SHARE
Facebook X Pinterest WhatsApp

Cybersecurity Analysts Using ChatGPT for Malicious Code Analysis, Predicting Threats

ChatGPT has raised alarm among cybersecurity researchers for its unnerving ability in composing everything from sophisticated malware to phishing lures – but it’s important to keep in mind that the tool can help support cybersecurity defenses as well. Shiran Grinberg, director of research and cyber operations at Cynet, told eSecurity Planet that too many companies […]

Written By
thumbnail Jeff Goldman
Jeff Goldman
Feb 10, 2023
eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

ChatGPT has raised alarm among cybersecurity researchers for its unnerving ability in composing everything from sophisticated malware to phishing lures – but it’s important to keep in mind that the tool can help support cybersecurity defenses as well.

Shiran Grinberg, director of research and cyber operations at Cynet, told eSecurity Planet that too many companies are deterred by ChatGPT, rather than encouraging employees to leverage its functionality. “After all, I doubt you’ll find a manager today who won’t encourage his employees to use Google when searching for information, unless you are a citizen of China, Russia, North Korea, or Iran,” he said.

Also read:

ChatGPT’s Good Security Uses

And ChatGPT’s security benefits, Grinberg said, are significant. “Let’s assume you have a team of analysts and you encourage them to use ChatGPT in order to come to conclusions and look up all kinds of information,” he said. “You can actually put a piece of code into ChatGPT and ask it to identify the malicious part in it – so indeed, it can aid a lot.”

Analysts, responders, and investigators, Grinberg said, can use ChatGPT to assemble a detailed incident response report, aligned with SANS methodology, in minutes. They can then fill the report with analysis of malicious code, scripts and different malware functions, “all done with the help of ChatGPT,” he said.

Grinberg said Cynet has already started leveraging ChatGPT to future-proof its defenses. “We are able to take a machine learning model and to turn it into an AI mechanism which basically learns many types of legitimate files versus many malicious files,” he said. “By using huge amounts of data, we can conclude which future files would be malicious versus legitimate.”

However, one security researcher – Chris Anley, chief scientist at NCC Group – cautions that using ChatGPT for security code analysis can result in inaccuracies and requires expert review.

As Anley noted in one code analysis example, “this output is stunning at first sight, but has some problems that require human understanding and careful revision for the output to be trusted.”

Malicious Uses

On the other hand, the tool can help malicious users generate threats that would previously have been beyond their abilities. “The main threat lies in the fact that ChatGPT makes life easier and simpler for threat actors in terms of creating an attack with little previous knowledge of technical capabilities,” Grinberg said.

It’s relatively easy, he said, for threat actors to leverage ChatGPT to develop malicious code. Even though ChatGPT will prompt you if you are trying to do something illegal, Grinberg said, “you can trick it by playing scenarios and it will give you code that with a few tweaks can be malicious.”

A group on Reddit, for example, has been working on jailbreaks that bypass ChatGPT controls.

To some degree, bringing advanced hacking techniques to the less technical is not a new issue – across the board, the average age of attackers is decreasing as they find the barriers to entry falling away. “There are all kinds of available services today, like malware-as-a-service, ransomware-as-a-service, initial-access-as-a-service, and now ChatGPT, which allows the expert hacker to all of a sudden be able to write malicious code and carry out attacks,” Grinberg said.

ChatGPT Security Tools Coming?

It’s also worth noting, Grinberg said, that new tools are increasingly available to help determine whether content was generated by AI – examples include the OpenAI AI Text Classifier, the Content at Scale AI Detector, and the GPT-2 Output Detector. “My estimation is that we will see additional tools and solutions aimed at the detection of malicious content crafted by AI models,” he said.

Grinberg said the broader lesson is simple: don’t ignore the threats. “Work on empowering your employees, encourage them to interact with this new technology, intertwine it with cyber security awareness training,” he said. “It will be fun, engaging, and memorable.”

See the Top Endpoint Detection and Response (EDR) tools

thumbnail Jeff Goldman

eSecurity Planet contributor Jeff Goldman has been a technology journalist for more than 20 years and an eSecurity Planet writer since 2009. He's also written extensively about wireless and broadband infrastructure and semiconductor engineering. He started his career at MTV, but soon decided that technology writing was a more promising path.

Recommended for you...

From LinkedIn to Lies: What a Job Scam Looks Like Now
Aminu Abdullahi
May 21, 2025
Fake AI Video Tools Spreading New “Noodlophile” Malware, Targets Thousands on Facebook
Aminu Abdullahi
May 12, 2025
RSA Conference 2025: Top Announcements and Key Takeaways from the Cybersecurity World’s Biggest Stage
NVIDIA: Agentic AI Is Reshaping Cybersecurity Defense
Aminu Abdullahi
Apr 30, 2025
eSecurity Planet Logo

eSecurity Planet is a leading resource for IT professionals at large enterprises who are actively researching cybersecurity vendors and latest trends. eSecurity Planet focuses on providing instruction for how to approach common security challenges, as well as informational deep-dives about advanced cybersecurity topics.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.