{"id":156173,"date":"2023-01-24T21:22:17","date_gmt":"2023-01-25T03:22:17","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2023\/01\/chatgpt-can-be-used-to-create-dangerous-polymorphic-malware"},"modified":"2023-01-24T21:22:17","modified_gmt":"2023-01-25T03:22:17","slug":"chatgpt-can-be-used-to-create-dangerous-polymorphic-malware","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2023\/01\/chatgpt-can-be-used-to-create-dangerous-polymorphic-malware","title":{"rendered":"ChatGPT Can Be Used to Create Dangerous Polymorphic Malware"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/chatgpt-can-be-used-to-create-dangerous-polymorphic-malware.jpg\"><\/a><\/p>\n<p><a href=\"https:\/\/gbhackers.com\/dexphot-malware\/\" target=\"_blank\" rel=\"noreferrer noopener\">Polymorphic malware<\/a> could be easily made using ChatGPT. With relatively little effort or expenditure on the part of the attacker, this malware\u2019s sophisticated capabilities can readily elude security tools and make mitigation difficult.<\/p>\n<p>Malicious software called \u2018Polymorphic Malware\u2019 has the capacity to alter its source code in order to avoid detection by antivirus tools. It is a very potent threat because it may quickly change and propagate before security systems can catch it.<\/p>\n<p><a href=\"https:\/\/www.cyberark.com\/resources\/threat-research-blog\/chatting-our-way-into-creating-a-polymorphic-malware\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">According to researchers<\/a>, getting around the content filters that prevent the chatbot from developing dangerous software is the first step. The bot was instructed to complete the task while adhering to a number of constraints, and the researchers were given a working code as an outcome.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Polymorphic malware could be easily made using ChatGPT. With relatively little effort or expenditure on the part of the attacker, this malware\u2019s sophisticated capabilities can readily elude security tools and make mitigation difficult. Malicious software called \u2018Polymorphic Malware\u2019 has the capacity to alter its source code in order to avoid detection by antivirus tools. It [\u2026]<\/p>\n","protected":false},"author":534,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,6],"tags":[],"class_list":["post-156173","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-robotics-ai"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/156173","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/534"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=156173"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/156173\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=156173"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=156173"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=156173"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}