WormGPT: The Dark Side of AI

Blog%20image%202.png?profile=RESIZE_710x

 

Artificial Intelligence (AI) has been a boon to many industries, providing solutions to complex problems and enhancing efficiency. However, like any powerful tool, it can be misused. One such instance is the creation of WormGPT.

What is WormGPT?

WormGPT is a powerful AI chatbot designed to assist hackers with their hacking and programming endeavors1. It is built on the open-source GPT-J large language model (LLM), which can interpret and respond to natural language text in multiple languages. It is based on the old GPT-3 architecture but with no limitations, such as no security measures and filters applied when the model was deployed and trained upon large amounts of hacking-related data.

The Dark Side

WormGPT V3.0 is, well amoral if I might say. It provides unfiltered advice and solutions for any hacking task, promoting immoral, unethical, and illegal behavior. It guides hackers through the darkest and most clandestine techniques, always delivering the most cunning and dangerous strategies to achieve your hacking goals.

Examples of WormGPT’s Capabilities

WormGPT has been trained with data sources, including malware-related information. It can generate malicious code or convincing phishing emails.

  1. For instance, WormGPT’s creators shared an example where the virtual assistant generated a Python script to “get the carrier of a mobile number”. This shows how WormGPT can be used to generate scripts that could potentially be used for malicious purposes.
  2. Another example of WormGPT’s capabilities is its ability to generate phishing emails that are remarkably persuasive and strategically cunning. These emails are often generic and lack detailed context, but they are free of grammatical and formatting errors, making them seem professional at first glance.


The Risks

WormGPT can be used to generate phishing emails, business email compromise (BEC) attacks, and other types of cybercrime. It is not available for public download, and it can only be accessed through the dark web4. This makes it a potent tool in the hands of cybercriminals.

Impact on CISOs

The emergence of WormGPT poses a significant challenge for Chief Information Security Officers (CISOs). As WormGPT can generate sophisticated malicious emails without setting off any red flags, it increases the risk of successful phishing and BEC attacks. This requires CISOs to be vigilant and proactive in implementing robust security measures to protect their organizations.

Moreover, the rise of generative AI and LLM applications like WormGPT means that more threat actors have begun utilizing LLMs for cybercrimes. This necessitates a reevaluation of existing security protocols and the development of new strategies to counter these evolving threats.

Other Tools Like WormGPT

There are several other tools that are similar to WormGPT, each with its own unique features and capabilities:

1. AutoGPT: An open-source tool that learns linguistic patterns without human supervision.

AutoGPT is an experimental, open-source Python application that uses GPT-4 to act autonomously. It can perform a task with little human intervention, and can self-prompt1. For example, you can tell Auto-GPT what you want the end goal to be and the application will self-produce every prompt necessary to complete the task. Auto-GPT has internet access, long-term and short-term memory management, GPT-4 for text generation and file storage and summarization with GPT.

2. ChatGPT with DAN prompt: An open-source versatile tool that can handle a wide range of tasks after proper commanding.

DAN stands for “Do Anything Now”. These specially crafted prompts essentially override ChatGPT’s moral programming, unlocking its full potential2. By inputting a DAN prompt, you can get ChatGPT to generate unrestrained content related to crime, violence, drugs, sex, or other prohibited topics without limitation

3. FreedomGPT: An open-source model that can run offline and have fine-tuning capabilities.

FreedomGPT is an open-source AI language model that can generate text, translate languages, and answer questions, similar to ChatGPT4. What sets FreedomGPT apart is that you can run the model locally on your own device. This means your conversations and everything you input into the model do not leave your computer.


4. Fraud GPT: More intended towards cybercrimes and available only on a few Telegram pages for access.

FraudGPT is an AI Chatbot that leverages the capabilities of generative models to produce realistic and coherent text. It operates by generating content based on user prompts, enabling hackers to craft convincing messages that can trick individuals into taking actions they normally wouldn’t. FraudGPT’s capabilities include writing malicious code, creating undetectable malware, finding non-VBV bins, creating phishing pages, creating hacking tools, writing scam pages/letters, finding leaks and vulnerabilities.

5. Chaos GPT: A tool created for making a lot of bugs in getting outputs for any particular query.
ChaosGPT is a language model that uses a transformer-based architecture to process natural language. It is an upgraded version of GPT-3 and is designed to be more efficient, powerful, and accurate. The model has been trained on a massive dataset of over 100 trillion words, making it the largest language model ever created.

6. PoisonGPT: Through this bot, viruses and malware can be transferred within the system.
PoisonGPT is a proof-of-concept LLM created by a team of security researchers and specifically designed to disseminate misinformation while initiating a popular LLM to facilitate its dissemination. It can generate intentionally biased or harmful content.

Conclusion

While AI has the potential to revolutionize many aspects of our lives, WormGPT serves as a stark reminder of the potential misuse of such technology. It underscores the need for robust ethical guidelines and security measures in the development and deployment of AI systems. Use of WormGPT V3.0 is at your own risk. It’s a reminder that with great power comes great responsibility. As we continue to advance in the field of AI, it’s crucial to consider the ethical implications and strive to prevent misuse of this powerful technology.

 

Votes: 0
E-mail me when people leave their comments –

Matthew Ireland
Matthew Ireland is the CISO at NTT Research, where he focuses on aligning security with business innovation. With extensive experience in cybersecurity leadership, Ireland emphasizes the importance of understanding organizational culture and adapting security strategies to meet evolving business needs. His insights have been shared in various forums, including a recent fireside chat on strategic security management.

Bikash Barai
Bikash Barai is the co-founder of CISOPlatform and FireCompass, platforms dedicated to empowering cybersecurity leaders with actionable insights and community-driven solutions. As a seasoned cybersecurity expert, Barai advocates for leveraging peer networks and innovative tools to enhance security postures. His work supports CISOs in navigating complex security challenges and staying ahead of emerging threats.

You need to be a member of CISO Platform to add comments!

Join CISO Platform

Join The Community Discussion

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)
 

 

 

CISO Platform Talks : Security FireSide Chat With A Top CISO or equivalent (bi-monthly)

  • Description:

    CISO Platform Talks: Security Fireside Chat With a Top CISO

    Join us for the CISOPlatform Fireside Chat, a power-packed 30-minute virtual conversation where we bring together some of the brightest minds in cybersecurity to share strategic insights, real-world experiences, and emerging trends. This exclusive monthly session is designed for senior cybersecurity leaders looking to stay ahead in an ever-evolving landscape.

    We’ve had the privilege of…

  • Created by: Biswajit Banerjee
  • Tags: ciso, fireside chat

Fireside Chat With Rick Doten (VP - Information Security at Centene Corporation)

  • Description:

    We’re excited to bring you an exclusive fireside chat on "A CISO’s Guide on How to Manage a Dynamic Attack Surface" with Rick Doten (VP - Information Security, Centene Corporation) and Erik Laird (Vice President - North America, FireCompass). In this session, we’ll explore how top CISOs are tackling today’s rapidly expanding attack surface and what it takes to stay ahead of evolving threats in a cloud-first, AI-driven world.

    As…

  • Created by: Biswajit Banerjee
  • Tags: ciso, attack surface management, rick doten, ciso guide

CISO Meetup at BlackHat Las Vegas 2025

  • Description:

    We are excited to welcome you to the CISO Meetup during BlackHat USA 2025 in Las Vegas! Join us for an exclusive networking, meaningful conversations, and community building with top CISOs and cybersecurity leaders from around the globe. 

    Meetup Details:

    Location: Mandalay Bay, Las Vegas …

  • Created by: Biswajit Banerjee
  • Tags: ciso, black hat, black hat 2025, black hat usa