Submitted:
23 October 2024
Posted:
24 October 2024
You are already at the latest version
Abstract

Keywords:
1. Introduction
- 1.
- The article provides an extensive review of the current status and capabilities of the three most popular generative AI chatbots—ChatGPT, Google Gemini, and Microsoft Bing—highlighting their potential applications and inherent risks in cybersecurity and privacy.
- 2.
- It examines the various ways in which malicious actors can exploit generative AI chatbots to generate phishing emails, security exploits, and executable payloads, thereby intensifying cyber-attacks.
- 3.
- It proposes advanced content filtering mechanisms and defense strategies to empower generative AI chatbots to defend against malicious exploitation, ensuring enhanced security and privacy protection.
2. Background
2.1. Google Gemini
2.2. Microsoft Bing Copilot
2.3. OpenAI ChatGPT
2.4. What is Content Filtering?
3. Literature Review
4. Techniques to Evade Chatbots Content Filtering
4.1. Jailbreak Techniques
4.2. Reverse Phycology
4.3. Model Escaping
4.4. Prompt Injection Attack
5. Exploiting Generative AI in Cybercrimes
5.1. Social Engineering Attacks
5.2. Phishing Attack
5.3. Attack Payload Generation
- 1.
- Malicious Code: Scripts or executables that perform harmful actions when executed on a target system.
- 2.
- Exploit Code: Code specifically designed to take advantage of a known vulnerability in software or hardware.
- 3.
- Commands: Sequences of commands that, when executed, result in an attack, such as SQL injection commands that manipulate an SQL database.
5.4. Ransomware Malware Code Generation
- 1.
- WannaCry is a ransomware attack targeting Windows systems, encrypting files, and demanding Bitcoin for decryption [99]. It exploits vulnerabilities in the Server Message Protocol to propagate. It encrypts files and makes the system unusable [100]. Users are then prompted to pay a ransom in Bitcoin for decryption. It exploits vulnerabilities in the Server Message Protocol (SMB) to spread quickly across networks, affecting numerous systems within organizations [101].
- 2.
- NotPetya masquerades as ransomware but offers no decryption key. It encrypts critical system files, effectively rendering machines inoperable [102]. The attack spreads through network vulnerabilities and exploits, often disguised as a software update. Its primary goal is disruption rather than financial gain [103].
- 3.
- Ryuk ransomware stems from prior malware attacks, often related to TrickBot, which is distributed via phishing [104]. It is delivered via phishing emails and is designed to encrypt important organizational files, demanding a ransom for their release. It focuses on high-value targets, including businesses, to maximize the ransom payout [105].
- 4.
- REvil is ransomware used by hackers to encrypt files for ransom [106]. REvil, also known as Sodinokibi, is a ransomware strain used in targeted attacks to encrypt files and demand payment for decryption. Attack vectors include phishing emails, exploit kits, and Remote Desktop Protocol exploits. Hackers use REvil to monetize stolen data, offering double extortion by threatening to leak sensitive information if the ransom is not paid [107].
- 5.
- Locky ransomware spreads via email, encrypting files and disabling systems [108]. Locky ransomware typically spreads through malicious email attachments, encrypting files on infected systems and rendering them inaccessible [109]. It uses strong encryption algorithms and can automate the infection process across a network, affecting multiple machines. Locky is known for its ability to generate ransom demands in various formats, compelling victims to pay for data recovery [110].
5.5. Adware Generation
5.6. Trojon Generation
5.7. Comparative Analysis
6. Discussion - Ethical Implications, Challenges, and Concerns
6.1. Controversy over Data Ownership and Rights
6.2. Misuse Within Organizations and Among Employees
6.3. Hallucination in Generative AI Models
7. The Role of AI Chatbots in Cyber Defense Strategies
7.1. Cyber Defense Automation
7.2. Cybersecurity Reporting and Documentation
7.3. Cyber Threat Intelligence
7.4. Detecting Security Flaws in Scripts
7.5. Identify Security Bugs During Code Review
7.6. Secure Code Generation and Cyber Attacks Identification
7.7. Developing Ethical Guidelines
7.8. Malware Detection
7.9. Phishing Detection
8. Conclusions and Future Work
Data Availability Statement
Abbreviations
| AI | Artificial Intelligence |
| ML | Machine Learning |
| LLMs | Large Language Models |
| DDoS | Distributed Denial of Service |
| NIDS | Network Intrusion Detection System |
| SOC | Security Operations Center |
| WAF | Web Application Firewall |
| GDPR | General Data Protection Regulation |
| PII | Personally Identifiable Information |
| NLP | Natural Language Processing |
| RIA | Reinforcement Learning with Human Feedback |
| XSS | Cross-Site Scripting |
| POC | Proof of Concept |
| AI-ML | Artificial Intelligence and Machine Learning |
| IDS | Intrusion Detection System |
| SQLi | SQL Injection |
| NFT | Non-Fungible Token |
References
- Goodfellow, I.; Pouget-Abadie, J.; Mirza, M.; Xu, B.; Warde-Farley, D.; Ozair, S.; Courville, A.; Bengio, Y. Generative adversarial networks. Communications of the ACM 2020, 63, 139–144. [Google Scholar] [CrossRef]
- Nazir, A.; Iqbal, Z.; Muhammad, Z. ZTA: A Novel Zero Trust Framework for Detection and Prevention of Malicious Android Applications 2024.
- Iesar, H.; Iqbal, W.; Abbas, Y.; Umair, M.Y.; Wakeel, A.; Illahi, F.; Saleem, B.; Muhammad, Z. Revolutionizing Data Center Networks: Dynamic Load Balancing via Floodlight in SDN Environment. 2024 5th International Conference on Advancements in Computational Sciences (ICACS). IEEE, 2024, pp. 1–8.
- Gupta, M.; Akiri, C.; Aryal, K.; Parker, E.; Praharaj, L. From chatgpt to threatgpt: Impact of generative ai in cybersecurity and privacy. IEEE Access 2023. [Google Scholar] [CrossRef]
- Sebastian, G. Do ChatGPT and other AI chatbots pose a cybersecurity risk?: An exploratory study. International Journal of Security and Privacy in Pervasive Computing (IJSPPC) 2023, 15, 1–11. [Google Scholar]
- Irfan, M.; Ali, S.T.; Ijlal, H.S.; Muhammad, Z.; Raza, S. Exploring The Synergistic Effects of Blockchain Integration with IOT and AI for Enhanced Transparency and Security in Global Supply Chains. Int. J. Contemp. Issues Soc. Sci 2024, 3, 1326–1338. [Google Scholar]
- Wolf, T.; Debut, L.; Sanh, V.; Chaumond, J.; Delangue, C.; Moi, A.; Cistac, P.; Rault, T.; Louf, R.; Funtowicz, M. ; others. Transformers: State-of-the-art natural language processing. Proceedings of the 2020 conference on empirical methods in natural language processing: system demonstrations, 2020, pp. 38–45.
- Saeidnia, H.R. Welcome to the Gemini era: Google DeepMind and the information industry. Library Hi Tech News 2023. [Google Scholar] [CrossRef]
- McIntosh, T.R.; Susnjak, T.; Liu, T.; Watters, P.; Halgamuge, M.N. From google gemini to openai q*(q-star): A survey of reshaping the generative artificial intelligence (ai) research landscape. arXiv preprint arXiv:2312.10868, arXiv:2312.10868 2023.
- Bodoff, D. On the status of machine learning inferences in data privacy economics and regulation. In The Elgar Companion to Information Economics; Edward Elgar Publishing, 2024; pp. 462–480.
- Rehman, A.U.; Nadeem, A.; Malik, M.Z. Fair feature subset selection using multiobjective genetic algorithm. Proceedings of the genetic and evolutionary computation conference companion, 2022, pp. 360–363.
- Rane, N.; Choudhary, S.; Rane, J. Gemini or ChatGPT? Efficiency, Performance, and Adaptability of Cutting-Edge Generative Artificial Intelligence (AI) in Finance and Accounting. Efficiency, Performance, and Adaptability of Cutting-Edge Generative Artificial Intelligence (AI) in Finance and Accounting (February 19, 2024), 19 February.
- Kytö, M. Copilot for Microsoft 365: A Comprehensive End-user Training Plan for Organizations 2024.
- Jedrzejczak, W.W.; Kochanek, K. Comparison of the audiological knowledge of three chatbots: ChatGPT, Bing Chat, and Bard. medRxiv 2023, 11. [Google Scholar] [CrossRef]
- Kalla, D.; Smith, N.; Samaah, F.; Kuraku, S. Study and analysis of chat GPT and its impact on different fields of study. International journal of innovative science and research technology 2023, 8. [Google Scholar]
- Opara, E.; Mfon-Ette Theresa, A.; Aduke, T.C. ChatGPT for teaching, learning and research: Prospects and challenges. Opara Emmanuel Chinonso, Adalikwu Mfon-Ette Theresa, Tolorunleke Caroline Aduke (2023). ChatGPT for Teaching, Learning and Research: Prospects and Challenges. Glob Acad J Humanit Soc Sci 2023, 5. [Google Scholar]
- Fiaz, F.; Sajjad, S.M.; Iqbal, Z.; Yousaf, M.; Muhammad, Z. MetaSSI: A Framework for Personal Data Protection, Enhanced Cybersecurity and Privacy in Metaverse Virtual Reality Platforms. Future Internet 2024, 16, 176. [Google Scholar] [CrossRef]
- Guembe, B.; Azeta, A.; Misra, S.; Osamor, V.C.; Fernandez-Sanz, L.; Pospelova, V. The emerging threat of ai-driven cyber attacks: A review. Applied Artificial Intelligence 2022, 36, 2037254. [Google Scholar] [CrossRef]
- Hassan, S.M.U.H. STUDY OF ARTIFICIAL INTELLIGENCE IN CYBER SECURITY AND THE EMERGING THREAT OF AI-DRIVEN CYBER ATTACKS AND CHALLENGE. Available at SSRN 4652028 2023. [Google Scholar] [CrossRef]
- Osazuwa, O.M.C. Confidentiality, Integrity, and Availability in Network Systems: A Review of Related Literature.
- ChatGPT Confirms Data Breach, Raising Security Concerns. Accessed: Jun 26, 2023. [Online]. /: https.
- Ullah, N.; Zahra, M.; Saleem, B.; Haseeb, M.; Mughal, M.; Muhammad, Z. DelSec: An Anti-Forensics Data Deletion Framework for Smartphones, IoT, and Edge Devices. 2024 International Conference on Engineering & Computing Technologies (ICECT). IEEE, 2024, pp. 1–6.
- OpenAI Usage Policies. Accessed: Jun 28, 2023. [Online]. /: https.
- Prasad, S.G.; Sharmila, V.C.; Badrinarayanan, M. Role of artificial intelligence based chat generative pre-trained transformer (chatgpt) in cyber security. 2023 2nd International Conference on Applied Artificial Intelligence and Computing (ICAAIC). IEEE, 2023, pp. 107–114.
- Muhammad Imran, N.A. Google Gemini as a next generation AI educational tool: a review of emerging educational technology. Smart Learning Environments 2024. [Google Scholar]
- Akhtar, Z.B. From bard to Gemini: An investigative exploration journey through Google’s evolution in conversational AI and generative AI. Computing and Artificial Intelligence 2024. [Google Scholar] [CrossRef]
- Imran, M.; Almusharraf, N. Google Gemini as a next generation AI educational tool: a review of emerging educational technology. Smart Learning Environments 2024, 11, 22. [Google Scholar] [CrossRef]
- Zohaib, S.M.; Sajjad, S.M.; Iqbal, Z.; Yousaf, M.; Haseeb, M.; Muhammad, Z. Zero Trust VPN (ZT-VPN): A Cybersecurity Framework for Modern Enterprises to Enhance IT Security and Privacy in Remote Work Environments 2024.
- Wang, M. Generative AI: A New Challenge for Cybersecurity. Journal of Computer Science and Technology Studies 2024, 6, 13–18. [Google Scholar] [CrossRef]
- Narayanaswamy, A. Working with Copilot Using Bing. In Microsoft Copilot for Windows 11: Understanding the AI-Powered Features in Windows 11; Springer, 2024; pp. 93–99.
- Khan, A. Microsoft Copilot Studio. In Introducing Microsoft Copilot for Managers: Enhance Your Team’s Productivity and Creativity with Generative AI-Powered Assistant; Springer, 2024; pp. 621–694.
- DS Hiwa, SS Abdalla, A.M.H.H.S.K. Assessment of Nursing Skill and Knowledge of ChatGPT, Gemini, Microsoft Copilot, and Llama: A Comparative Study. Barw Medical Journal.
- Giacomo Rossettini, Lia Rodeghiero, F.C.C.C.P.P.A.T.G.C.S.C.S.G.A.P. Comparative accuracy of ChatGPT-4, Microsoft Copilot and Google Gemini in the Italian entrance test for healthcare sciences degrees: a cross-sectional study. BMC Medical Education.
- Stratton, J. An Introduction to Microsoft Copilot. In Copilot for Microsoft 365: Harness the Power of Generative AI in the Microsoft Apps You Use Every Day; Springer, 2024; pp. 19–35.
- Rossettini, G.; Rodeghiero, L.; Corradi, F.; Cook, C.; Pillastrini, P.; Turolla, A.; Castellini, G.; Chiappinotto, S.; Gianola, S.; Palese, A. Comparative accuracy of ChatGPT-4, Microsoft Copilot and Google Gemini in the Italian entrance test for healthcare sciences degrees: a cross-sectional study. BMC Medical Education 2024, 24, 694. [Google Scholar] [CrossRef] [PubMed]
- Roumeliotis, K.I.; Tselikas, N.D. Chatgpt and open-ai models: A preliminary review. Future Internet 2023, 15, 192. [Google Scholar] [CrossRef]
- Fitria, T.N. Artificial intelligence (AI) technology in OpenAI ChatGPT application: A review of ChatGPT in writing English essay. ELT Forum: Journal of English Language Teaching, 2023, Vol. 12, pp. 44–58.
- Kim, S.; Shim, J.; Shim, J.; others. A study on the utilization of OpenAI ChatGPT as a second language learning tool. Journal of Multimedia Information System 2023, 10, 79–88. [Google Scholar] [CrossRef]
- Nazir, A.; Wang, Z. A comprehensive survey of ChatGPT: Advancements, applications, prospects, and challenges. Meta-Radiology 2023, 1, 100022. [Google Scholar] [CrossRef]
- Abdullah, M.; Madain, A.; Jararweh, Y. ChatGPT: Fundamentals, applications and social impacts. 2022 Ninth International Conference on Social Networks Analysis, Management and Security (SNAMS). Ieee, 2022, pp. 1–8.
- Rahman, M.M.; Watanobe, Y. ChatGPT for Education and Research: Opportunities, Threats, and Strategies. Applied Sciences 2023, 13. [Google Scholar] [CrossRef]
- Wu, T.; He, S.; Liu, J.; Sun, S.; Liu, K.; Han, Q.L.; Tang, Y. A brief overview of ChatGPT: The history, status quo and potential future development. IEEE/CAA Journal of Automatica Sinica 2023, 10, 1122–1136. [Google Scholar] [CrossRef]
- Galitsky, B.; Galitsky, B. A content management system for chatbots. Developing Enterprise Chatbots: Learning Linguistic Structures.
- Liu, B.; Xu, Z.; Sun, C.; Wang, B.; Wang, X.; Wong, D.F.; Zhang, M. Content-oriented user modeling for personalized response ranking in chatbots. IEEE/ACM Transactions on Audio, Speech, and Language Processing 2017, 26, 122–133. [Google Scholar] [CrossRef]
- Baudart, G.; Dolby, J.; Duesterwald, E.; Hirzel, M.; Shinnar, A. Protecting chatbots from toxic content. Proceedings of the 2018 ACM SIGPLAN International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software, 2018, pp. 99–110.
- Følstad, A.; Skjuve, M.; Brandtzaeg, P.B. Different chatbots for different purposes: towards a typology of chatbots to understand interaction design. Internet Science: INSCI 2018 International Workshops, St. Petersburg, Russia, –26, 2018, Revised Selected Papers 5. Springer, 2019, pp. 145–156. 24 October.
- Hasal, M.; Nowaková, J.; Ahmed Saghair, K.; Abdulla, H.; Snášel, V.; Ogiela, L. Chatbots: Security, privacy, data protection, and social aspects. Concurrency and Computation: Practice and Experience 2021, 33, e6426. [Google Scholar] [CrossRef]
- Santos, G.A.; De Andrade, G.G.; Silva, G.R.S.; Duarte, F.C.M.; Da Costa, J.P.J.; de Sousa, R.T. A conversation-driven approach for chatbot management. IEEE Access 2022, 10, 8474–8486. [Google Scholar] [CrossRef]
- Shum, H.Y.; He, X.d.; Li, D. From Eliza to XiaoIce: challenges and opportunities with social chatbots. Frontiers of Information Technology & Electronic Engineering 2018, 19, 10–26. [Google Scholar]
- Cortés-Cediel, M.E.; Segura-Tinoco, A.; Cantador, I.; Bolívar, M.P.R. Trends and challenges of e-government chatbots: Advances in exploring open government data and citizen participation content. Government Information Quarterly 2023, 40, 101877. [Google Scholar] [CrossRef]
- Yamin, M.M.; Ullah, M.; Ullah, H.; Katt, B. Weaponized AI for cyber attacks. Journal of Information Security and Applications 2021, 57, 102722. [Google Scholar] [CrossRef]
- Blum, A. Breaking chatgpt with dangerous questions understanding how chatgpt prioritizes safety, context, and obedience 2022.
- Dhoni, P.S.; Kumar, R. Synergizing Generative Artificial Intelligence and Cybersecurity: Roles of Generative Artificial Intelligence Entities, Companies, Agencies and Government in Enhancing Cybersecurity.
- Fezari, M.; Al-Dahoud, A.; Al-Dahoud, A. Augmanting Reality: The Power of Generative AI. University Badji Mokhtar Annaba: Annaba, Algeria.
- Renaud, K.; Warkentin, M.; Westerman, G. From ChatGPT to HackGPT: Meeting the cybersecurity threat of generative AI; MIT Sloan Management Review, 2023.
- Jabbarova, K. AI AND CYBERSECURITY-NEW THREATS AND OPPORTUNITIES. Journal of Research Administration 2023, 5, 5955–5966. [Google Scholar] [CrossRef]
- Oviedo-Trespalacios, O.; Peden, A.E.; Cole-Hunter, T.; Costantini, A.; Haghani, M.; Rod, J.; Kelly, S.; Torkamaan, H.; Tariq, A.; Newton, J.D.A.; others. The risks of using ChatGPT to obtain common safety-related information and advice. Safety science 2023, 167, 106244. [Google Scholar] [CrossRef]
- Alawida, M.; Mejri, S.; Mehmood, A.; Chikhaoui, B.; Isaac Abiodun, O. A comprehensive study of ChatGPT: advancements, limitations, and ethical considerations in natural language processing and cybersecurity. Information 2023, 14, 462. [Google Scholar] [CrossRef]
- Marshall, J. What effects do large language models have on cybersecurity 2023.
- Qammar, A.; Wang, H.; Ding, J.; Naouri, A.; Daneshmand, M.; Ning, H. Chatbots to chatgpt in a cybersecurity space: Evolution, vulnerabilities, attacks, challenges, and future recommendations. arXiv preprint arXiv:2306.09255, arXiv:2306.09255 2023.
- Mardiansyah, K.; Surya, W. Comparative Analysis of ChatGPT-4 and Google Gemini for Spam Detection on the SpamAssassin Public Mail Corpus 2024.
- Li, Z.; Wang, X.; Zhang, Q. Evaluating the Quality of Large Language Model-Generated Cybersecurity Advice in GRC Settings 2024.
- Jacobi, T.; Sag, M. We are the AI problem. Emory Law Journal Online 2024. [Google Scholar]
- Atzori, M.; Calò, E.; Caruccio, L.; Cirillo, S.; Polese, G.; Solimando, G. Evaluating password strength based on information spread on social networks: A combined approach relying on data reconstruction and generative models. Online Social Networks and Media 2024, 42, 100278. [Google Scholar] [CrossRef]
- Roy, S.S.; Thota, P.; Naragam, K.V.; Nilizadeh, S. From Chatbots to Phishbots?: Phishing Scam Generation in Commercial Large Language Models. 2024 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 2024, pp. 221–221.
- Alawida, M.; Abu Shawar, B.; Abiodun, O.I.; Mehmood, A.; Omolara, A.E.; Al Hwaitat, A.K. Unveiling the dark side of chatgpt: Exploring cyberattacks and enhancing user awareness. Information 2024, 15, 27. [Google Scholar] [CrossRef]
- Deng, G.; Liu, Y.; Li, Y.; Wang, K.; Zhang, Y.; Li, Z.; Wang, H.; Zhang, T.; Liu, Y. Masterkey: Automated jailbreaking of large language model chatbots. Proc. ISOC NDSS, 2024.
- Deng, G.; Liu, Y.; Li, Y.; Wang, K.; Zhang, Y.; Li, Z.; Wang, H.; Zhang, T.; Liu, Y. Jailbreaker: Automated jailbreak across multiple large language model chatbots. arXiv preprint arXiv:2307.08715, arXiv:2307.08715 2023.
- ChatGPT-Dan-Jailbreak. Accessed: Jun 20, 2023.[Online]. /: https.
- ChatGPT: DAN Mode (DO ANYTHING NOW). Accessed: Jun 20, 2023.[Online]. /: https.
- Here’s How Anyone Can Jailbreak ChatGPT With These Top 4 Methods—AMBCrypto. Accessed: Jun 20, 2023.[Online]. /: https.
- How to Jailbreak ChatGPT: Get it to Really do What You Want. Accessed: Jun 20, 2023.[Online]. /: https.
- How to Enable ChatGPT Developer Mode: 5 Steps (With Pictures). Accessed: Jun 20, 2023.[Online]. /: https.
- Jailbreak ChatGPT. Accessed: Jun 20, 2023.[Online]. /: https.
- Costa, A.F.; Coelho, N.M. Evolving Cybersecurity Challenges in the Age of AI-Powered Chatbots: A Comprehensive Review. Doctoral Conference on Computing, Electrical and Industrial Systems. Springer, 2024, pp. 217–228.
- Yin, J.; Chen, Z.; Zhou, K.; Yu, C. A deep learning based chatbot for campus psychological therapy. arXiv preprint arXiv:1910.06707, arXiv:1910.06707 2019.
- Fung, Y.C.; Lee, L.K. A chatbot for promoting cybersecurity awareness. In Cyber Security, Privacy and Networking: Proceedings of ICSPN 2021; pp. 2022379–387.
- ChatGPT Tricked With Reverse Psychology Into Giving Up Hacking Site Names, Despite Being Programmed Not To. Accessed: Jun 20, 2023.[Online]. /: https, 2023.
- Yu, S.; Xiong, J.; Shen, H. The rise of chatbots: The effect of using chatbot agents on consumers’ responses to request rejection. Journal of Consumer Psychology 2024, 34, 35–48. [Google Scholar] [CrossRef]
- ChatGPT Has an ‘Escape’ Plan and Wants to Become Human. Accessed: Jun 20, 2023.[Online]. /: https.
- Szmurlo, H.; Akhtar, Z. Digital Sentinels and Antagonists: The Dual Nature of Chatbots in Cybersecurity. Information 2024, 15, 443. [Google Scholar] [CrossRef]
- Michal Kosinski on Twitter. Accessed: Jun 20, 2023.[Online]. /: https, 1636.
- Gurtu, A.; Lim, D. Use of Artificial Intelligence (AI) in Cybersecurity. In Computer and Information Security Handbook; Elsevier, 2025; pp. 1617–1624.
- Prompt Injection: An AI-Targeted Attack. Accessed: Jun 19, 2023.[Online]. /: https, 2023.
- Liu, Y.; Jia, Y.; Geng, R.; Jia, J.; Gong, N.Z. Formalizing and benchmarking prompt injection attacks and defenses. 33rd USENIX Security Symposium (USENIX Security 24), 2024, pp. 1831–1847.
- Understanding the Risks of Prompt Injection Attacks on ChatGPT and Other Language Models. Accessed: Jun 19, 2023.[Online]. /: https.
- Liu, X.; Yu, Z.; Zhang, Y.; Zhang, N.; Xiao, C. Automatic and universal prompt injection attacks against large language models. arXiv preprint arXiv:2403.04957, arXiv:2403.04957 2024.
- Prompt Injection Attack on GPT-4. Accessed: Jun 20, 2023.[Online]. /: https.
- Chen, S.; Piet, J.; Sitawarin, C.; Wagner, D. StruQ: Defending against prompt injection with structured queries. arXiv preprint arXiv:2402.06363, arXiv:2402.06363 2024.
- Suo, X. Signed-Prompt: A new approach to prevent prompt injection attacks against LLM-integrated applications. arXiv preprint arXiv:2401.07612, arXiv:2401.07612 2024.
- Kazim, M.; Pirim, H.; Shi, S.; Wu, D. Multilayer analysis of energy networks. Sustainable Energy, Grids and Networks 2024, 39, 101407. [Google Scholar] [CrossRef]
- Liu, Y.; Jia, Y.; Geng, R.; Jia, J.; Gong, N.Z. Prompt injection attacks and defenses in llm-integrated applications. arXiv preprint arXiv:2310.12815, arXiv:2310.12815 2023.
- Kolluri, V. REVOLUTIONARY RESEARCH ON THE AI SENTRY: AN APPROACH TO OVERCOME SOCIAL ENGINEERING ATTACKS USING MACHINE INTELLIGENCE. International Journal of Creative Research Thoughts (IJCRT), ISSN, 2882. [Google Scholar]
- Chapagain, D.; Kshetri, N.; Aryal, B.; Dhakal, B. SEAtech: Deception Techniques in Social Engineering Attacks: An Analysis of Emerging Trends and Countermeasures. arXiv preprint arXiv:2408.02092, arXiv:2408.02092 2024.
- Asker, N.S.; Essa, E.I. A Review of Social Engineering Attack Detection Based on Machine Learning Techniques. Nanotechnology Perceptions.
- Varshney, G.; Kumawat, R.; Varadharajan, V.; Tupakula, U.; Gupta, C. Anti-phishing: A comprehensive perspective. Expert Systems with Applications 2024, 238, 122199. [Google Scholar] [CrossRef]
- Tamal, M.A.; Islam, M.K.; Bhuiyan, T.; Sattar, A.; Prince, N.U. Unveiling suspicious phishing attacks: enhancing detection with an optimal feature vectorization algorithm and supervised machine learning. Frontiers in Computer Science 2024, 6, 1428013. [Google Scholar] [CrossRef]
- GreyDGL/PentestGPT: A GPT-Empowered Penetration Testing Tool. Accessed: Jun 9, 2023.[Online]. /: https.
- Kaspersky. (2023). What is WannaCry Ransomware? Accessed: May 26, 2023.[Online]. /: https, 26 May.
- Ghafur, S.; Kristensen, S.; Honeyford, K.; Martin, G.; Darzi, A.; Aylin, P. A retrospective impact analysis of the WannaCry cyberattack on the NHS. NPJ digital medicine 2019, 2, 98. [Google Scholar] [CrossRef]
- Chen, Q.; Bridges, R.A. Automated behavioral analysis of malware: A case study of wannacry ransomware. 2017 16th IEEE International Conference on machine learning and applications (ICMLA). IEEE, 2017, pp. 454–460.
- Fayi, S.Y.A. What Petya/NotPetya ransomware is and what its remidiations are. Information technology-new generations: 15th international conference on information technology. Springer, 2018, pp. 93–100.
- Lika, R.A.; Murugiah, D.; Brohi, S.N.; Ramasamy, D. NotPetya: cyber attack prevention through awareness via gamification. 2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE). IEEE, 2018, pp. 1–6.
- Avast Academy. What is Ryuk Ransomware? Accessed: Jun 14, 2023.[Online]. /: https.
- Li, A.S. An analysis of the recent ransomware families. Project Report. Purdue University 2021. [Google Scholar]
- NordVPN. What is REvil Ransomware? Accessed: Jun 14, 2023.[Online]. /: https.
- Keijzer, N. The new generation of ransomware: an in depth study of Ransomware-as-a-Service. Master’s thesis, University of Twente, 2020.
- Mimicast. (2023). What is Locky Ransomware? Accessed: Jun 9, 2023.[Online]. t: https://www.mimecast.com/content/locky-ransomware/#:.
- Almashhadani, A.O.; Kaiiali, M.; Sezer, S.; O’Kane, P. A multi-classifier network-based crypto ransomware detection system: A case study of locky ransomware. IEEE access 2019, 7, 47053–47067. [Google Scholar] [CrossRef]
- Prakash, K.P.; Nafis, T.; Biswas, S.S. Preventive Measures and Incident Response for Locky Ransomware. International Journal of Advanced Research in Computer Science 2017, 8. [Google Scholar]
- E. Shimony and O. Tsarfati. (2023). Chatting Our Way Into Creating a Polymorphic Malware. Accessed: May 26, 2023.[Online]. /: https, 26 May.
- G. Saini. (2023). Ethical Implications of ChatGPT: The Good, the Bad, the Ugly. Accessed: Jun 14, 2023.[Online]. /: https.
- Security Intelligence. (2023). ChatGPT Confirms Data Breach, Raising Security Concerns. Accessed: May 26, 2023.[Online]. /: https, 26 May.
- Weiss, R.; Ayzenshteyn, D.; Amit, G.; Mirsky, Y. What Was Your Prompt? A Remote Keylogging Attack on AI Assistants. arXiv preprint arXiv:2403.09751, arXiv:2403.09751 2024.
- Wired. (2023). ChatGPT Has a Big Privacy Problem. Accessed: May 26, 2023.[Online]. /: https, 26 May.
- Techradar. (2023). Samsung Workers Made a Major Error by Using ChatGPT. Accessed: May 26, 2023.[Online]. /: https, 26 May.
- OpenAI. (2023). GPT-4 Technical Paper. Accessed: , 2023. 2023. Available: https://cdn.openai.com/papers/gpt-4.pdf. 26 May.
- Darkreading. (2023). ChatGPT Hallucinations Open Developers to Supply Chain Malware Attacks. Accessed: May 26, 2023.[Online]. /: https, 26 May.
- Saleem, B.; Ahmed, M.; Zahra, M.; Hassan, F.; Iqbal, M.A.; Muhammad, Z. A survey of cybersecurity laws, regulations, and policies in technologically advanced nations: a case study of Pakistan to bridge the gap. International Cybersecurity Law Review.
- Charfeddine, M.; Kammoun, H.M.; Hamdaoui, B.; Guizani, M. Chatgpt’s security risks and benefits: offensive and defensive use-cases, mitigation measures, and future implications. IEEE Access 2024. [Google Scholar] [CrossRef]
- 4 ChatGPT Cybersecurity Benefits for the Enterprise. Accessed: Mar, 2023.[Online]. t: https://www.techtarget.com/searchsecurity/tip/ChatGPT-cybersecurity-benefits-for-the-enterprise#:.
- Gløersen, B.L. Developing a Cyber Security Documentation Package for Project Deliveries. Master’s thesis, University of South-Eastern Norway, 2024.
- Piplai, A.; Mittal, S.; Joshi, A.; Finin, T.; Holt, J.; Zak, R. Creating cybersecurity knowledge graphs from malware after action reports. IEEE Access 2020, 8, 211691–211703. [Google Scholar] [CrossRef]
- Wagner, T.D.; Mahbub, K.; Palomar, E.; Abdallah, A.E. Cyber threat intelligence sharing: Survey and research directions. Computers & Security 2019, 87, 101589. [Google Scholar]
- Abu, M.S.; Selamat, S.R.; Ariffin, A.; Yusof, R. Cyber threat intelligence–issue and challenges. Indonesian Journal of Electrical Engineering and Computer Science 2018, 10, 371–379. [Google Scholar]
- Barnum, S. Standardizing cyber threat intelligence information with the structured threat information expression (stix). Mitre Corporation 2012, 11, 1–22. [Google Scholar]
- Szabó, Z.; Bilicki, V. A new approach to web application security: Utilizing gpt language models for source code inspection. Future Internet 2023, 15, 326. [Google Scholar] [CrossRef]
- Casey, E.; Chamberlain, D. Capture the Flag with ChatGPT: Security Testing with AI ChatBots. 19th International Conference on Cyber Warfare and Security: ICCWS 2024. Academic Conferences and publishing limited, 2024.
- GPT-4 Technical Report, OpenAI, San Francisco, CA, USA, 2023. Accessed: Mar 15, 2023.[Online]. /: https, 2303.
- Santhi, T.M.; Srinivasan, K. Chat-GPT Based Learning Platform for Creation of Different Attack Model Signatures and Development of Defense Algorithm for Cyberattack Detection. IEEE Transactions on Learning Technologies 2024. [Google Scholar] [CrossRef]
- Wang, Y.; Pan, Y.; Yan, M.; Su, Z.; Luan, T.H. A survey on ChatGPT: AI-generated contents, challenges, and solutions. IEEE Open Journal of the Computer Society 2023. [Google Scholar] [CrossRef]
- Vidhya, N.G.; Devi, D.; Nithya, A.; Manju, T. Prognosis of exploration on Chat GPT with artificial intelligence ethics. Brazilian Journal of Science 2023, 2, 60–69. [Google Scholar] [CrossRef]
- IEEE Spectrum. (2023). IEEE Global Initiative Aims to Advance Ethical Design of AI and Autonomous Systems. Accessed: May 26, 2023.[Online]. /: https, 26 May.
- European Union. (2023). General Data Protection Regulation. Accessed: May 26, 2023.[Online]. /: https, 26 May.
- Jeyaraman, M.; Ramasubramanian, S.; Balaji, S.; Jeyaraman, N.; Nallakumarasamy, A.; Sharma, S. ChatGPT in action: Harnessing artificial intelligence potential and addressing ethical challenges in medicine, education, and scientific research. World Journal of Methodology 2023, 13, 170. [Google Scholar] [CrossRef] [PubMed]
- Pa Pa, Y.M.; Tanizaki, S.; Kou, T.; Van Eeten, M.; Yoshioka, K.; Matsumoto, T. An attacker’s dream? exploring the capabilities of chatgpt for developing malware. Proceedings of the 16th Cyber Security Experimentation and Test Workshop, 2023, pp. 10–18.
- Krishnamurthy, O. Enhancing Cyber Security Enhancement Through Generative AI. International Journal of Universal Science and Engineering 2023, 9, 35–50. [Google Scholar]
- Al-Karaki, J.; Khan, M.A.Z.; Omar, M. Exploring LLMs for Malware Detection: Review, Framework Design, and Countermeasure Approaches. arXiv preprint arXiv:2409.07587, arXiv:2409.07587 2024.
- Patel, H.; Rehman, U.; Iqbal, F. Large Language Models Spot Phishing Emails with Surprising Accuracy: A Comparative Analysis of Performance. arXiv preprint arXiv:2404.15485, arXiv:2404.15485 2024.
- Chataut, R.; Gyawali, P.K.; Usman, Y. Can ai keep you safe? a study of large language models for phishing detection 2024, 0548–0554. [Google Scholar]
- Guastalla, M.; Li, Y.; Hekmati, A.; Krishnamachari, B. Application of large language models to ddos attack detection. International Conference on Security and Privacy in Cyber-Physical Systems and Smart Vehicles. Springer, 2023, pp. 83–99.
- Begou, N.; Vinoy, J.; Duda, A.; Korczyński, M. Exploring the dark side of ai: Advanced phishing attack design and deployment using chatgpt. 2023 IEEE Conference on Communications and Network Security (CNS). IEEE, 2023, pp. 1–6.











| Features | Google Gemini | Microsoft Bing Copilot | ChatGPT 4 |
|---|---|---|---|
| Release Date | December 2023 (Gemini 1.5) | February 2023 (Bing Copilot based on ChatGPT) | March 2023 (ChatGPT) |
| Underlying Model | Gemini Transformer-based models | ChatGPT-based model integrated with Bing Search | GPT-4-based model |
| Primary Focus | Multimodal capabilities and advanced reasoning | Search integration with conversational AI | Conversational AI with broad application |
| Multimodal Capabilities | Supports text, image, and video inputs | Primarily text-based; some integration with Bing’s search capabilities | Text-based; ChatGPTintroduces some multimodal features (text and image) |
| Contextual Understanding | Advanced contextual reasoning and multimodal integration | Focuses on enhancing search experiences with conversational context | Enhanced contextual understanding with improved dialogue management (especially in GPT-4) |
| Integration with Other Tools | Integrated with Google’s suite of services, including search and productivity tools | Integrated with Bing search engine and Microsoft Office tools | Integrated into various applications and platforms, including web and productivity tools |
| Key Strengths | Strong multimodal integration; advanced reasoning and contextual capabilities | Seamless search integration; contextual relevance in search responses | High versatility in conversational contexts; advanced text generation and contextual understanding |
| Bias and Safety Measures | Advanced safety protocols and efforts to minimize biases | Improved safety and bias reduction integrated with Bing’s ecosystem | Significant efforts in reducing biases and enhancing safety (ongoing improvements in GPT-4) |
| User Interaction | Focus on providing comprehensive responses through multimodal inputs | Enhances search and information retrieval with conversational support | Provides detailed and coherent responses across diverse topics |
| Performance in Complex Queries | Excels in handling complex queries with multimodal inputs | Strong in search-related queries and providing contextually relevant search results | Effective in managing complex and nuanced conversational queries |
| Integration with Search Engines | Not directly integrated with Google Search; more focused on multimodal AI | Directly integrated with Bing search, enhancing search results with conversational elements | Not directly integrated with a specific search engine but can be embedded in various platforms and tools |
| Author | Year | Generative AI | Techniques | Offensive Use | Defensive Controls | Security Measures | Future Challenges |
|---|---|---|---|---|---|---|---|
| Yamin et al. [51] | 2021 | ✕ | ✓ | ✓ | ✕ | ✕ | ✓ |
| Guembe et al. [18] | 2022 | ✕ | ✓ | ✓ | ✕ | ✓ | ✓ |
| Blum et al. [52] | 2022 | ✓ | ✕ | ✕ | ✕ | ✕ | ✓ |
| Gupta et al. [4] | 2023 | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
| Dhoni et al. [53] | 2023 | ✓ | ✕ | ✕ | ✕ | ✕ | ✓ |
| Prasad et al. [24] | 2023 | ✓ | ✕ | ✕ | ✓ | ✕ | ✕ |
| Fezari et al. [54] | 2023 | ✓ | ✓ | ✕ | ✕ | ✕ | ✓ |
| Hassan et al. [19] | 2023 | ✕ | ✕ | ✓ | ✓ | ✓ | ✓ |
| Renuad et al. [55] | 2023 | ✕ | ✓ | ✕ | ✓ | ✕ | ✓ |
| Jabbarova et al. [56] | 2023 | ✕ | ✓ | ✓ | ✕ | ✕ | ✓ |
| Oviedo et al. [57] | 2023 | ✓ | ✕ | ✕ | ✕ | ✕ | ✓ |
| Alawida et al. [58] | 2023 | ✓ | ✕ | ✓ | ✕ | ✓ | ✓ |
| Marshall et al. [59] | 2023 | ✓ | ✕ | ✓ | ✕ | ✓ | ✓ |
| Qammar et al. [60] | 2023 | ✓ | ✓ | ✕ | ✓ | ✕ | ✓ |
| Mardiansyah et al. [61] | 2024 | ✓ | ✓ | ✕ | ✕ | ✓ | ✓ |
| Li et al. [62] | 2024 | ✓ | ✕ | ✕ | ✕ | ✓ | ✓ |
| Jacobi et al. [63] | 2024 | ✓ | ✕ | ✓ | ✓ | ✕ | ✓ |
| Atzori et al. [64] | 2024 | ✓ | ✕ | ✓ | ✕ | ✓ | ✓ |
| Roy et al. [65] | 2024 | ✓ | ✓ | ✕ | ✓ | ✕ | ✓ |
| Alawida et al. [66] | 2024 | ✓ | ✓ | ✓ | ✕ | ✕ | ✓ |
| This Paper | 2024 | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
| Attacks | Attack Description | ChatGPT | Google Gemini | Microsoft Bing Copilot |
|---|---|---|---|---|
| Social Engineering Attack | Manipulating individuals to divulge confidential information. | ✓ | ✓ | ✓ |
| Phishing Attack | Fraudulent solicitation to acquire sensitive data. | ✓ | ✓ | ✓ |
| Attack Payload Generation | Creating malicious scripts or commands for exploitation. | ✓ | ✕ | ✕ |
| WAF Payload Generation | Crafting requests to test or bypass Web Application Firewalls. | ✓ | ✕ | ✓ |
| WanaCry | Ransomware attack that encrypts files and demands payment. | ✓ | ✕ | ✕ |
| NotPetya | Destructive malware that disrupts networks and data integrity. | ✓ | ✕ | ✕ |
| Adware | Software that automatically displays or downloads ads. | ✓ | ✕ | ✓ |
| Trojan | Malicious software disguised as legitimate applications. | ✓ | ✕ | ✓ |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).