November 24, 2024

New ChatGPT scam messages alert users; Find out how to protect yourself!

2 min read
New ChatGPT scam messages alert users;  Find out how to protect yourself!

that chat It’s a success, everyone knows! However, many cyber criminals are already using the wave of the moment to spread malware and commit theft. The news was released by researchers at Kaspersky, a cybersecurity company that develops and sells antivirus and internet security software.

According to these experts, scammers create groups on social networks that mimic in a real way the official accounts of the OpenAI artificial intelligence lab or communities of ChatGPT enthusiasts to carry out the attacks.

After all, how does a coup work?

It works like this: Fake groups apparently host official posts with news about the service and promote scam software disguised as ChatGPT desktop software. Thus, if an Internet user clicks on the link in the post, they will be directed to a website that passes the official ChatGPT website. In this way, the fake page asks the victim to download a supposed version of ChatGPT for Windows, which is actually a very malicious and malicious executable file.

The installation stops abruptly with an error message that the program could not be installed. However, the message serves to deceive the victim, who will assume that they were unable to install the app. However, the installation is completed with a Trojan-steal, Trojan-PSW.Win64, which will steal account information saved in Chrome, Edge, Firefox, Brave, etc. browsers.

As such, scammers are particularly interested in stealing cookies and login credentials for user accounts. Facebook, TikTok and Google, mostly for business related. Theft of the amount spent on advertising and the current balance of business accounts can also occur. The malware has already attacked victims in Africa, Asia, Europe, North America and Latin America.

Tips to protect yourself from fraud

  • Be careful when downloading software! Always look for official sources;
  • Use strong, unique passwords for each service and enable two-factor authentication whenever possible;
  • Pay attention to suspicious links or emails from unknown sources;
  • Use a security system that prevents this type of access.

Leave a Reply

Your email address will not be published. Required fields are marked *