Devising and Detecting Phishing: Large Language Models vs. Smaller Human Models (2308.12287v2)
Abstract: AI programs, built using LLMs, make it possible to automatically create phishing emails based on a few data points about a user. They stand in contrast to traditional phishing emails that hackers manually design using general rules gleaned from experience. The V-Triad is an advanced set of rules for manually designing phishing emails to exploit our cognitive heuristics and biases. In this study, we compare the performance of phishing emails created automatically by GPT-4 and manually using the V-Triad. We also combine GPT-4 with the V-Triad to assess their combined potential. A fourth group, exposed to generic phishing emails, was our control group. We utilized a factorial approach, sending emails to 112 randomly selected participants recruited for the study. The control group emails received a click-through rate between 19-28%, the GPT-generated emails 30-44%, emails generated by the V-Triad 69-79%, and emails generated by GPT and the V-Triad 43-81%. Each participant was asked to explain why they pressed or did not press a link in the email. These answers often contradict each other, highlighting the need for personalized content. The cues that make one person avoid phishing emails make another person fall for them. Next, we used four popular LLMs (GPT, Claude, PaLM, and LLaMA) to detect the intention of phishing emails and compare the results to human detection. The LLMs demonstrated a strong ability to detect malicious intent, even in non-obvious phishing emails. They sometimes surpassed human detection, although often being slightly less accurate than humans. Finally, we make an analysis of the economic aspects of AI-enabled phishing attacks, showing how LLMs can increase the incentives of phishing and spear phishing by reducing their costs.
- “PaLM 2 Technical Report”, 2023 URL: https://%20arxiv.org%20/abs/2305.10403v1
- “Why is phishing still successful?” In https:// doi.org /10.1016/S1361-3723(20)30098-1 2020.9 MA Business London, 2021, pp. 15–19 DOI: 10.1016/S1361-3723(20)30098-1
- “Casino giant MGM expects $100 million hit from hack that led to data breach — Reuters” URL: https://www.reuters.com/business/mgm-expects-cybersecurity-issue-negatively-impact-third-quarter-earnings-2023-10-05/
- Rachna Dhamija, J.D. Tygar and Marti Hearst “Why phishing works” In Conference on Human Factors in Computing Systems - Proceedings 1 Association for Computing Machinery, 2006, pp. 581–590 DOI: 10.1145/1124772.1124861
- “Email Marketing Benchmarks and Statistics for 2022 — Campaign Monitor” URL: https://www.campaignmonitor.com/resources/guides/email-marketing-benchmarks/
- “Email Marketing Statistics & Benchmarks — Mailchimp” URL: https://mailchimp.com/resources/email-marketing-benchmarks/
- “Phisherman: Phishing Link Scanner” In International Conference on Machine Learning for Networking, 2022, pp. 153–168 Springer
- “Generating Personalized Phishing Emails for Social Engineering Training Based on Neural Language Models” In Lecture Notes in Networks and Systems 570 LNNS Springer ScienceBusiness Media Deutschland GmbH, 2023, pp. 270–281 DOI: 10.1007/978-3-031-20029-8˙26
- Christopher Hadnagy “Social Engineering: The Science of Human Hacking” John Wiley & Sons, 2018
- “Phishing dark waters: The offensive and defensive sides of malicious Emails” John Wiley & Sons, 2015
- Julian Hazell “Large Language Models Can Be Used To Effectively Scale Spear Phishing Campaigns”, 2023 URL: https://%20arxiv.org%20/abs/2305.06972v2
- Walter Houser “Could what happened to sony happen to us?” In IT Professional 17.2 IEEE, 2015, pp. 54–57
- Rabimba Karanjai “Targeted Phishing Campaigns using Large Scale Language Models”, 2022 URL: https://arxiv.org/abs/2301.00665v1
- “Detecting Phishing Sites Using ChatGPT”, 2023 URL: https://arxiv.org/abs/2306.05816v1
- “Fundamentals of Generative Large Language Models and Perspectives in Cyber-Defense”, 2023 URL: https://%20arxiv.org%20/abs/2303.12132v1
- “URLTran: Improving Phishing URL Detection Using Transformers” In Proceedings - IEEE Military Communications Conference MILCOM 2021-November Institute of ElectricalElectronics Engineers Inc., 2021, pp. 197–204 DOI: 10.1109/MILCOM52596.2021.9653028
- Kanishka Misra and Julia Taylor Rayz “LMs go Phishing: Adapting Pre-trained Language Models to Detect Phishing Emails” In Proceedings - 2022 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology, WI-IAT 2022 Institute of ElectricalElectronics Engineers Inc., 2022, pp. 135–142 DOI: 10.1109/WI-IAT55865.2022.00028
- OpenAI “GPT-4 Technical Report”, 2023 URL: https://arxiv.org/abs/2303.08774v3
- Sayak Saha Roy, Krishna Vamsi Naragam and Shirin Nilizadeh “Generating Phishing Attacks using ChatGPT”, 2023 URL: https://%20arxiv.org%20/abs/2305.05133v1
- Positive Technologies “Cybersecurity threatscape: Q3 2022”, 2022
- “LLaMA: Open and Efficient Foundation Language Models” URL: https://%20github.com%20/facebookresearch/xformers
- Arun Vishwanath “The Weakest Link: How to Diagnose, Detect, and Defend Users from Phishing” MIT Press, 2022
- “A Large-Scale Pretrained Deep Model for Phishing URL Detection” Institute of ElectricalElectronics Engineers (IEEE), 2023, pp. 1–5 DOI: 10.1109/ICASSP49357.2023.10095719
- Fredrik Heiding (1 paper)
- Bruce Schneier (9 papers)
- Arun Vishwanath (4 papers)
- Jeremy Bernstein (25 papers)
- Peter S. Park (16 papers)