Home Generative AI: Posing Risk of Criminal Abuse

Generative AI: Posing Risk of Criminal Abuse

The use of generative artificial intelligence (AI) by hackers has become an emerging threat to cybersecurity. Generative AI allows hackers to generate realistic and convincing fake data, such as images, videos, and text, which they can use for phishing scams, social engineering attacks, and other types of cyberattacks.

In this article, we will provide a comprehensive technical analysis of generative AI used by hackers, including its architecture, operation, and deployment.

Different Kinds of Generative AI

Generative AI is a subset of machine learning (ML) that involves training models to generate new data that is similar to the original training data. Hackers can use various types of generative AI models, such as generative adversarial networks (GANs), variational autoencoders (VAEs), and recurrent neural networks (RNNs).

  1. Generative Adversarial Networks (GANs): GANs consist of two neural networks: a generator and a discriminator. The generator generates fake data, and the discriminator distinguishes between real and fake data. The generator learns to create realistic data by receiving feedback from the discriminator. Hackers can use GANs to create fake images, videos, and text.
  2. Variational Autoencoders (VAEs): VAEs are another type of generative AI model that involves encoding input data into a lower-dimensional space and then decoding it to generate new data. VAEs can be used to generate new images, videos, and text.
  3. Recurrent Neural Networks (RNNs): RNNs are a type of neural network that can generate new data sequences, such as text or music. Hackers can use RNNs to generate fake text, such as phishing emails.

Generative AI: The risk

Generative AI models operate by learning patterns and relationships in the original training data and then generating new data that is similar to the original data.

Hackers can train these models on large datasets of real data, such as images, videos, and text, to generate convincing fake data. Hackers can also use transfer learning to fine-tune existing generative AI models to generate specific types of fake data, such as images of a specific person or fake emails that target a particular organization.

Transfer learning involves taking a pre-trained generative AI model and fine-tuning it on a smaller dataset of new data. Hackers can use a range of machine learning algorithms to generate convincing fake data.

In more detail, GANs can be used to generate realistic images and videos by training the generator on a dataset of real images and videos. VAEs can be used to generate new images by encoding them into a lower-dimensional space and then decoding them back into the original space. RNNs can be used to generate fake text, such as phishing emails.

Hackers can train an RNN on a large dataset of legitimate emails and then fine-tune it to generate fake emails that are similar in tone and style to the original emails. These fake emails can contain malicious links or attachments that can infect the victim’s computer or steal sensitive information.

Academic research: Generative AI for malicious activities

Several research papers have explored the use of generative AI in cyberattacks. For example, a paper titled “Generating Adversarial Examples with Adversarial Networks” explored how GANs can be used to generate adversarial examples that can fool machine learning models. Adversarial examples are inputs to machine learning models that have been intentionally designed to cause the model to make a mistake.

Another paper titled “Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN” explored how GANs can be used to generate adversarial malware examples that can evade detection by antivirus software. The paper demonstrated that GANs could be used to generate malware samples that can bypass signature-based detection methods and evade heuristic-based detection methods as well.

In addition to research papers, there are also tools and frameworks available that allow hackers to easily generate fake data using generative AI. For example, DeepFakes is a tool that allows users to create realistic fake videos by swapping the faces of people in existing videos. This tool can be used for malicious purposes, such as creating fake videos to defame someone or spread false information.

Generative AI: Facilitating work of Criminal Actors

Nowadays, hackers using generative AI models in various ways to carry out cyberattacks. For example, they can use fake images and videos to create convincing phishing emails that appear to come from legitimate sources, such as banks or other financial institutions.

Criminal Actors can also use fake text generated by OpenAI or similar tools to create convincing phishing emails that are personalized to the victim. These emails can use social engineering tactics to trick the victim into clicking on a malicious link or providing sensitive information.

Generative AI has several use cases for hackers, including:

  1. Phishing attacks: Hackers can use generative AI to create convincing fake data, such as images, videos, and text, to craft phishing emails that appear to come from legitimate sources. These emails can contain links or attachments that install malware on the victim’s computer or steal their login credentials.
  2. Social engineering attacks: Generative AI can be used to create fake social media profiles that appear to be real. Hackers can use these profiles to gain the trust of their targets and trick them into providing sensitive information or clicking on a malicious link.
  3. Malware development: Hackers can use generative AI to create new strains of malware that are designed to evade detection by traditional antivirus software. By generating thousands of variants of a single malware sample, they can create unique versions of the malware that are difficult to detect.
  4. Password cracking: Generative AI can be used to generate new password combinations for brute force attacks on password-protected systems. By training AI models on existing passwords and patterns, hackers can generate new password combinations that will likely be successful.
  5. Fraudulent activities: Hackers can use generative AI to create fake documents, such as invoices and receipts, that appear to be legitimate. They can use these documents to carry out fraudulent activities, such as billing fraud or expense reimbursement fraud.
  6. Impersonation attacks: Generative AI can be used to create fake voice recordings or videos that can be used to impersonate someone else. This can be used to trick victims into providing sensitive information or carrying out unauthorized actions.

Reducing the Risk of Generative AI Misuse by Cybercriminals

With the increasing use of generative AI by cybercriminals to carry out various malicious activities, it has become crucial for the world to take appropriate steps to reduce the risk of its misuse. The following are some of the measures that can be taken to achieve this goal:

  1. Implement Strong Security Measures: Organizations and individuals should implement strong security measures to protect their systems and data from cyber threats. This includes using multi-factor authentication, strong passwords, and regularly updating software and applications.
  2. Develop Advanced Security Tools: Researchers and security experts should continue to develop advanced security tools that can detect and prevent cyberattacks that use generative AI. These tools should be able to identify and block malicious traffic that uses fake data generated by AI models.
  3. Increase Awareness and Education: It is important to increase awareness and education about the potential risks of generative AI misuse. This includes training employees and individuals on how to identify and avoid phishing attacks, social engineering tactics, and other types of cyber threats.
  4. Strengthen Regulations: Governments and regulatory bodies should strengthen regulations around the use of generative AI to prevent its misuse. This includes setting standards for data privacy and security, as well as monitoring and enforcing compliance.

Reducing the risk of generative AI misuse by cybercriminals requires a collective effort from individuals, organizations, and governments. By implementing strong security measures, developing advanced security tools, increasing awareness and education, and strengthening regulations, we can create a safer and more secure digital world.


In conclusion, generative AI is a powerful tool that can be used for both legitimate and malicious purposes. While it has many potential applications in fields such as medicine, art, and entertainment, it also poses a significant cybersecurity threat.

Hackers can use generative AI to create convincing fake data that can be used to carry out phishing scams, social engineering attacks, and other types of cyberattacks. It is essential for cybersecurity professionals to stay up-to-date with the latest advancements in generative AI and develop effective countermeasures to protect against these types of attacks.

Featured Image Credit: Graphic Provided by the Author; Thank you!

About ReadWrite’s Editorial Process

The ReadWrite Editorial policy involves closely monitoring the tech industry for major developments, new product launches, AI breakthroughs, video game releases and other newsworthy events. Editors assign relevant stories to staff writers or freelance contributors with expertise in each particular topic area. Before publication, articles go through a rigorous round of editing for accuracy, clarity, and to ensure adherence to ReadWrite's style guidelines.

Jim Biniyaz
CEO and Co-Founder

Jim is CEO and Co-Founder of ResilientX Security and a General Partner in Parrot Media Group. He is passionate about Cyber Security, innovation, and product development. Previously Jim was Co-Founder of DeltaThreat and Next IQ Ltd.

Get the biggest tech headlines of the day delivered to your inbox

    By signing up, you agree to our Terms and Privacy Policy. Unsubscribe anytime.

    Tech News

    Explore the latest in tech with our Tech News. We cut through the noise for concise, relevant updates, keeping you informed about the rapidly evolving tech landscape with curated content that separates signal from noise.

    In-Depth Tech Stories

    Explore tech impact in In-Depth Stories. Narrative data journalism offers comprehensive analyses, revealing stories behind data. Understand industry trends for a deeper perspective on tech's intricate relationships with society.

    Expert Reviews

    Empower decisions with Expert Reviews, merging industry expertise and insightful analysis. Delve into tech intricacies, get the best deals, and stay ahead with our trustworthy guide to navigating the ever-changing tech market.