OpenAI’s ChatGPT chatbot is a phenomenon taking the internet by storm.
Write poetry, write essays for college students, find bugs in computer code, and impress millions with the most accessible form of artificial intelligence you’ve ever seen. I have proved that there is.
Yes, there are many concerns about how technology can be used and misused, and we have to answer questions about its ethical use and how regulators will crack down on its use. yeah. .
However, no one can deny that it has generated a great deal of interest from the public.
And what’s the first thing Joe Public wants to do when he hears about ChatGPT? Try it, of course!
Security researcher Dominic Alvieri says warned – Malicious hackers are taking advantage of people searching the Internet for ChatGPT to direct them to malware and phishing sites.
Cybercriminals are using the promise of free access to premium ChatGPT as a decoy to trick users into downloading malware or entering passwords.
Some malicious ChatGPT clones have managed to reach the official Google Play store and third-party app stores.
On the other hand, the Thybulle researchers report A fake Facebook page has been created claiming to be the official presence of OpenAI’s ChatGPT.
As expected, the link posted on the Facebook page led unsuspecting users to a typosquatting domain masquerading as ChatGPT’s official site, ultimately downloading executable code designed to steal the user’s information. induce you to do so.
Similar examples include malicious apps that perform fraudulent activities, adware or spyware planting, and other malicious activity.
One example described by Cyble researchers describes a fake ChatGPT app for Android. This app is subscribing to a premium rate SMS service without the user’s knowledge.
The other is a variant of the Spynote malware that steals sensitive information such as call history, contacts and SMS messages from users’ Android devices. Media files and other data.
As always, take the utmost care about where you go on the Internet, use the latest security software to protect your computer and its data, follow safe computing best practices, and stay alert to threats and best practices against them. Always pay attention to how to protect your
Editor’s Note: The opinions expressed in this guest author article are solely those of the contributor and do not necessarily reflect those of Tripwire, Inc.