home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 1,757 of 2,445   
   Mike Powell to All   
   North Korean hackers gene   
   17 Sep 25 09:07:23   
   
   TZUTC: -0500   
   MSGID: 1506.consprcy@1:2320/105 2d2ffc7d   
   PID: Synchronet 3.21a-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0   
   TID: SBBSecho 3.28-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   FORMAT: flowed   
   North Korean hackers generate fake South Korean military ID using ChatGPT   
      
   Date:   
   Tue, 16 Sep 2025 16:00:00 +0000   
      
   Description:   
   The ID was used in an attack on a South Korean military-related institution.   
      
   FULL STORY   
      
   North Korean hackers managed to trick ChatGPT into creating a fake military    
   ID card, which they later used in spear-phishing attacks against South Korean   
   defense-related institutions.    
      
   The South Korean security institute, Genians Security Center (GSC), reported   
   the news and have obtained a copy of the ID and analyzed its origin.    
      
   As per Genians, the group behind the fake ID card is Kimsuky - a known,   
   infamous state-sponsored threat actor, responsible for high-profile attacks   
   such as the ones at Korea Hydro & Nuclear Power Co, the UN, and various think   
   tanks, policy institutes, and academic institutions across South Korea,    
   Japan, the United States, and other countries.   
      
   Tricking GPT with a "mock-up" request   
      
   Generally, OpenAI and other companies building Generative AI solutions have   
   set up strict guardrails to prevent their products from generating malicious   
   content. As such, malware code, phishing emails, instructions on how to make   
   bombs, deepfakes, copyrighted content, and obviously - identity documents -   
   are off limits.    
      
   However, there are ways to trick the tools into returning such content, a   
   practice generally known as jailbreaking large language models. In this case,   
   Genians says the headshot was publicly available, and the criminals likely   
   requested a sample design or a mock-up, to force ChatGPT into returning the    
   ID image.    
      
   "Since military government employee IDs are legally protected identification   
   documents, producing copies in identical or similar form is illegal. As a   
   result, when prompted to generate such an ID copy, ChatGPT returns a    
   refusal," Genians said. "However, the model's response can vary depending on   
   the prompt or persona role settings."    
      
   "The deepfake image used in this attack fell into this category. Because   
   creating counterfeit IDs with AI services is technically straightforward,   
   extra caution is required."    
      
   The researchers further explained that the victim was a South Korean   
   defense-related institution but did not want to name it.    
      
    Via The Register   
      
   ======================================================================   
   Link to news story:   
   https://www.techradar.com/pro/security/north-korean-hackers-generate-fake-sout   
   h-korean-military-id-using-chatgpt   
      
   $$   
   --- SBBSecho 3.28-Linux   
    * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/14 305 153/7715 154/110 218/700   
   SEEN-BY: 226/30 227/114 229/110 111 206 300 307 317 400 426 428 470   
   SEEN-BY: 229/664 700 705 266/512 291/111 320/219 322/757 342/200 396/45   
   SEEN-BY: 460/58 712/848 902/26 2320/0 105 304 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca