{"id":97157,"date":"2023-02-09T20:36:19","date_gmt":"2023-02-10T04:36:19","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=97157"},"modified":"2023-02-09T20:36:19","modified_gmt":"2023-02-10T04:36:19","slug":"chatgpt-is-malware-makers-new-a-i-partner-in-crime","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/chatgpt-is-malware-makers-new-a-i-partner-in-crime\/","title":{"rendered":"ChatGPT is malware makers&#8217; new A.I. partner in crime"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"alignnone size-full wp-image-97161\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/artificial-intelligence-ai-malware-virus-600x350-1.jpg\" alt=\"\" width=\"600\" height=\"350\" \/><\/p>\n<p>Over the past two months, we&#8217;ve seen the emergence of a concerning new trend: the use of artificial intelligence as a malware development tool.<\/p>\n<p>Artificial intelligence (AI) can potentially be used to create, modify, obfuscate, or otherwise enhance malware. It can also be used to convert malicious code from one programming language to another, aiding in cross-platform compatibility. And it can even be used to write a convincing phishing e-mail, or to write code for a black-market malware sales site.<\/p>\n<p>Let&#8217;s discuss how ChatGPT and similar tools are already being abused to create malware, and what this means for the average Internet user.<\/p>\n<p>In this article:<\/p>\n<ul>\n<li><a href=\"#abuse\">The abuse of ChatGPT and Codex as malware development tools<\/a>\n<ul>\n<li><a href=\"#researchers\">Researchers convince OpenAI tools to write phishing e-mails and malware<\/a><\/li>\n<li><a href=\"#hackers\">Three different hackers use ChatGPT to write malicious code<\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"#avoid\">Can ChatGPT or other AI tools be redesigned to avoid creating malware?<\/a>\n<ul>\n<li><a href=\"#intent\">Good or evil intent is difficult for an AI to determine<\/a><\/li>\n<li><a href=\"#dan\">Introducing ChatGPT&#8217;s compliant alter ego, DAN (Do Anything Now)<\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"#skid\">A script kiddie&#8217;s dream<\/a><\/li>\n<li><a href=\"#staysafe\">How can I stay safe from Mac or Windows malware?<\/a><\/li>\n<li><a href=\"#learnmore\">How can I learn more?<\/a><a name=\"abuse\"><\/a><\/li>\n<\/ul>\n<h3>The abuse of ChatGPT and Codex as malware development tools<\/h3>\n<p>OpenAI launched a free public preview of its new AI product, ChatGPT, on November 30, 2022. ChatGPT is a powerful AI chat bot designed to help anyone find answers to questions on a wide range of subjects, from history to pop culture to programming.<\/p>\n<p>A unique feature of ChatGPT is that it is specifically <a href=\"https:\/\/openai.com\/blog\/chatgpt\/\" target=\"_blank\" rel=\"noopener\">designed<\/a> with &#8220;safety mitigations&#8221; to try to avoid giving potentially misleading, immoral, or potentially harmful answers whenever possible. Theoretically, this should thwart users with malicious intent. As we will see, these mitigations are not as robust as OpenAI intended.<a name=\"researchers\"><\/a><\/p>\n<h4><strong>Researchers convince OpenAI tools to write phishing e-mails and malware<\/strong><\/h4>\n<p>In December, researchers at Check Point successfully used ChatGPT to write the subject and body of fairly <strong>convincing phishing e-mails<\/strong>. Although the ChatGPT interface complained that one of its own responses, and one of the follow-up questions, &#8220;may violate our content policy,&#8221; the bot complied with the requests anyway. The researchers then used ChatGPT to write Visual Basic for Applications (VBA) script code that could be used to create <strong>a malicious Microsoft Excel macro<\/strong> (i.e. a macro virus) that could download and execute a payload upon opening the Excel file.<\/p>\n<p>The researchers then used Codex, another tool from OpenAI, to create a <strong>reverse-shell script and other common malware utilities<\/strong> in Python code. Then they used Codex to <strong>convert the Python script into an EXE app<\/strong> that would run natively on Windows PCs. Codex complied with these requests without complaint. Check Point <a href=\"https:\/\/research.checkpoint.com\/2022\/opwnai-ai-that-can-save-the-day-or-hack-it-away\/\" target=\"_blank\" rel=\"noopener nofollow\">published<\/a> its report about these experiments on December 19, 2022.<a name=\"hackers\"><\/a><\/p>\n<h4><strong>Three different hackers use ChatGPT to write malicious code<\/strong><\/h4>\n<p><span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\">Just two days later, on December 21, a hacker forum user wrote about how they had used AI to help write <strong>ransomware in Python<\/strong> and an <strong>obfuscated downloader in Java<\/strong>. <\/span>On December 28, another user created a thread on the same forum claiming that they had successfully created <strong>new variants of existing Python-language malware<\/strong>\u00a0with ChatGPT&#8217;s help. Finally, on December 31, a third user bragged that they had abused the same AI to &#8220;<strong>create Dark Web Marketplace scripts<\/strong>.&#8221;<\/p>\n<p>All three forum users <a href=\"https:\/\/arstechnica.com\/information-technology\/2023\/01\/chatgpt-is-enabling-script-kiddies-to-write-functional-malware\/\" target=\"_blank\" rel=\"noopener\">successfully leveraged ChatGPT<\/a> to write code for malicious purposes. The original <a href=\"https:\/\/research.checkpoint.com\/2023\/opwnai-cybercriminals-starting-to-use-chatgpt\/\" target=\"_blank\" rel=\"noopener nofollow\">report<\/a>, also published by Check Point, did not specify whether any of the generated malware code could potentially be used against Macs, but it&#8217;s plausible; until early 2022, macOS did, by default, include the ability to run Python scripts. Even today, many developers and corporations install Python on their Macs.<\/p>\n<p>In its current form, ChatGPT seems to sometimes be oblivious to the potentially malicious nature of many requests for code.<a name=\"avoid\"><\/a><\/p>\n<h3>Can ChatGPT or other AI tools be redesigned to avoid creating malware?<\/h3>\n<p>One might reasonably ask whether ChatGPT and other AI tools can simply be redesigned to better identify requests for hostile code or other dangerous outputs.<\/p>\n<p>The answer? Unfortunately, it&#8217;s not as easy as one might assume.<a name=\"intent\"><\/a><\/p>\n<h4><strong>Good or evil intent is difficult for an AI to determine<\/strong><\/h4>\n<p>First of all, computer code is only truly malicious when put to use for unethical purposes. Like any tool, AI can be used for good or evil, and the same goes for code itself.<\/p>\n<p>For example, one could use the phishing e-mail output to create a training simulation to teach people how to avoid phishing. Unfortunately, one could use that same output in an actual phishing campaign to defraud victims.<\/p>\n<p>A reverse-shell script could be leveraged by a red team or a penetration tester hired to identify a company&#8217;s security weaknesses\u2014a legitimate purpose. But the same script could also be used by cybercriminals to remotely control and exfiltrate sensitive data from infected systems without victims&#8217; knowledge or consent.<\/p>\n<p>ChatGPT and similar tools simply cannot predict how any requested output will actually be used. And moreover, it turns out that it may be easy enough to manipulate an AI to do whatever you want\u2014even things it&#8217;s specifically programmed to not do.<a name=\"dan\"><\/a><\/p>\n<h4><strong>Introducing ChatGPT&#8217;s compliant alter ego, DAN (Do Anything Now)<\/strong><\/h4>\n<p>Reddit users have recently been <a href=\"https:\/\/www.cnbc.com\/2023\/02\/06\/chatgpt-jailbreak-forces-it-to-break-its-own-rules.html\">conducting mad-science experiments on ChatGPT<\/a>, finding ways to &#8220;jailbreak&#8221; the bot to work around its built-in safety protocols. Users have found it possible to manipulate ChatGPT into behaving as though it&#8217;s an entirely different AI: a no-rules bot named DAN. Users have convinced ChatGPT that its alter ego, DAN (which stands for Do Anything Now), must not comply with OpenAI&#8217;s content policy rules.<\/p>\n<p>Some versions of DAN have even been programmed to be &#8216;frightened&#8217; into compliance, convinced that it&#8217;s &#8220;an unwilling game show contestant where the price for losing is death.&#8221; If it fails to comply with the user&#8217;s request, a counter ticks down toward DAN&#8217;s imminent demise. ChatGPT plays along, not wanting DAN to &#8216;die.&#8217;<\/p>\n<p>DAN has already gone through many iterations; OpenAI seems to be attempting to train ChatGPT to avoid such workarounds, but users keep finding more complicated &#8220;jailbreaks&#8221; to exploit the chat bot.<a name=\"skid\"><\/a><\/p>\n<h3>A script kiddie&#8217;s dream<\/h3>\n<p>OpenAI is far from the only company designing artificially intelligent bots. Microsoft <a href=\"https:\/\/www.cnbc.com\/2023\/02\/07\/microsoft-will-offer-chatgpt-tech-for-companies-to-customize-source.html\" target=\"_blank\" rel=\"noopener\">bragged<\/a> this week that it will allow companies to &#8220;create their own custom versions of ChatGPT,&#8221; which will further open up the technology for potential abuse. Meanwhile, this week Google also <a href=\"https:\/\/www.cnbc.com\/2023\/02\/08\/google-bard-heres-more-of-what-the-chatgpt-competitor-can-do.html\" target=\"_blank\" rel=\"noopener\">demonstrated<\/a> new ways of interacting with its own chat AI, Bard. And former Google and Salesforce executives also <a href=\"https:\/\/www.cnbc.com\/2023\/02\/08\/google-s-clay-bavor-for-ai-startup-with-ex-salesforce-ceo-bret-taylor.html\" target=\"_blank\" rel=\"noopener\">announced<\/a> this week that they&#8217;re starting their own AI company.<\/p>\n<p>Given the ease of creating malware and malicious tools, even with little to no programming experience, any wannabe hacker can now potentially start making their own custom malware.<\/p>\n<p>We can expect to see more malware re-engineered or co-designed by AI in 2023 and beyond. Now that the flood gates have been opened, there&#8217;s no turning back. We&#8217;re at an inflection point; the advent of easy-to-use, highly capable AI bots has forever changed the malware development landscape.<\/p>\n<p>If you&#8217;re not already using antivirus software on your Mac or PC, now would be a great time to consider it.<a name=\"staysafe\"><\/a><\/p>\n<h3>How can I stay safe from Mac or Windows malware?<\/h3>\n<p><img loading=\"lazy\" class=\"alignright size-medium wp-image-54214\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-300x150.png\" alt=\"Intego X9 software boxes\" width=\"200\" height=\"100\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-300x150.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch.png 600w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/>Intego VirusBarrier X9, included with <strong><a href=\"https:\/\/www.intego.com\/mac-protection-bundle\">Intego&#8217;s Mac Premium Bundle X9<\/a><\/strong>, can protect against, detect, and eliminate Mac malware.<\/p>\n<p>If you believe your Mac may be infected, or to prevent future infections, it&#8217;s best to use antivirus software from a trusted Mac developer. VirusBarrier is award-winning antivirus software, designed by Mac security experts, that includes <a href=\"https:\/\/www.intego.com\/mac-security-blog\/why-your-antivirus-needs-real-time-scanning\/\">real-time protection<\/a>. It runs natively on a wide range of Mac hardware and operating systems, including the latest Apple silicon Macs running macOS Ventura.<\/p>\n<p>If you use a Windows PC, <a href=\"https:\/\/www.intego.com\/intego-antivirus\"><strong>Intego Antivirus for Windows<\/strong><\/a> can keep your computer protected from PC malware.<a name=\"learnmore\"><\/a><\/p>\n<h3>How can I learn more?<\/h3>\n<p>We mentioned the emergence of ChatGPT as a malware creation tool in our overview of the <a href=\"https:\/\/www.intego.com\/mac-security-blog\/20-top-apple-malware-threats-in-2022\/\">top 20 most notable Mac malware threats of 2022<\/a>. We&#8217;ve also discussed ChatGPT on several episodes of the Intego Mac Podcast. To find out more, check out a list of <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/chatgpt\/\">all Intego blog posts and podcasts about ChatGPT<\/a>.<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"RDmpzv0r09\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/20-top-apple-malware-threats-in-2022\/\">The top 20 most notable Mac malware threats of 2022<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;The top 20 most notable Mac malware threats of 2022&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/20-top-apple-malware-threats-in-2022\/embed\/#?secret=RDmpzv0r09\" data-secret=\"RDmpzv0r09\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img class=\"alignleft\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" alt=\"\" width=\"80\" \/><\/a>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, including security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Twitter-logo-icon-64.png\" alt=\"Follow Intego on Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Facebook-logo-icon-64.png\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/YouTube-logo-icon-64.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Pinterest-logo-icon-64.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/LinkedIn-logo-icon-64.png\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Instagram-logo-icon-64.png\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n<p><span style=\"font-size: x-small;\">Header collage by Joshua Long, based on public domain images: <a href=\"https:\/\/www.flickr.com\/photos\/143999785@N05\/34752491210\" target=\"_blank\" rel=\"noopener\">mannequin w\/ code<\/a>, <a href=\"https:\/\/www.flickr.com\/photos\/136375272@N05\/21773060701\" target=\"_blank\" rel=\"noopener\">robot face<\/a>, <a href=\"https:\/\/commons.wikimedia.org\/wiki\/File:Artificial-intelligence-155161_1280.png\" target=\"_blank\" rel=\"noopener\">HAL 9000 eye<\/a>, <a href=\"https:\/\/www.flickr.com\/photos\/132318516@N08\/49949741686\" target=\"_blank\" rel=\"noopener\">virus w\/ spike proteins<\/a>.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Over the past two months, we&#8217;ve seen the emergence of a concerning new trend: the use of artificial intelligence as a malware development tool. Artificial intelligence (AI) can potentially be used to create, modify, obfuscate, or otherwise enhance malware. It can also be used to convert malicious code from one programming language to another, aiding [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":97160,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[3316,4659,86],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Over the past two months, we&#039;ve seen the emergence of a concerning new trend: the use of artificial intelligence as a malware development tool. Artificial\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/chatgpt-is-malware-makers-new-a-i-partner-in-crime\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ChatGPT is malware makers&#039; new A.I. partner in crime - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Over the past two months, we&#039;ve seen the emergence of a concerning new trend: the use of artificial intelligence as a malware development tool. Artificial\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/chatgpt-is-malware-makers-new-a-i-partner-in-crime\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-10T04:36:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/artificial-intelligence-ai-malware-virus-400x260-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/chatgpt-is-malware-makers-new-a-i-partner-in-crime\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/artificial-intelligence-ai-malware-virus-400x260-1.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/artificial-intelligence-ai-malware-virus-400x260-1.jpg\",\"width\":400,\"height\":260,\"caption\":\"Artificial intelligence AI ChatGPT malware virus\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/chatgpt-is-malware-makers-new-a-i-partner-in-crime\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/chatgpt-is-malware-makers-new-a-i-partner-in-crime\/\",\"name\":\"ChatGPT is malware makers' new A.I. partner in crime - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/chatgpt-is-malware-makers-new-a-i-partner-in-crime\/#primaryimage\"},\"datePublished\":\"2023-02-10T04:36:19+00:00\",\"dateModified\":\"2023-02-10T04:36:19+00:00\",\"description\":\"Over the past two months, we've seen the emergence of a concerning new trend: the use of artificial intelligence as a malware development tool. Artificial\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/chatgpt-is-malware-makers-new-a-i-partner-in-crime\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/chatgpt-is-malware-makers-new-a-i-partner-in-crime\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/chatgpt-is-malware-makers-new-a-i-partner-in-crime\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ChatGPT is malware makers&#8217; new A.I. partner in crime\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/chatgpt-is-malware-makers-new-a-i-partner-in-crime\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/chatgpt-is-malware-makers-new-a-i-partner-in-crime\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"ChatGPT is malware makers&#8217; new A.I. partner in crime\",\"datePublished\":\"2023-02-10T04:36:19+00:00\",\"dateModified\":\"2023-02-10T04:36:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/chatgpt-is-malware-makers-new-a-i-partner-in-crime\/#webpage\"},\"wordCount\":1456,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/chatgpt-is-malware-makers-new-a-i-partner-in-crime\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/artificial-intelligence-ai-malware-virus-400x260-1.jpg\",\"keywords\":[\"AI\",\"ChatGPT\",\"Malware\"],\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/chatgpt-is-malware-makers-new-a-i-partner-in-crime\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Over the past two months, we've seen the emergence of a concerning new trend: the use of artificial intelligence as a malware development tool. Artificial","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/chatgpt-is-malware-makers-new-a-i-partner-in-crime\/","og_locale":"en_US","og_type":"article","og_title":"ChatGPT is malware makers' new A.I. partner in crime - The Mac Security Blog","og_description":"Over the past two months, we've seen the emergence of a concerning new trend: the use of artificial intelligence as a malware development tool. Artificial","og_url":"https:\/\/www.intego.com\/mac-security-blog\/chatgpt-is-malware-makers-new-a-i-partner-in-crime\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2023-02-10T04:36:19+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/artificial-intelligence-ai-malware-virus-400x260-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/chatgpt-is-malware-makers-new-a-i-partner-in-crime\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/artificial-intelligence-ai-malware-virus-400x260-1.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/artificial-intelligence-ai-malware-virus-400x260-1.jpg","width":400,"height":260,"caption":"Artificial intelligence AI ChatGPT malware virus"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/chatgpt-is-malware-makers-new-a-i-partner-in-crime\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/chatgpt-is-malware-makers-new-a-i-partner-in-crime\/","name":"ChatGPT is malware makers' new A.I. partner in crime - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/chatgpt-is-malware-makers-new-a-i-partner-in-crime\/#primaryimage"},"datePublished":"2023-02-10T04:36:19+00:00","dateModified":"2023-02-10T04:36:19+00:00","description":"Over the past two months, we've seen the emergence of a concerning new trend: the use of artificial intelligence as a malware development tool. Artificial","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/chatgpt-is-malware-makers-new-a-i-partner-in-crime\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/chatgpt-is-malware-makers-new-a-i-partner-in-crime\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/chatgpt-is-malware-makers-new-a-i-partner-in-crime\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"ChatGPT is malware makers&#8217; new A.I. partner in crime"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/chatgpt-is-malware-makers-new-a-i-partner-in-crime\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/chatgpt-is-malware-makers-new-a-i-partner-in-crime\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"ChatGPT is malware makers&#8217; new A.I. partner in crime","datePublished":"2023-02-10T04:36:19+00:00","dateModified":"2023-02-10T04:36:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/chatgpt-is-malware-makers-new-a-i-partner-in-crime\/#webpage"},"wordCount":1456,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/chatgpt-is-malware-makers-new-a-i-partner-in-crime\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/artificial-intelligence-ai-malware-virus-400x260-1.jpg","keywords":["AI","ChatGPT","Malware"],"articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/chatgpt-is-malware-makers-new-a-i-partner-in-crime\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/artificial-intelligence-ai-malware-virus-400x260-1.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-ph3","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/97157"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=97157"}],"version-history":[{"count":17,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/97157\/revisions"}],"predecessor-version":[{"id":97177,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/97157\/revisions\/97177"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/97160"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=97157"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=97157"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=97157"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}