SHARE
Facebook X Pinterest WhatsApp

North Korean Hackers Weaponize ChatGPT in AI-Driven Phishing Attack

North Korea’s Kimsuky hackers used ChatGPT to forge government IDs in a phishing attack, marking a new era of AI-powered cyber warfare.

Sep 16, 2025
eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

A leading South Korean cybersecurity firm, North Korea’s infamous Kimsuky hacking group has leveraged ChatGPT to fabricate realistic government identification cards as part of a recent phishing operation targeting South Korean officials.

This marks one of the first documented cases where AI-generated deepfakes were weaponized to support a live cyberattack on the Korean Peninsula.

According to Genians, the attack was first identified in July, but researchers have recently released the full extent of its sophistication. Kimsuky reportedly used OpenAI’s large language model not only to assist in crafting persuasive phishing lures, but also to create fake military and government IDs. These forgeries were then used to trick victims into downloading malware disguised as legitimate security updates.

A new chapter in cyber warfare

Kimsuky has long been known for its espionage campaigns, targeting diplomatic, defense, and research sectors across Asia. But this latest operation shows a strategic shift: the use of publicly accessible AI to automate the creation of convincing forgeries and bypass traditional detection measures.

By generating high-resolution images of government credentials, the hackers were able to present malware-laden messages as official communications. The attack chain reportedly involved spear-phishing emails that appeared to originate from legitimate ministries, complete with AI-generated portraits, logos, and document templates.

Analysts warn that this blending of deepfake visuals with malware delivery represents a significant evolution in offensive cyber capabilities. It also demonstrates how the guardrails built into generative AI platforms can be manipulated or circumvented when attackers work persistently enough.

Implications beyond the Korean peninsula

The incident underscores a broader reality: AI-powered cybercrime is no longer theoretical. The barriers to entry are falling, allowing state and non-state actors alike to deploy generative models for fraud, espionage, and sabotage.

Organizations should update employee awareness training, adopt stronger authentication protocols, and invest in tools capable of detecting synthetic media.

Kimsuky’s latest campaign is more than a warning — it’s a milestone. State-sponsored hackers are no longer merely experimenting with AI; they are operationalizing it to undermine the very systems designed to keep them out. From fake IDs to adaptive phishing scripts, the toolkit of cyber espionage is expanding with every iteration of generative models.

For governments, corporations, and individuals entrusted with sensitive data, the message is clear: the age of weaponized artificial intelligence is here, and the cost of underestimating it could be catastrophic.

Recommended for you...

Your IT Helpdesk Tools Could Be a Hacker’s Key
Your Smart Devices Just Fueled a Record-Breaking DDoS Attack
Palo Alto Exposes Passwords in Plain Text
Ken Underhill
Sep 11, 2025
1.6 Million Voices Stolen: Your Voice Could Be Next
eSecurity Planet Logo

eSecurity Planet is a leading resource for IT professionals at large enterprises who are actively researching cybersecurity vendors and latest trends. eSecurity Planet focuses on providing instruction for how to approach common security challenges, as well as informational deep-dives about advanced cybersecurity topics.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.