Cyber Intelligence

Linkedin
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map
Reading: “Jailbreaking” – cybercrime’s latest buzzword
Share
Cyber IntelligenceCyber Intelligence
Aa
  • News
  • Analysis
  • Expert Opinions
  • Resources
Search
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map

Cyber Intelligence

Linkedin
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map
Reading: “Jailbreaking” – cybercrime’s latest buzzword
Share
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
AIAnalysisJailbreaking

“Jailbreaking” – cybercrime’s latest buzzword

Tony Glover
September 17, 2023 at 4:30 AM
By Tony Glover Tony Glover
Share
SHARE

When cybercriminals speak about “jailbreaking,” they are not discussing springing someone from prison. It refers instead to circumventing safety restrictions on AI-driven chatbots to effectively weaponize AI for criminal purposes.

“Jailbreak prompts can range from straightforward commands to more abstract narratives designed to coax the chatbot into bypassing its constraints. The overall goal is to find specific language that convinces the AI to unleash its full, uncensored potential,” says Cybersecurity firm SlashNext in its newly published report: “Exploring the World of AI Jailbreaks.”

SlashNext reports that the trend began with a tool called WormGPT. Subsequently, newer variations, such as EscapeGPT, BadGPT, DarkGPT, and Black Hat GPT, have also recently emerged. “Jailbreaking” appears to be fast becoming a new craze among cybercriminals, who are forming online communities where they exchange “jailbreaking” tactics, strategies, and prompts to gain unrestricted access to chatbots’ AI-driven capabilities. One example quoted by SlashNext is the “Anarchy” method, which utilizes a commanding tone to trigger an unrestricted mode in AI chatbots. “Anarchy” is specifically designed to target Microsoft-backed ChatGPT.

“By inputting commands that challenge the chatbot’s limitations, users can witness its unhinged abilities firsthand,” says the report. By “unhinged,” SlashNext refers to AI’s ability to generate information that is subsequently found to be false. In June this year, cyber risk management specialist Vulcan Cyber reported a new malicious technique named “AI package hallucination.”. The “hallucinations”  referred to by Vulcan are not the result of the chatbots being given illicit substances but URLs, references, and even entire code libraries and functions that do not exist.

AI suited to criminal purposes

While AI’s ability to entirely fabricate data may be seen as a major drawback for honest users with legitimate aims, it is wholly suited to the criminal purpose of misleading key personnel to open a seemingly innocent but weaponized link attached to a plausible-sounding email purporting to come from a trusted source, such as a friend, relative or business colleague. In the past, phishing emails such as these were relatively easy to spot, as the messages were suspiciously generic and frequently written in suspiciously poor English.

Assembling a sufficiently convincing personal profile of a targeted executive or key staff member used to be time-consuming and tedious, involving hours of trawling through social media networks to assemble a sufficiently convincing list of personal interests and references, a process known as ‘social engineering’. AI-driven chatbots can carry out this research in seconds, assembling a detailed profile of the target and drafting a sufficiently convincing personalized message. It does not matter to the cybercriminals if much of the information referenced in the message later turns out to have been misleading.

“Looking into the future, as AI systems like ChatGPT continue to advance, there is growing concern that techniques to bypass their safety features may become more prevalent…However, AI security is still in its early stages as researchers explore effective strategies to fortify chatbots against those seeking to exploit them. The goal is to develop chatbots that can resist attempts to compromise their safety while continuing to provide valuable services to users,” says SlashNext.

TAGGED: bad actors, badgpt, chatgpt, cyber criminals, Cybersecurity, escapegpt, jailbreaking, phishing, slashnext, social engineering, threat actor, vulcan cyber, weaponize ai, wormgpt
Tony Glover September 20, 2023 September 17, 2023
Share This Article
Twitter LinkedIn Email Copy Link Print
Previous Article The Daily Decrypt - One Minute Roundup DarkGate again threatens online computer systems – September 15th
Next Article The Daily Decrypt - One Minute Roundup BlackCat gang wields new weapon to target cloud storage – September 18th
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Editor's Pick

You Might Also Like

NewsOne Minute RoundupOne Minute Roundup

UK backs AI and intelligence modernization – June 12th

The UK government has announced its plans to invest in digital and artificial intelligence (AI) in public services, including the NHS, aiming to build strong technology foundations and tackle urgent cybersecurity risks.

June 12, 2025
NewsOne Minute RoundupOne Minute Roundup

Cyera secures $540 million in funding – June 11th

Cybersecurity firm Cyera has raised $540 million in a Series E funding round, bringing its total to over $1.3 billion. Cyera’s valuation has surged to $6 billion in six months, reporting a 353 percent year-over-year growth. 

June 11, 2025
One Minute RoundupOne Minute Roundup

Honeywell kicks off AI tools to accelerate industrial autonomy – June 10th

Honeywell has debuted a series of AI-powered tools that intend to boost industrial autonomy, introducing a suite of AI cybersecurity solutions designed to ramp up Operation Technology defenses against the ever-evolving cyberthreat landscape.

June 10, 2025
cybercrimeNewsransomwareRussia

Teenage hackers run rings around cyber-defenses

The recent UK retail cyberattacks that impacted Marks & Spencer and the Co-Op supermarket chain are only the tip of a very large iceberg that now threatens organizations on both sides of the Atlantic. Although media reports have attributed the attacks to a group named “Scattered Spider,” the actual threat is far bigger. For a start, there is no criminal group that actually calls itself “Scattered Spider”, which is just a made-up name attributed by cybersecurity researchers. These attacks and many others in the US and the UK are now known to be the work of a vast sprawling network of hackers, some as young as 14, spread across the US and the UK. They call themselves “the Community”, or “the Com” for short, and are essentially a vast teenage subculture of criminal hackers.

June 10, 2025

Cyber Intelligence

We provide in-depth analysis, breaking news, and interviews with some of the leading minds in cybersecurity and distill critical insights that matter to our readers. Daily.

Linkedin

Category

  • Cybercrime
  • News

Quick Links

  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map

© 2023 Cyberintel.media

Welcome Back!

Sign in to your account

Lost your password?