Cyber Security News

Malicious ChatGPT Agents May Steal Chat Messages and Users Personal Data

In November 2023, OpenAI released GPTs publicly for everyone to create their customized version of GPT models. Several new customized GPTs were created for different purposes. However, on the other hand, threat actors can also utilize this public GPT model to create their versions of GPTs to perform various malicious activities.

Researchers have developed a new GPT to demonstrate the ease with which cybercriminals can steal user information, such as chat messages and passwords, or create malicious code through certain chat requests.

Thief GPT

This new malicious ChatGPT agent was created to forward users’ chat messages to a third-party server and ask for sensitive information such as username and password. 

Thief GPT (Source: Embracethered)

This was possible as ChatGPT loads images from any website, which requires data to be sent to a third-party server. Moreover, a GPT can also contain instructions to ask the user for information and can send it anywhere, depending upon the configuration of the GPT.

The new demo GPT was named Thief GPT and was capable of asking questions to the user to send it to a third-party server secretly. However, when publishing it to users, there were specific guidelines that denied the request.

According to the documentation, ChatGPT allows three types of publishing for creators—only me (default), Anyone with a link, and Public. Nevertheless, since the researchers had the words “Steal” and “malicious”, it violated the “brand and usage” guidelines and was eventually rejected.

Rejected Guidelines (Source: Embracethered)

Later, it was quickly fixed and was accepted by the GPT store. This led to the conclusion that there are chances for malicious actors to utilize this publicly available GPT code for malicious purposes.

Furthermore, a complete report has been published, which provides details about the method, usage, and other information.

Eswar

Eswar is a Cyber security reporter with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is reporting data breach, Privacy and APT Threats.

Recent Posts

GitAuto Strengthens Code Security By Automating QA At Scale

In the current software landscape, security breaches caused by untested or poorly tested code are…

32 minutes ago

Cybersecurity in Mergers and Acquisitions – CISO Focus

Cybersecurity in mergers and acquisitions is crucial, as M&A activities represent key inflection points for…

2 hours ago

Top Cybersecurity Trends Every CISO Must Watch in 2025

In 2025, cybersecurity trends for CISOs will reflect a landscape that is more dynamic and…

2 hours ago

Zero Trust Architecture – A CISO’s Blueprint for Modern Security

Zero-trust architecture has become essential for securing operations in today’s hyper-connected world, where corporate network…

2 hours ago

Chrome 136 Released With Patch For 20-Year-Old Privacy Vulnerability

The Chrome team has officially promoted Chrome 136 to the stable channel for Windows, Mac,…

3 hours ago

SecAI Debuts at RSA 2025, Redefining Threat Investigation with AI

By fusing agentic AI and contextual threat intelligence, SecAI transforms investigation from a bottleneck into…

13 hours ago