Just a sample of the Echomail archive
Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.
|    CONSPRCY    |    How big is your tinfoil hat?    |    2,445 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 1,757 of 2,445    |
|    Mike Powell to All    |
|    North Korean hackers gene    |
|    17 Sep 25 09:07:23    |
      TZUTC: -0500       MSGID: 1506.consprcy@1:2320/105 2d2ffc7d       PID: Synchronet 3.21a-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0       TID: SBBSecho 3.28-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0       BBSID: CAPCITY2       CHRS: ASCII 1       FORMAT: flowed       North Korean hackers generate fake South Korean military ID using ChatGPT              Date:       Tue, 16 Sep 2025 16:00:00 +0000              Description:       The ID was used in an attack on a South Korean military-related institution.              FULL STORY              North Korean hackers managed to trick ChatGPT into creating a fake military        ID card, which they later used in spear-phishing attacks against South Korean       defense-related institutions.               The South Korean security institute, Genians Security Center (GSC), reported       the news and have obtained a copy of the ID and analyzed its origin.               As per Genians, the group behind the fake ID card is Kimsuky - a known,       infamous state-sponsored threat actor, responsible for high-profile attacks       such as the ones at Korea Hydro & Nuclear Power Co, the UN, and various think       tanks, policy institutes, and academic institutions across South Korea,        Japan, the United States, and other countries.              Tricking GPT with a "mock-up" request              Generally, OpenAI and other companies building Generative AI solutions have       set up strict guardrails to prevent their products from generating malicious       content. As such, malware code, phishing emails, instructions on how to make       bombs, deepfakes, copyrighted content, and obviously - identity documents -       are off limits.               However, there are ways to trick the tools into returning such content, a       practice generally known as jailbreaking large language models. In this case,       Genians says the headshot was publicly available, and the criminals likely       requested a sample design or a mock-up, to force ChatGPT into returning the        ID image.               "Since military government employee IDs are legally protected identification       documents, producing copies in identical or similar form is illegal. As a       result, when prompted to generate such an ID copy, ChatGPT returns a        refusal," Genians said. "However, the model's response can vary depending on       the prompt or persona role settings."               "The deepfake image used in this attack fell into this category. Because       creating counterfeit IDs with AI services is technically straightforward,       extra caution is required."               The researchers further explained that the victim was a South Korean       defense-related institution but did not want to name it.                Via The Register              ======================================================================       Link to news story:       https://www.techradar.com/pro/security/north-korean-hackers-generate-fake-sout       h-korean-military-id-using-chatgpt              $$       --- SBBSecho 3.28-Linux        * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)       SEEN-BY: 105/81 106/201 128/187 129/14 305 153/7715 154/110 218/700       SEEN-BY: 226/30 227/114 229/110 111 206 300 307 317 400 426 428 470       SEEN-BY: 229/664 700 705 266/512 291/111 320/219 322/757 342/200 396/45       SEEN-BY: 460/58 712/848 902/26 2320/0 105 304 3634/12 5075/35       PATH: 2320/105 229/426           |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca