CLEAR-CERT-EU-1YUA-CyberOps.pdf<\/a><\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ednref1\" name=\"_edn1\">[i]<\/a> <a href=\"https:\/\/cdn.openai.com\/papers\/gpt-4.pd\">https:\/\/cdn.openai.com\/papers\/gpt-4.pd<\/a><\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ednref2\" name=\"_edn2\">[ii]<\/a> <a href=\"https:\/\/www.newsguardtech.com\/misinformation-monitor\/jan-2023\/\">https:\/\/www.newsguardtech.com\/misinformation-monitor\/jan-2023\/<\/a><\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ednref3\" name=\"_edn3\">[iii]<\/a> <a href=\"https:\/\/research.checkpoint.com\/2023\/opwnai-cybercriminals-starting-to-use-chatgpt\/\">https:\/\/research.checkpoint.com\/2023\/opwnai-cybercriminals-starting-to-use-chatgpt\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>An overview of the different cybercriminal uses case of ChatGPT The one year report about the cyber operations between Ukraine and Russia, by the CERT-EU CHATGPT What opportunities for the underground world of cybercrime ? \u00a0 Need a refresh about&#8230;<\/p>\n","protected":false},"author":1364,"featured_media":16207,"comment_status":"open","ping_status":"closed","sticky":true,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3973,2777],"tags":[3279,3480,3487,2772,2944,2796],"coauthors":[3488],"class_list":["post-20080","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cert-newsletter","category-cybersecurity-digital-trust","tag-artificial-intelligence-en","tag-cert-en","tag-cert-w-en","tag-cybersecurity","tag-newsletter","tag-risk"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CDT Watch \u2013 March 2023 - RiskInsight<\/title>\n<meta name=\"description\" content=\"An overview of the different cybercriminal uses case of ChatGPT, The one year report about the cyber operations between Ukraine and Russia, by the CERT-EU\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/03\/cdt-watch-march-2023\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CDT Watch \u2013 March 2023 - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"An overview of the different cybercriminal uses case of ChatGPT, The one year report about the cyber operations between Ukraine and Russia, by the CERT-EU\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/03\/cdt-watch-march-2023\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-24T15:08:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-24T15:08:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/06\/CDT-WATCH.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1621\" \/>\n\t<meta property=\"og:image:height\" content=\"455\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"CERT-W\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"CERT-W\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/03\/cdt-watch-march-2023\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/03\/cdt-watch-march-2023\/\"},\"author\":{\"name\":\"CERT-W\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/b3138a95b8559cf24bf256c8e9994eca\"},\"headline\":\"CDT Watch \u2013 March 2023\",\"datePublished\":\"2023-03-24T15:08:27+00:00\",\"dateModified\":\"2023-03-24T15:08:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/03\/cdt-watch-march-2023\/\"},\"wordCount\":1815,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/03\/cdt-watch-march-2023\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/06\/CDT-WATCH.png\",\"keywords\":[\"artificial intelligence\",\"CERT\",\"CERT-W\",\"cybersecurity\",\"Newsletter\",\"risk\"],\"articleSection\":[\"CERT Newsletter\",\"Cybersecurity &amp; Digital Trust\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/03\/cdt-watch-march-2023\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/03\/cdt-watch-march-2023\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/03\/cdt-watch-march-2023\/\",\"name\":\"CDT Watch \u2013 March 2023 - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/03\/cdt-watch-march-2023\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/03\/cdt-watch-march-2023\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/06\/CDT-WATCH.png\",\"datePublished\":\"2023-03-24T15:08:27+00:00\",\"dateModified\":\"2023-03-24T15:08:29+00:00\",\"description\":\"An overview of the different cybercriminal uses case of ChatGPT, The one year report about the cyber operations between Ukraine and Russia, by the CERT-EU\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/03\/cdt-watch-march-2023\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/03\/cdt-watch-march-2023\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/03\/cdt-watch-march-2023\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/06\/CDT-WATCH.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/06\/CDT-WATCH.png\",\"width\":1621,\"height\":455},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/03\/cdt-watch-march-2023\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CDT Watch \u2013 March 2023\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/b3138a95b8559cf24bf256c8e9994eca\",\"name\":\"CERT-W\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/cert-w\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CDT Watch \u2013 March 2023 - RiskInsight","description":"An overview of the different cybercriminal uses case of ChatGPT, The one year report about the cyber operations between Ukraine and Russia, by the CERT-EU","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/03\/cdt-watch-march-2023\/","og_locale":"en_US","og_type":"article","og_title":"CDT Watch \u2013 March 2023 - RiskInsight","og_description":"An overview of the different cybercriminal uses case of ChatGPT, The one year report about the cyber operations between Ukraine and Russia, by the CERT-EU","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/03\/cdt-watch-march-2023\/","og_site_name":"RiskInsight","article_published_time":"2023-03-24T15:08:27+00:00","article_modified_time":"2023-03-24T15:08:29+00:00","og_image":[{"width":1621,"height":455,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/06\/CDT-WATCH.png","type":"image\/png"}],"author":"CERT-W","twitter_misc":{"Written by":"CERT-W","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/03\/cdt-watch-march-2023\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/03\/cdt-watch-march-2023\/"},"author":{"name":"CERT-W","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/b3138a95b8559cf24bf256c8e9994eca"},"headline":"CDT Watch \u2013 March 2023","datePublished":"2023-03-24T15:08:27+00:00","dateModified":"2023-03-24T15:08:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/03\/cdt-watch-march-2023\/"},"wordCount":1815,"commentCount":0,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/03\/cdt-watch-march-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/06\/CDT-WATCH.png","keywords":["artificial intelligence","CERT","CERT-W","cybersecurity","Newsletter","risk"],"articleSection":["CERT Newsletter","Cybersecurity &amp; Digital Trust"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2023\/03\/cdt-watch-march-2023\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/03\/cdt-watch-march-2023\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/03\/cdt-watch-march-2023\/","name":"CDT Watch \u2013 March 2023 - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/03\/cdt-watch-march-2023\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/03\/cdt-watch-march-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/06\/CDT-WATCH.png","datePublished":"2023-03-24T15:08:27+00:00","dateModified":"2023-03-24T15:08:29+00:00","description":"An overview of the different cybercriminal uses case of ChatGPT, The one year report about the cyber operations between Ukraine and Russia, by the CERT-EU","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/03\/cdt-watch-march-2023\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2023\/03\/cdt-watch-march-2023\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/03\/cdt-watch-march-2023\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/06\/CDT-WATCH.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/06\/CDT-WATCH.png","width":1621,"height":455},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/03\/cdt-watch-march-2023\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"CDT Watch \u2013 March 2023"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/b3138a95b8559cf24bf256c8e9994eca","name":"CERT-W","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/cert-w\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/20080","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1364"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=20080"}],"version-history":[{"count":10,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/20080\/revisions"}],"predecessor-version":[{"id":20390,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/20080\/revisions\/20390"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/16207"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=20080"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=20080"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=20080"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=20080"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}