Using ChatGPT and AI/ML to Combat Social Engineering Attacks

Overview

Social engineering is a psychological manipulation technique that exploits human behaviors, trust, and emotions to deceive individuals into revealing sensitive information, performing actions, or compromising security. Attackers employ various tactics, such as phishing, smishing, vishing, pretexting, and impersonation, to manipulate targets' cognitive biases and emotions, often bypassing technical safeguards. Awareness, education, and vigilance are crucial for individuals and organizations to mitigate the risks posed by social engineering attacks and protect against unauthorized access, data breaches, and other security breaches.

ChatGPT allows users and cybersecurity analysts to check for potential phishing emails and SMS message attempts before they occur. There is a cybersecurity search engine available to allow instant checking of phishing attempts through URL checks and email attachments in Google Chrome. 

In this lab, you will learn to:

  1. Use ChatGPT to review the validity of different examples of phishing emails and smishing messages.
  2. Use ChatGPT to create a smishing text message.
  3. Send an SMS text message via Gmail.
  4. Use AI/ML tools to check links as malicious.

Key terms and descriptions

Phishing
Attackers send deceptive emails or messages impersonating a legitimate entity, such as a bank, social media site, or organization, to trick recipients into revealing their sensitive information like passwords, credit card details, or personal identification.
Smishing
Smishing, a portmanteau of "SMS" (Short Message Service) and "phishing," is a form of social engineering attack conducted via text messages (SMS) or other messaging apps.
Vishing
Vishing, short for "voice phishing," is a type of social engineering attack that involves manipulating individuals over the phone to extract sensitive information, gain unauthorized access, or facilitate fraudulent activities.
Pretexting
Attackers create a fabricated scenario or pretext to gain the target's trust. For instance, they might pose as a coworker, IT support, or another trusted entity to convince the target to share confidential information.
Baiting
This involves enticing victims with an appealing item, such as a free software download or physical device, that contains malicious software. Once the victim interacts with the item, the attacker gains access to the system.
Quid Pro Quo
Attackers promise something of value in exchange for sensitive information or access. For example, an attacker might call pretending to be IT support and offer to fix a computer issue in exchange for the user's login credentials.
Tailgating
An attacker gains unauthorized physical access to a secured building by following an authorized person through a controlled entry point.
Impersonation
Attackers may pretend to be someone of authority, such as a manager or executive, to manipulate employees into disclosing confidential information or performing actions they shouldn't.
Honeytrap
This involves using romantic or sexual enticement to manipulate a target into revealing information or taking certain actions.
Quizzes and Surveys
Attackers use seemingly harmless quizzes or surveys to collect personal information that can be used for identity theft or other malicious purposes.
Dumpster Diving
Attackers search through trash or recycling to find discarded documents with sensitive information like passwords, credit card statements, or invoices.