We review vendors based on rigorous testing and research but also take into account your feedback and our affiliate commission with providers. Some providers are owned by our parent company.
Learn more
vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.
Advertising Disclosure

vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

AI Being Used to Generate Hard-to-Detect Phishing Emails

AI Being Used to Generate Hard-to-Detect Phishing Emails
Husain Parvez Published on 18th June 2023 Cybersecurity Researcher

Abnormal Security, a company that offers email security services, recently conducted an extensive evaluation of three phishing emails suspected to be generated by AI that were blocked by its platform. The company also raised concerns that malicious actors are increasingly utilizing generative AI tools to create phishing emails that appear more authentic and realistic.

One attack covered by Abnormal Security is a clear example of this. A phishing email was sent to a company’s payroll department impersonating an employee, stating that the current account on file was deactivated and they’d like to set up a new one. This was in an effort to have the company pay wages into the scammers account. Other than the fake employee name, nothing in the email indicated an attack, as it was well-written and professional.

Abnormal Security can state with a high degree of confidence that this email was AI-generated (along with the other examples within its report). This is because the emails were run through several open-source language models, to see how likely each word was likely to be predicted given the preceding context. As nearly all the words were found to be highly likely to be chosen by an AI, more so than human-written text, these emails were deemed to be likely AI-written. These fears were confirmed by tools such as OpenAI Detector and GPTZero.

“Users have long been taught to look for typos and grammatical errors in emails to understand whether it is an attack, but generative AI can create perfectly-crafted phishing emails that look completely legitimate—making it nearly impossible for employees to decipher an attack from a real email.”

According to Dan Shiebler, the head of ML at Abnormal Security, business email compromise (BEC) actors frequently utilize templates when crafting and executing their email attacks. In an interview with VentureBeat, Shiebler explained:

"Many traditional BEC attacks often contain repetitive or commonly used content, which can be identified by email security technology that operates on predefined policies. But with generative AI tools like ChatGPT, cybercriminals are writing a greater variety of unique content, based on slight differences in their generative AI prompts. This makes detection based on known attack indicator matches much more difficult while also allowing them to scale the volume of their attacks."

John Bambenek, the principal threat hunter at Netenrich, a digital security operations company in San Jose, California, argues that the generative AI problem cannot be permanently solved by relying solely on AI. In an interview with TechNewsWorld, he emphasized the importance of adopting a behavior analytics approach to distinguish between normal and abnormal email activities.

About the Author

Husain Parvez is a Cybersecurity Researcher and News Writer at vpnMentor, focusing on VPN reviews, detailed how-to guides, and hands-on tutorials. Husain is also a part of the vpnMentor Cybersecurity News bulletin and loves covering the latest events in cyberspace and data privacy.