How AI Makes Phishing Easy & What to Watch For

Categories: , ,

Posted on

By

How AI Makes Phishing Easy & What to Watch For

The use of AI has increased over the past couple years. So, as an exercise I decided to see how far it’s come. I decided a good test for AI would be creating a phishing campaign. The results show that it’s easier than ever for someone with little technical experience to create a believable phishing campaign.

Keep It Ethical

Before anyone is tempted to use these methods to trick someone without consent, I want to remind you that phishing and other such attacks are illegal and should only be performed by professionals who have a contract allowing them to perform the phish in order to test and provide training.

For those worried about how easy this is, stay for the end of the post where I offer tips you can use to help you catch a phish before you fall for it.

Creating the Phish Webpage

When running a phishing campaign, we need a landing page for our targets to end up on. I took a screenshot of Facebook’s login page, since it’s one many readers will recognize, and I uploaded it to an AI asking it to generate the HTML code for the screenshot. There are several AI tools to choose from, each has its strengths and weaknesses when it comes to coding. I suggest becoming familiar with as many as possible to experiment to find what works best for you.

Here’s the request and screenshot I passed along to the AI:

Generate HTML for the following screenshot
Screenshot of the actual Facebook login page

After submitting the screenshot to the AI, I got HTML code that resulted in the following.

Initial HTML created by AI copying the screenshot above

As you can see, the general structure is there, but it doesn’t match exactly.

So, I went back to the AI and prompted it with the changes below:

Make the text and login box side by side

Here’s what I got:

AI's next try with some prompting from our pentester

Now it’s definitely a lot closer, but it still can use some work. 

I ended up fixing the footer to the bottom of the page and changing the background color to white myself. Now it’s not an exact match, but it looks pretty close for literally 5 minutes of work: 

Our pentester's final proof phishing webpage with about 5 minutes of effort.

Creating the Phishing Email

I also wanted to see what kind of email the AI would generate for the phishing attack. I asked it to generate an HTML email asking users to login and review their account login activity.

Since it was in the same conversation as when I generated the login page, it automatically added Facebook to the email without me asking it to do so:

Generate an html email asking a user to login and check their account activity

Here’s what it produced:

Phishing email created by AI

Now it’s a fairly well-made email. There are some changes I would make depending on the engagement and goals of the assessment, but, again, the majority of the busy work is done for me leaving me only the work for my specific task. 

AI Made the Grade

Ultimately, AI can be a useful tool which can greatly speed up the development and deployment of phishing campaigns. And, while things still require some human touches, it makes it easier for attackers to create many campaigns quickly. 

Most AI models have some safeguards in place. During my testing the models would sometimes refuse to give me the HTML code. Another time one added HTML code into the page saying it was for a test. But the same models would also sometimes just give the code without a second thought. So while providers try to add safeguards they don’t always work.

Also, it should be noted that state sponsored threats are using AI tools in their work. OpenAI has a page dedicated to their effort to disrupt that.

What You Can Do to Protect Yourself

For years, we’ve been warning our customers that phishing emails have become very sophisticated and often look legitimate. The AI game-changer is that it’s now easier than ever for anyone to create realistic a phish quickly.

My advice remains the same, but the nature of phishing threats will continue to evolve with greater sophistication as time goes on.

  1. Even if you have reason to believe that an email is legitimate, don’t use the links in the email. If it’s a service you use, you should know the website, so go to it yourself. If the email was legitimate, you should still be able to find what you need.
  2. Don’t reply to the email or use contact information in the email. If you know the person or the company, again you should have their info. 
  3. If you do need to use the info in the email or reply to an unexpected email, you can always reach out to a known contact at a known number or email to verify that the email is legitimate. Especially don’t open attachments without checking first.
  4. If you received the email at work, your IT department may have a system where they verify that emails are legitimate for you. If not, put in a ticket or call them. 
  5. If you use a password storage tool, and we highly recommend you do, it should not automatically fill in your ID and password on websites it doesn’t recognize. If you clicked a link in an email or SMS message and your password tool doesn’t fill in your credentials, that may be a sign that the page is fake.

Stay safe out there and take a look at our PSE & Red Team Series if you found this interesting! 


Like what you’ve learned from Raxis?

Contact us to receive an expert-led penetration test, and we’ll also show you step-by-step how to recreate our attack against your own systems.

Raxis Attack

Continuous, expert-led PTaaS combined with advanced automation to uncover and address hidden vulnerabilities, ensuring your business stays ahead of evolving cyber threats while maintaining regulatory compliance.

Raxis Protect

Continuous vulnerability scanning, real-time asset management, and expert guidance to proactively identify and address security gaps across your entire digital ecosystem, ensuring 24/7 protection against evolving cyber threats.

Raxis Strike

Tailored, expert-led penetration testing that uncovers hidden vulnerabilities using real-world hacker techniques, providing actionable insights to strengthen your defenses and protect against sophisticated cyber threats.

Partner With Raxis

Partnering with Raxis empowers your business with elite penetration testing services, competitive reseller pricing, and recurring revenue opportunities, all backed by a proven track record of excellence and a commitment to staying ahead of evolving cybersecurity threats.

More From Raxis

  • Cybersecurity: It’s how to say “Yes.”

    By Mark Puckett • December 31, 2024
  • Raxis Team at DefCon 32

    Tips to Stay Secure at DefCon 2024

    By Brian Tant • August 9, 2024