Russian Hackers Attempt to Bypass OpenAI’s Restrictions for Malicious Use of ChatGPT
Check Point Research (CPR) is seeing attempts by Russian cybercriminals to bypass OpenAI’s restrictions, in order to use ChatGPT for malicious purposes. In underground hacking forums, hackers are discussing how to circumvent IP addresses, payment cards and phone numbers controls – all of which are needed to gain access to ChatGPT from Russia. CPR shares screenshots of what they saw and warns of the fast-growing interest of hackers in ChatGPT to scale malicious activity.
- Screenshot #1: Cybercriminal asks what is the best way to use stolen payment card to pay for upgraded user on OpenAI
- Screenshot #2: Discussion on how to bypass geo controls of OpenAI
- Screenshot #3: Tutorials in Russian semi-legal online SMS services on how to use it to register ChatGPT
Check Point Research (CPR) is seeing attempts by Russian cybercriminals to bypass OpenAI’s API restrictions. In underground Russian hacking forums, hackers are discussing how to bypass IP, payment cards and phone numbers limitation – all of which are needed to gain access to ChatGPT.
It is not extremely difficult to bypass OpenAI’s restricting measures for specific countries to access ChatGPT. Right now, we are seeing Russian hackers already discussing and checking how to get past the geofencing to use ChatGPT for their malicious purposes. We believe these hackers are most likely trying to implement and test ChatGPT into their day-to-day criminal operations. Cyberciminals are growing more and more interested in ChatGPT, because the AI technology behind it can make a hacker more cost-efficient.
Screenshots from Underground Hacking Forum
1. Russian cybercriminal wants to get access to OpenAI API and asks what is the best way to use stolen payment card to pay for upgraded user on OpenAI
2. Discussion on how to bypass geo controls of OpenAI
3. Generally, there is a lot of tutorials in Russian semi legal online SMS services on how to use it to register to ChatGPT and we have examples that it is already being use: