Future of Work News Free eNews Subscription

New Study Reveals the Role Large Language Models Play in Phishing Attacks

By

While phishing (in several forms) has taken place for decades, this type of fraud tends to evolve with technology. One of the most prominent phishing scams today involves “vishing,” in which supposed links to voicemail messages con victims into revealing their credentials for secure email gateways, software or web sites.   

According to a new report by cybersecurity company Egress, missed voice messages accounted for 18% of phishing attacks today, making them the most phished topic of the year so far. The report’s findings demonstrate the evolving attack methodologies used by cybercriminals that are designed to get through traditional perimeter security including secure email gateways. The study, entitled, “Phishing Threat Trends Report,” delves into key phishing trends, including the most phished topic, explores prevalent obfuscation techniques being used to bypass perimeter defenses, and examines whether chatbots have really revolutionized cyberattacks.

All phishing threat data and examples contained within the report were taken from Egress Defend, an Integrated Cloud Email Security solution that uses intelligent technology to detect and defend against the most sophisticated phishing attacks.

The report also highlights the role that large language models (LLMs) have played in enabling certain types of phishing attacks.

“Without a doubt, chatbots or large language models (LLMs) lower the barrier for entry to cybercrime, making it possible to create well-written phishing campaigns and generate malware that less capable coders could not produce alone,” said Jack Chapman, VP of Threat Intelligence for Egress.

One of the most concerning (but least-talked-about) applications of LLMs is reconnaissance for highly targeted attacks, according to Egress. Within seconds, a chatbot can scrape the internet for open-source information about a chosen target that can be leveraged as a pretext for social engineering campaigns, which are growing increasingly common.

“I’m often asked if LLM really changes the game, but ultimately it comes down to the defense you have in place,” noted Chapman. “If you’re relying on traditional perimeter detection that uses signature-based and reputation-based detection, then you urgently need to evaluate integrated cloud email security solutions that don’t rely on definition libraries and domain checks to determine whether an email is legitimate or not.”




Edited by Alex Passett
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

Future of Work Contributor

SHARE THIS ARTICLE

Related Articles

ICYMI: Developments for the Future of Work

By: Greg Tavarez    5/10/2024

Here are a few articles compiled into one for readers interested in developments regarding the future of work.

READ MORE

Trellix Announces Collaboration Security Solution for Unprotected Attack Vectors

By: Tracey E. Schelmetic    5/10/2024

Cybersecurity company Trellix, its teams focused on extended detection and response (XDR), recently announced Trellix Collaboration Security in the Un…

READ MORE

SS&C Debuts Blue Prism Next Gen Platform for Intelligent Automation

By: Alex Passett    5/8/2024

SS&C announced the first release of its new SS&C Blue Prism Next Generation intelligent automation platform, which was designed specifically to delive…

READ MORE

ICYMI: What's in Store for the Future of Work

By: Greg Tavarez    5/3/2024

Let's get into what the future of work has in store for all - some with AI solutions and some without.

READ MORE

Leostream Integrates with Windows 365 to Simplify Remote Work

By: Greg Tavarez    5/3/2024

Integrating with Microsoft Windows 365, the Leostream Platform looks to allow Windows 365 users to access additional resources with a consistent and u…

READ MORE