TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Human study on AI spear phishing campaigns

205 pointsby DalasNoin5 months ago

19 comments

1010085 months ago
I made a purchase yesterday from Meta (Oculus). A few minutes after payment, I received an email asking to click to confirm it was me.<p>It came from verify@verification.metamail.com, with alert@nofraud.com cc. All red flags for phishing.<p>I googled it because it had all the purchase information, so unless a malicious actor infiltrated Meta servers, it has to be right. And it was, after googling a bit. But why do they do such things?i would expect better from Meta.
评论 #42605322 未加载
评论 #42607209 未加载
评论 #42606149 未加载
评论 #42605575 未加载
评论 #42610415 未加载
评论 #42605169 未加载
评论 #42605015 未加载
评论 #42607030 未加载
评论 #42640281 未加载
评论 #42605788 未加载
joe_the_user5 months ago
That, after thirty years, email security still depends on the wisdom of individuals not clicking the wrong link, is appalling.<p>The situation involves institutions happy to opaque links to email as part of their workflow. What could change this? All I can imagine is state regulation but that also is implausible.
评论 #42604893 未加载
评论 #42604849 未加载
评论 #42604553 未加载
评论 #42605023 未加载
评论 #42604946 未加载
评论 #42606098 未加载
评论 #42610456 未加载
评论 #42604644 未加载
hibikir5 months ago
This lines up well with the success rates I have seen from expert phishers. When I worked at a certain well known company with strong security, a demon called Karla would succeed at spearphishing a bit over 50% of the security team.<p>AI now means much less skilled people can be as good as she was. Karla as a Service. We are doomed.
评论 #42604957 未加载
评论 #42604842 未加载
评论 #42607539 未加载
评论 #42605603 未加载
LeftHandPath5 months ago
They built their phishing emails using data scraped from public profiles. Fascinating.<p>I have to wonder if, in the near future, we&#x27;re going to have a much higher perceived cost for online social media usage. Problems we&#x27;re already seeing:<p>- AI turning clothed photos into the opposite [0]<p>- AI mimicking a person&#x27;s voice, given enough reference material [1]<p>- Scammers impersonating software engineers in job interviews, after viewing their LinkedIn or GitHub profiles [2]<p>- Fraudsters using hacked GitHub accounts to trick other developers into downloading&#x2F;cloning malicious arbitrary code [3]<p>- AI training on publicly-available text, photo, and video, to the surprise of content creators (but arguably fair use) [4]<p>- AI spamming github issues to try to claim bug bounties [5]<p>All of this probably sounds like a &quot;well, duh&quot; to some of the more privacy and security savvy here, but I still think it has created a notable shift from the tech-optimism that ran from 2012-2018 or so. These problems all existed then, too, but with less frequency. Now, it&#x27;s a full-pressure firehose.<p>[0]: <a href="https:&#x2F;&#x2F;www.wsj.com&#x2F;politics&#x2F;policy&#x2F;teen-deepfake-ai-nudes-bill-ted-cruz-amy-klobuchar-3106eda0" rel="nofollow">https:&#x2F;&#x2F;www.wsj.com&#x2F;politics&#x2F;policy&#x2F;teen-deepfake-ai-nudes-b...</a><p>[1]: <a href="https:&#x2F;&#x2F;www.fcc.gov&#x2F;consumers&#x2F;guides&#x2F;deep-fake-audio-and-video-links-make-robocalls-and-scam-texts-harder-spot" rel="nofollow">https:&#x2F;&#x2F;www.fcc.gov&#x2F;consumers&#x2F;guides&#x2F;deep-fake-audio-and-vid...</a><p>[2]: <a href="https:&#x2F;&#x2F;connortumbleson.com&#x2F;2022&#x2F;09&#x2F;19&#x2F;someone-is-pretending-to-be-me&#x2F;" rel="nofollow">https:&#x2F;&#x2F;connortumbleson.com&#x2F;2022&#x2F;09&#x2F;19&#x2F;someone-is-pretending...</a><p>[3]: <a href="https:&#x2F;&#x2F;it.ucsf.edu&#x2F;aug-2023-impersonation-attacks-target-github-developers" rel="nofollow">https:&#x2F;&#x2F;it.ucsf.edu&#x2F;aug-2023-impersonation-attacks-target-gi...</a><p>[4]: <a href="https:&#x2F;&#x2F;creativecommons.org&#x2F;2023&#x2F;02&#x2F;17&#x2F;fair-use-training-generative-ai&#x2F;" rel="nofollow">https:&#x2F;&#x2F;creativecommons.org&#x2F;2023&#x2F;02&#x2F;17&#x2F;fair-use-training-gen...</a><p>[5]: <a href="https:&#x2F;&#x2F;daniel.haxx.se&#x2F;blog&#x2F;2024&#x2F;01&#x2F;02&#x2F;the-i-in-llm-stands-for-intelligence&#x2F;" rel="nofollow">https:&#x2F;&#x2F;daniel.haxx.se&#x2F;blog&#x2F;2024&#x2F;01&#x2F;02&#x2F;the-i-in-llm-stands-f...</a>
评论 #42608095 未加载
serviceberry5 months ago
While I broadly agree with the concerns about using LLMs for &quot;commoditized&quot;, large-scale phishing, isn&#x27;t the study a bit lacking? Specifically, &quot;click through&quot; is a pretty poor metric for success.<p>If I receive a unique &#x2F; targeted phishing email, I sure will check it out to understand what&#x27;s going on and what they&#x27;re after. That doesn&#x27;t necessarily mean I&#x27;m falling for the actual scam.
评论 #42605403 未加载
评论 #42605827 未加载
评论 #42609591 未加载
terribleperson5 months ago
This is one of the terrifying, probably already happening threats presented by current LLMs.<p>Social engineering (and I include spearphishing) has always been powerful and hard to mitigate. Now it can be done automatically at low cost.
bennythomsson5 months ago
How did they generate these? If I try with ChatGPT then it refuses, citing a possible violation of their content policy. Even when I tell it that this is for me personally, it knows who I am, and that it&#x27;s just for a test -- which obviously I could be just pretending, but again, it knows who I am but still refuses.
评论 #42605578 未加载
评论 #42605081 未加载
评论 #42605882 未加载
cluckindan5 months ago
If the study was done with target consent, it might be biased with inflated click-through rates due to the targets expecting benign well-targeted spear-phishing messages.<p>If it was done without target consent, it would certainly be unethical.
评论 #42604501 未加载
评论 #42604627 未加载
alisonatwork5 months ago
It&#x27;s probably more a reflection on me than the authors, but one thing that stood out for me in this paper is that there is a spelling mistake in the conclusion (&quot;spar phishing&quot;), which immediately made it come across as poorly-reviewed and got me wondering if there are other mistakes that are outside of my expertise to identify.
评论 #42611756 未加载
mtrovo5 months ago
I’ve always figured those guardrails wouldn’t really hold up, but hearing that AI-based phishing can be 50 times more cost-effective than manual attacks is a serious wake-up call. We might have to rethink everything from spam filtering to overall threat detection to step up our AI defenses game.
ddmf5 months ago
We had an email come in from a pension combining processor, the url they gave so that you could add information about someone&#x27;s pension was similar to:<p>employer.git.pension-details.vercell.app<p>Why do these companies make this stuff so hard!?
webdevladder5 months ago
I believe I was the target of employment-flavored spear phishing a few months ago. Could have been a researcher like the OP.<p>- 3 new email chains from different sources in a couple weeks, all similar inquiries to see if I was interested in work (I wasn&#x27;t at the time, and I receive these very rarely)<p>- escalating specificity, all referencing my online presence, the third of which I was thinking about a month later because it hit my interests squarely<p>- only the third acknowledged my polite declining<p>- for the third, a month after, the email and website were offline<p>- the inquiries were quite restrained, having no links, and only asking if I was interested, and followed up tersely with an open door to my declining<p>I have no idea what&#x27;s authentic online anymore, and I think it&#x27;s dangerous to operate your online life with the belief that you can discern malicious written communications with any certainty, without very strong signals like known domains. Even realtime video content is going to be a problem eventually.<p>I suppose we&#x27;ll continue to see VPN sponsorships prop up a disproportionate share of the creator economy.<p>In other news Google routed my mom to a misleading passport renewal service. She didn&#x27;t know to look for .gov. Oh well.
Retr0id5 months ago
It&#x27;s worth noting that &quot;success&quot; here is getting the target to click a link, and not (for example) handing over personal information or credentials.
ttul5 months ago
Organizations should be spear phishing their employees using LLMs to test defenses and identify gaps in security awareness training and processes.
nostradumbasp5 months ago
Imagine if models were trained for this purpose using OS-INT and reinforcement learning instead of repurposing a general model and using generic prompts from a somewhat safe guarded LLM?<p>That&#x27;s where we&#x27;re headed. Bad actors paying for DDoS attacks is more or less mainstream these days. Meanwhile the success rate for phishing attacks is incredibly high and the damage is often immense.<p>Wonder what the price for AI targeted phishing attacks would be? Automated voice impersonation attempts at social engineering, smishing, e-mails pretending to be customers, partners, etc. I bet it could be very lucrative. I could imagine a motivated high-schooler pulling off each of those sorts of &quot;services&quot; in a country with lax enough laws. Couple those with traditional and modern attack vectors and wow it could be really interesting.
015a5 months ago
&quot;Look, humans will adapt to the ever-increasing and accelerating nightmares we invent. They always have before. Technology isn&#x27;t inherently evil, its how it is used that can be evil, its not our fault that we make it so accessible and cheap for evil people to use. No, we can&#x27;t build safeguards, the efficient market hypothesis leaves no room for that.&quot;
评论 #42605363 未加载
tylerchilds5 months ago
they keep saying participants, but am i missing where the targets opted into participation?
TechDebtDevin5 months ago
Grandma is fkd
评论 #42604365 未加载
justinl335 months ago
this research actually demonstrates that AI will reduce the phishing threat long-term, not increase it. Yes, the 50x cost reduction is scary, but it also completely commoditizes the attack vector.
评论 #42605012 未加载