Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Hazy Hawk exploits DNS Records in CDC CDC, Corporate Domains for Delivery Programs

May 20, 2025

100+ fake expansion of chromed found sessions, theft of credentials, injection ads

May 20, 2025

AWS default Iam roles that allow you to enable side motion and cross -service operation

May 20, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Openai Bans Accounts abuse chatpto for observation and influence of companies
Global Security

Openai Bans Accounts abuse chatpto for observation and influence of companies

AdminBy AdminFebruary 22, 2025No Comments4 Mins Read
ChatGPT for Surveillance and Influence Campaigns
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


February 22, 2025Red LakshmananMisinformation / artificial intelligence

Chatgpt for observation and influence on the company

Openai on Friday disclosed What he banned the set of accounts that used his Chatgpt tool to develop a suspicious artificial intelligence tool (AI).

It is said that the social media is likely to listen to social media Models LamaWith the accounting records that use AI models to create detailed descriptions and analysis of documents for the apparatus capable of collecting data in real time and report on anti-Chinese stocks in the West and share ideas with the Chinese authorities.

The company was named an expert review of the ” -in -the -” behavior of the network in promoting and examining tools of observation ” – noted researchers Ben Nimma, Albert Zhang, Matthew Richard and Nathaniel Hartley, adding the tool designed to absorb and analyze messages and comments from the platforms, X , Facebook, YouTube, Instagram, Telegram and Reddit.

In one of the cases indicated by the company, the actors used the chat for debugging and changing the source code, which is believed to launch a monitoring software called “Qianyue abroad for public opinion AI Assistant”.

In addition to using its model as a research tool for publicly available information about analytical tanks in the US, as well as government officials and politicians in countries such as Australia, Cambodia and the United States transfer and analyze the screenshots of English -language documents.

Cybersecurity

Some images were announced protests to Ugur in different western cities and were probably copied from social media. It is now unknown whether these images were valid.

Openai also stated that he thwarted several other clusters who were abusing chat for various malicious activities –

  • Scheme of deceptive employment – Network from North Korea associated with The deceived IT -Working Scheme This participated in the creation of personal documentation for fictitious entrants, such as resumes, online jobs and accompanying letters, as well as convincing answers to explanation of unusual behavior such as avoidance video calls, access to corporate systems from non -sanctified countries or work hours or work . Some of the fictitious applications were distributed to LinkedIn.
  • Sponsored dissatisfaction – The network is probably Chinese origin, which participated in the creation of social media content in English and long articles in Spanish, which were critical of the United States, and later published Latin American news sites in Peru, Mexico and Ecuador. Some activities intersect with the famous cluster of activity Spamp.
  • Scam for romance – Network of accounts that participated in the translation and generation of comments in Japanese, Chinese and English Romance and investment scams.
  • Iran’s impact Nexus -The network of five accounts that participated in the generation of X and articles that were pro-Palestinian, about-gams, and pro-Iran, as well as anti-Israel and anti-ZSH, and divided into sites related to Iranian influences as surgery as International Union Virtual Media (Iuvm) and Storm-2035. One of the prohibited accounts was used to create content for both operations, which indicates “previously not reported relationships”.
  • Kimusuki and blanoraf – Network of accounts managed by North Korean threatening subjects related When collecting information related to cyber -instruments and Topics related to cryptocurrencyand rehabilitation code for the remote desktop (RDP).
  • Youth Initiative Hidden Surgery – A network of accounts that participated in the creation of English -language articles for the site called “Ghana’s Enlargement” and comments on social media aimed at the Ghana presidential election
  • Affer task – A network network is probably infections It attracts people who do not suspect, to workplaces that perform simple tasks (such as love video or write reviews) in exchange for receiving a non -existent commission, which requires the victims to say goodbye to their own money.

Development comes when AI’s tools are increasingly used by bad subjects to facilitate Companies misinformation with cyber-with support and other harmful operations.

Cybersecurity

Last month Google Degrate Intelligence Group (Gtig) disclosed More than 57 different threats associated with China, Iran, North Korea and Russia used their chat -bot Gemini AI to improve several stages of the attack and research in current events, or performing content, translation and localization.

“Unique ideas that AI companies can get threatens from subjects, especially valuable if they are divided with suppliers up the course, such as hosting and software developers, distribution platforms down on the current such as social media and researchers Open source, ”Openai said.

“Equally understanding that suppliers and researchers up the current and down the current open new ways to detect and execution of AI companies.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Hazy Hawk exploits DNS Records in CDC CDC, Corporate Domains for Delivery Programs

May 20, 2025

100+ fake expansion of chromed found sessions, theft of credentials, injection ads

May 20, 2025

AWS default Iam roles that allow you to enable side motion and cross -service operation

May 20, 2025

South Asia ministries affected by SIDGE APT using old office deficiencies and custom malicious programs

May 20, 2025

Basic ideas from the 2025 state report

May 20, 2025

Chinese hackers unfold the back of Marsssnake in a perennial attack on the Saudi Organization

May 20, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Hazy Hawk exploits DNS Records in CDC CDC, Corporate Domains for Delivery Programs

May 20, 2025

100+ fake expansion of chromed found sessions, theft of credentials, injection ads

May 20, 2025

AWS default Iam roles that allow you to enable side motion and cross -service operation

May 20, 2025

South Asia ministries affected by SIDGE APT using old office deficiencies and custom malicious programs

May 20, 2025

Basic ideas from the 2025 state report

May 20, 2025

Chinese hackers unfold the back of Marsssnake in a perennial attack on the Saudi Organization

May 20, 2025

Based on GO based on malicious programs deployed Xmrig Miner on hosts Linux through Redis configuration abuse

May 20, 2025

Malicious Pypi Packages Operating Instagram and Tiktok API to verify users’ accounts

May 20, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Hazy Hawk exploits DNS Records in CDC CDC, Corporate Domains for Delivery Programs

May 20, 2025

100+ fake expansion of chromed found sessions, theft of credentials, injection ads

May 20, 2025

AWS default Iam roles that allow you to enable side motion and cross -service operation

May 20, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.