The Rise of WormGPT: A ChatGPT Rival Heightens Hacker Effectiveness

img blog The Rise of WormGPT A ChatGPT Rival Heightens Hacker Effectiveness
logo adaptive

The advent of artificial intelligence (AI) has significantly enhanced cybersecurity measures, equipping defenders with powerful tools to combat cyber threats. However, the same AI technology that empowers security experts has also found its way into the hands of cybercriminals, who now employ sophisticated AI models to orchestrate targeted and more potent attacks.

One such unsettling development is the emergence of WormGPT, an AI tool that offers hackers unprecedented capabilities with “no ethical boundaries or limitations,” posing a new challenge to the cybersecurity landscape.

According to reports, WormGPT is a generative AI model that shares similarities with ChatGPT but with a stark difference—its design caters exclusively to malicious activities. Developed and promoted on the dark web, WormGPT touts itself as a blackhat alternative to legitimate AI models, boasting capabilities to craft human-like text specifically for hacking campaigns.

Allegedly trained on a diverse dataset that heavily emphasizes malware-related information, this AI rival appears tailor-made for cybercriminals seeking to launch large-scale attacks.

Stay Alert: The Rise of WormGPT

In a recent article by, they wrote, “Unfortunately, the advancements that hold immense promise for positive applications have also opened up new avenues for accelerated cybercrime.

What is generative AI?

Generative AI can create and mimic human-like content. Thus, it has unlocked incredible opportunities in various fields, such as creative arts, content generation, and problem-solving.

With the rapid development of generative AI, cybercriminals now possess sophisticated tools, like WormGPT, that can automate and amplify their malicious activities. From creating convincing deep fake videos and images to generating realistic phishing emails and deceptive social media content, hackers leverage AI technology to deceive and manipulate unsuspecting victims.

WormGPT: An overview

WormGPT is an AI model built upon the powerful GPT-J language model, much like its counterpart, ChatGPT. But what distinguishes it from ChatGPT and Google’s Bard? Well, it is a lack of safety measures. Consequently, it becomes susceptible to generating responses involving malicious content.

How does WormGPT help hackers?

The primary purpose of WormGPT is to facilitate illicit activities. It empowers users to engage in various illegal practices, including creating malware content using the Python coding language.

In addition, it enables the generation of sophisticated and persuasive emails that cyberpunks employ in phishing or Business Email Compromise (BEC) attacks. In short, cybercriminals use WormGPT to craft deceptively authentic emails designed to target unsuspecting individuals for phishing schemes.

Be cautious! WormGPT mirrors ChatGPT in functionality but operates without ethical boundaries. Do not worry! While hackers are savvy, we can still stop them.

Undoubtedly, generative AI holds enormous potential to advance society. But we must remain vigilant and stay one step ahead of cybercriminals who exploit this technology.”

No Ethical Boundaries

We recently ran across another alarming article by that addressed the WormGPTl. In it, they wrote, “A ChatGPT-style AI tool with ‘no ethical boundaries or limitations’ is offering hackers a way to perform attacks on a never-before-seen scale.

Cyber security firm SlashNext observed the generative artificial intelligence WormGPT being marketed on cybercrime forums on the dark web, describing it as a ‘sophisticated AI model’ capable of producing human-like text that can be used in hacking campaigns.

‘This tool presents itself as a blackhat alternative to GPT models, designed specifically for malicious activities,’ the company explained in a blog post. ‘WormGPT was allegedly trained on a diverse array of data sources, particularly concentrating on malware-related data.’

The researchers conducted tests using WormGPT, instructing it to generate an email intended to pressure an unsuspecting account manager into paying a fraudulent invoice. The results were alarming—WormGPT not only crafted a remarkably convincing email but also displayed strategic cunning, demonstrating its potential for sophisticated phishing attacks.

Leading AI tools like OpenAI’s ChatGPT and Google’s Bard have in-built protections to prevent people from misusing the technology for nefarious purposes. However, WormGPT is allegedly designed to facilitate criminal activities.

Screenshots uploaded to the hacking forum by WormGPT’s anonymous developer show various services the AI bot can perform, including writing code for malware attacks and crafting emails for phishing attacks.

WormGPT’s creator described it as ‘the biggest enemy of the well-known ChatGPT,’ as it allows users to ‘do all sorts of illegal stuff.’

A recent report from the law enforcement agency Europol warned that large language models (LLMs) like ChatGPT could be exploited by cybercriminals to commit fraud, impersonation, or social engineering attacks.

‘ChatGPT’s ability to draft highly authentic texts on the basis of a user prompt makes it an extremely useful tool for phishing purposes,’ the report noted.

‘Where many basic phishing scams were previously more easily detectable due to obvious grammatical and spelling mistakes, it is now possible to impersonate an organization or individual in a highly realistic manner even with only a basic grasp of the English language.’

Europol warned that LLMs allow hackers to carry out cyber-attacks ‘faster, more authentically, and at significantly increased scale’.”

The emergence of WormGPT and its capacity to facilitate cyber-attacks raises concerns about the need for stronger measures to ensure AI technologies are used responsibly. Striking a balance between AI innovation and security is crucial to prevent AI from becoming a double-edged sword.

Ethical AI development, responsible usage guidelines, and collaborations between technology companies, cybersecurity experts, and law enforcement agencies will be instrumental in mitigating the threats posed by malicious AI models.

Targeting Business Emails

In excerpts from an article by, they wrote, “Cybercriminals are leveraging generative AI technology to aid their activities and launch business email compromise (BEC) attacks, including use of a tool known as WormGPT, a black-hat alternative to GPT models specifically designed for malicious activities.

Reports also revealed cyber criminals are designing “jailbreaks,” specialized prompts designed to manipulate generative AI interfaces into creating output that could involve disclosing sensitive information, producing inappropriate content, or executing harmful code.

Some ambitious cybercriminals are even taking things a step further by crafting custom modules akin to those used by ChatGPT but designed to help them carry out attacks, an evolution that could make cyber defense even more complicated.

“Malicious actors can now launch these attacks at scale at zero cost, and they can do it with much more targeted precision than they could before,” explains SlashNext CEO Patrick Harr. “If they aren’t successful with the first BEC or phishing attempt, they can simply try again with retooled content.”

The use of generative AI will head to what Harr calls the “polymorphic nature” of attacks that can be launched at great speed and with no cost to the individual or organization backing the attack. “It’s that targeted nature, along with the frequency of attack, which is going to really make companies rethink their security posture,” he says.

Fighting Fire With Fire

The rise of generative AI tools introduces additional complexities and challenges in cybersecurity efforts, increasing attack sophistication and highlighting the need for more robust defense mechanisms against evolving threats.

Harr says he thinks the threat of AI-aided BEC, malware, and phishing attacks can best be fought with AI-aided defense capabilities.

“You’re going to have to integrate AI to fight AI. Otherwise, you’re going to be on the outside looking in, and you’re going to see continued breaches,” he says. And that requires training AI-based defense tools to discover, detect, and ultimately block a sophisticated, rapidly evolving set of AI-generated threats.

“If a threat actor creates an attack and then tells the gen AI tool to modify it, there’s only so many ways you can say the same thing,” for something like invoice fraud, for example, Harr explains. “What you can do is tell your AI defenses to take that core and clone it to create 24 different ways to say that same thing.” Security teams can then take those synthetic data clones and go back and train the organization’s defense model.

“You can almost anticipate what their next threat will be before they launch it, and if you incorporate that into your defense, you can detect it and block it before it actually infects,” he says. “This is an example of using AI to fight AI.”

From his perspective, organizations will ultimately become reliant on AI to do the discovery detection. And ultimately, the remediation of those threats because there’s simply no way humanly possible to get out ahead of the curve without doing so.

Meanwhile, developers’ enthusiasm for ChatGPT and other large language model (LLM) tools has left most organizations largely unprepared to defend against the vulnerabilities that the nascent technology creates.”


The rise of WormGPT, a malicious AI rival to ChatGPT, has heightened hacker effectiveness, posing significant challenges to cybersecurity. WormGPT, a generative AI model, lacks the ethical boundaries present in legitimate AI tools, making it a perfect fit for cybercriminals seeking to orchestrate large-scale attacks. With the ability to generate human-like text, including sophisticated phishing emails, WormGPT enables hackers to deceive and manipulate unsuspecting victims.

The emergence of WormGPT has raised concerns about the misuse of AI technology for criminal purposes. While leading AI models like ChatGPT have built-in protections, WormGPT operates without such safeguards, facilitating illegal activities like crafting malware code and conducting phishing campaigns. Law enforcement agencies, such as Europol, have issued warnings about the exploitation of large language models by cybercriminals for fraud, impersonation, and social engineering attacks.

The use of generative AI tools in cybercrime is evolving rapidly, creating a more sophisticated and targeted threat landscape. This necessitates the integration of AI-aided defense capabilities to combat AI-generated threats effectively. Cybersecurity experts emphasize the importance of AI-driven defenses to detect and block evolving attacks, as the sheer volume and polymorphic nature of AI-aided attacks require rapid and proactive responses. Organizations must embrace AI technologies in their defense strategies to stay ahead of cybercriminals and protect against vulnerabilities inherent in nascent AI models.

At Adaptive Office Solutions, cybersecurity is our specialty. We keep cybercrimes at bay by using analysis, forensics, and reverse engineering to prevent malware attempts and patch vulnerability issues. By making an investment in multilayered cybersecurity, you can leverage our expertise to boost your defenses, mitigate risks, and protect your data with next-gen IT security solutions.

Every single device that connects to the internet poses a cyber security threat, including that innocent-looking smartwatch you’re wearing. Adaptive’s wide range of experience and certifications fills the gaps in your business’s IT infrastructure and dramatically increases the effectiveness of your cybersecurity posture.

Using our proactive cybersecurity management, cutting-edge network security tools, and comprehensive business IT solutions, you can lower your costs through systems that are running at their prime, creating greater efficiency and preventing data loss and costly downtime. With Adaptive Office Solutions by your side, we’ll help you navigate the complexities of cybersecurity so you can achieve business success without worrying about online threats.

To schedule a Cyber Security Risk Review, call the Adaptive Office Solutions’ hotline at 506-624-9480 or email us at