Most people, even the non-tech savvy, can usually sense when something doesn’t feel quite right when receiving a phishing email. With the number of scams flying through the roof, most of us have become highly sensitized and vigilant to strange messages popping up in our inboxes.
But cybercriminals are using new artificial intelligence-powered tools to create incredibly sophisticated, personalized, and ultimately convincing phishing emails that can fool even seasoned professionals. Gone are the days of obvious typos, mismatched links, and other red flags that set off our internal alarm bells.
These new AI-powered phishing tricks allow attackers to automatically generate messages that look and feel authentic, persuading victims to click dangerous links or provide sensitive information without hesitation. In this post, we will break down exactly how hackers are using emerging technologies to orchestrate targeted, cost-effective, and, most troublingly, highly successful new phishing campaigns.
The Evolution of Phishing: From Clunky to Convincing
Not that long ago, most phishing emails were full of red flags. The senders pretended to be major brands like Chase or Apple, but a quick inspection revealed comically bad grammar, strange links, mismatched email addresses, dodgy logos—you name it. Spotting a phishing attempt was trivial for most security-conscious internet users.
However, over time, attackers invested more resources into perfecting the art of phishing as it became increasingly lucrative. Instead of blasting out mass generic phishing emails and hoping a few people would fall victim, hackers focused on running much more minor but higher ROI campaigns that precisely targeted select individuals or companies.
These attacks were more tailored in their content and better designed to manipulate psychological triggers to increase the likelihood of a victim taking the desired action, such as clicking a link or attachment. Security awareness training did instill higher detection rates across organizations, but well-crafted phishing emails still caught many employees off guard.
In recent years, the combination of more advanced phishing kits available for purchase—which come loaded with tools to help create and distribute phishing sites and emails—and new AI-powered techniques has taken phishing to unprecedented new levels.
AI and the Automation of Phishing
So, what exactly changed to make AI-powered phishing campaigns possible? The main breakthrough has been the development of advanced artificial intelligence systems called large language models (LLMs) that can generate human-like text on demand.
LLMs are trained on enormous datasets of natural text from books, Wikipedia, websites, and more to develop an innate understanding of grammar, context, topic, style, and much more related to language. By providing these models with a prompt or short description of the kind of text you want to be generated, they can continue autonomously in that direction—whether it’s a poem, a blog, legal documents, or a phishing email.
And the results are strikingly human-like, which presents an incredible opportunity for threat actors seeking to operate more efficiently. Why painstakingly compose individualized phishing emails by hand for each target when AI can automatically generate effective templates with just a short prompt?
Research has found that 60% of participants had already fallen victim to an AI-generated phishing email, which is roughly the same success rate as non-AI phishing messages created by human experts. Now, while this may seem like no big deal since it’s just the same success rate, the worrying aspect is that these LLMs drastically reduce the cost of setting up and running mass-scale attacks (by up to 95%).
So, how exactly can attackers leverage LLMs in automated phishing campaigns?
Step 1) Gathering Targets
Hackers get their hands on target email lists through phishing kits purchased online or by scraping employee contacts off websites like LinkedIn and Facebook. LLMs supercharge the process by generating scripts that systematically visit company sites, locate their employee directories, and then extract names, roles, backgrounds, and more on each listing into organized spreadsheets. This becomes prime data to enable personalized attacks tailored to each individual for maximum response rates.
Step 2) Collecting Intel
To make phishing emails really connect with targets, hackers feed all that employee data into LLM generators to further enrich profiles. Asking simple questions like “What kind of event might the marketing team hold?” or “What software programs might accountants request?” produces amazingly realistic summaries, insider perspectives, and specifics that make messages resonate as familiar. Hackers distill the most helpful intel to optimize prompting the LLM when fabricating each phishing email.
Step 3) Creating Emails
With personalized profiles assembled on each target, hackers prompt the LLM to fabricate hyper-targeted phishing emails. They feed in sender and recipient names, positions, company details, desired actions like clicking links, etc. The LLM generates email templates tailored to match communication styles and scenarios employees see regularly in their actual inboxes. Each message looks legitimate, complete with insider specifics collected on each target through conversation analysis.
Step 4) Sending Emails
LLM-generated scripts segment target lists and systematically distribute waves of personalized phishing emails over time. Distribution patterns realistically mimic regular legitimate traffic to bypass spam filters. Randomly generated insider aliases serve as the phishing sender to thwart blacklist filters blocking specific compromised accounts. Responses get routed to agents offering 24/7 conversational coverage to intercept victims and increase engagement.
Step 5) Tracking and Iterating
Notification systems track response rates on phishing emails across targets to highlight areas working well or needing refinement. Hackers tweak prompts and templates based on performance data, testing different words, tones, urgency levels, and other attributes that provoke target actions. New variants emerge and are incrementally tuned for better results in each campaign. It’s a constant optimization cycle enabled by LLMs.
Final Word
As phishing tactics become more advanced, it’s crucial that we all remain attentive and careful. Make sure to closely inspect any strange emails asking you to take significant actions, even if the message seems believable at first glance. Implement cybersecurity defenses across multiple levels, including AI solutions that can counter the algorithms hackers use by detecting attacks early on.
With an intentional strategy, pragmatic outlook, and adaptability flexibility, it’s possible to beat phishing 2.0. For now, the odds favor attackers, but people and technology progress in tandem, eventually shifting the balance back towards stronger defense once again.