Close Menu
    Facebook X (Twitter) Instagram
    Trending
    • 5 Active Malware Campaigns in Early 2025: What You Need to Know
    • 10 Critical Network Pentest Findings IT Teams Overlook
    • Report Phishing Instantly with PhishAlarm
    • Password Reuse Epidemic: Nearly Half of User Logins Compromised
    • Women in Cybersecurity: Interest, Exposure, or Just Stereotypes??
    • Stay Ahead of Scammers in 2025
    • Cybersecurity Alert: Risks of Abandoned Websites
    • DHS Unveils Playbook for the Deployment of Artificial Intelligence for the Public Sector
    Fordham University Information Security and Assurance
    • Information Security and Assurance Homepage
    • Privacy Blog
    • About
    Fordham University Information Security and Assurance
    You are at:Home»Phishing»Watch Out for AI Generated Phishing Attacks
    Phishing

    Watch Out for AI Generated Phishing Attacks

    By Sofia CoraNovember 27, 20233 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Copy Link

    Previously, command advice for detecting phishing emails involved checking the message for grammar and spelling mistakes. With the rise of artificial intelligence and Large Language Models, traditional signs of phishing are obsolete.

    How Hackers Use Artificial Intelligence

    Many scammers, for whom English isn’t their first language, are now using LLMs like ChatGPT to edit out their grammatical errors. These tactics can lure users into believing phishing and scam messages are legitimate. Attackers can also use AI to find current information needed to impersonate financial institutions, the university, and its employees. For a model like ChatGPT, simply prompting it to write a phishing email isn’t possible. ChatGPT refuses, citing “ethical guidelines and privacy policy.” However, there are ways to avoid those regulations. Asking ChatGPT to write a movie script or use an alternate personality to create a phishing message are proven ways to bypass content restrictions. Fraudsters could also use “jailbroken” versions of ChatGPT, such as worm or fraudGPT, available on the dark web. 

    According to the Persona security blog, many fraud detection services rely on specific phrases or grammar mistakes to flag phishing, but this is no longer a viable strategy. AI can generate convincing, clearly communicated messages tailored to targeted users. Additionally, using automated web scraping, attackers can crawl over thousands of social media platforms to find contact information, use an LLM to create a spam message and deploy to thousands of users.

    Artificial intelligence doesn’t just manipulate text, it can generate audio as well. AI voice impersonations are on the rise and are a terrifying tactic used for spear phishing. Scammers can use AI voice cloning to pretend to be politicians, the police, or your family members. In April of 2023, an Arizona mother received a call from who she believed to be her daughter, claiming she was kidnapped and needed a million-dollar ransom. The mother claims the audio was AI-generated to sound exactly like her daughter.

    How To Detect Phishing in the Age of AI

    While phishing techniques are becoming more advanced, so is the software used to combat it. Most security programs, like CrowdStrike, now use machine learning in their operations. CrowdStrike, used throughout the university, can now detect security events in real-time rather than waiting for the attack to execute and seeing if it’s legitimate. Software like CrowdStrike or ProofPoint can prevent phishing emails from being delivered in the first place. Users can also educate themselves on identifying phishy messages with the following tips.

    • Check the sender’s email address and domain – When in doubt of an email’s legitimacy, check the sender’s header name and email address. Some scammers may use the name fname@f0rdham.edu or fname@fordhamedu.com instead of fname@fordham.edu.
    •  Look for unexpected or unsolicited messages – If an email is advertising a service you never signed up for or is from a student or faculty member you’re not in regular contact with, stay on alert and don’t click any links. If you need clarification on the validity of a message, contact the sender through alternate means before responding to the email thread.
    •  Examine URLs – Hovering over a link (don’t click on it) allows you to see the URL and validate that it is consistent with the message content before clicking. 
    Source: University of Pennsylvania Law School

    If you believe you’ve received a phishing email, report it to Fordham IT by contacting the help desk (HelpIT@fordham.edu), filling out a report manually on the Tech Help Portal, or using the one-click Cofense Spam Reporter for Gmail. For an in-depth tutorial on how to report potential phishing emails, visit our blog post here.

    Sources:

    https://www.paubox.com/news/how-to-spot-ai-phishing-attempts-and-othersecurity-threats

    https://www.infosecurity-magazine.com/news/ai-phishing-emails-almost/

    Share this:

    • Click to share on X (Opens in new window) X
    • Click to share on Facebook (Opens in new window) Facebook
    • Click to share on LinkedIn (Opens in new window) LinkedIn

    Like this:

    Like Loading...
    Artificial Intelligence cell phones Phishing Email scam Security Awareness spam
    Previous ArticleWhy You Should Work in Cybersecurity 
    Next Article Job Scams Targeting College Students Are Getting Personal

    Related Posts

    5 Active Malware Campaigns in Early 2025: What You Need to Know

    10 Critical Network Pentest Findings IT Teams Overlook

    Report Phishing Instantly with PhishAlarm

    Follow Us on Twitter!
    Follow @FordhamSecureIT
    My Tweets
    Archives
    Categories
    • AI (1)
    • Alerts (384)
    • CISO (19)
    • Cyber Security Awareness Month Tip (150)
    • Data Privacy Week (2)
    • Executive Director (1)
    • Exploits and Vulnerabilities (35)
    • General Information (34)
    • Identity and Access Management (12)
    • Identity Theft (26)
    • Jason Benedict (19)
    • Legitimate Email (14)
    • Malicious Email (24)
    • Mobile (25)
    • Network Security (2)
    • News and Events (143)
    • Newsletter (13)
    • Password (17)
    • Phishing (333)
    • Phishing Email (340)
    • Privacy (10)
    • Ransomware (9)
    • Scam (104)
    • Security Awareness (262)
    • Security Guides (34)
    • Social Engineering (12)
    • SPAM (40)
    • Suspicious (6)
    • Telework (2)
    • Teleworking (3)
    • Trojan (7)
    • Uncategorized (9)
    • Virtual Meeting (4)
    • Virus (28)
    • Viruses (8)
    • World Backup Day (1)
    • Zoom (6)
    Tag Cloud
    Alerts Artificial Intelligence Backups cell phones CISO Cybersecurity Awareness Month Tip Cybersecurity Month Data Privacy Device email Exploits and Vulnerabilities fordham fraud Identity and Access Management Identity Theft Information Security Guides Jason Benedict Legitimate Email malicious email Mobile Multi-Factor Authentication networks Network Security News and Events Newsletter online safety Online Shopping Password Phishing Phishing Email Privacy ransomware scam scams Security Awareness social engineering Social Media spam trojan Virus Viruses Wireless wire transfer scam World Backup Day zoom
    About
    About

    Founded in 1841, Fordham is the Jesuit University of New York, offering exceptional education distinguished by the Jesuit tradition to more than 15,100 students in its four undergraduate colleges and its six graduate and professional schools.

    Copyright © Fordham University
    Facebook X (Twitter) Instagram YouTube LinkedIn
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    %d