{"id":52889,"date":"2023-07-20T13:41:00","date_gmt":"2023-07-20T13:41:00","guid":{"rendered":"http:\/\/959232f3-233b-4179-b1dc-5a8649c43ccc"},"modified":"2023-07-20T13:41:00","modified_gmt":"2023-07-20T13:41:00","slug":"wormgpt-what-to-know-about-chatgpts-malicious-cousin","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/wormgpt-what-to-know-about-chatgpts-malicious-cousin\/","title":{"rendered":"WormGPT: What to know about ChatGPT&#8217;s malicious cousin"},"content":{"rendered":"<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large c-shortcodeImage-hasCaption\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage c-cmsImage_loaded\"><source media=\"(max-width: 767px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/c3ad5dccb3506ca940f55ee8dbd87dde0b6abc25\/2023\/07\/19\/66cc3eef-0122-4e71-8c91-e73f00db6153\/screenshot-2023-07-19-111112worm.jpg?auto=webp&amp;width=768\" alt=\"wormgpt\"><source media=\"(max-width: 1023px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/612c7d1572dee153d305459378ea9613f7792a51\/2023\/07\/19\/66cc3eef-0122-4e71-8c91-e73f00db6153\/screenshot-2023-07-19-111112worm.jpg?auto=webp&amp;width=1024\" alt=\"wormgpt\"><source media=\"(max-width: 1440px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/3cb9d26875688aece1af950e23b50617876e806d\/2023\/07\/19\/66cc3eef-0122-4e71-8c91-e73f00db6153\/screenshot-2023-07-19-111112worm.jpg?auto=webp&amp;width=1280\" alt=\"wormgpt\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/3cb9d26875688aece1af950e23b50617876e806d\/2023\/07\/19\/66cc3eef-0122-4e71-8c91-e73f00db6153\/screenshot-2023-07-19-111112worm.jpg?auto=webp&amp;width=1280\" alt=\"wormgpt\" width=\"1280\" height=\"481.8211382113821\" fetchpriority=\"low\"><\/picture><\/div>\n<\/p><\/div>\n<p> <!----><figcaption>\n<div class=\"c-shortcodeImage_caption g-inner-spacing-right-small g-color-black\" readability=\"7\">\n<div class=\"c-ShortcodeContent\" readability=\"34\">\n<p>It was only a matter of time before the AI chatbot was emulated for malicious purposes &#8212; and one such tool is now on the market, known as WormGPT.<\/p>\n<\/div>\n<\/div>\n<p> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">ZDNET screenshot via Twitter<\/span><\/figcaption><\/figure>\n<p>When ChatGPT was made available to the public on November 30, 2002, the AI chatbot took the world by storm.&nbsp;<\/p>\n<p>The software was developed by <a href=\"https:\/\/openai.com\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"c-regularLink\">OpenAI<\/a>, an AI and research company. <a href=\"https:\/\/www.zdnet.com\/article\/what-is-chatgpt-and-why-does-it-matter-heres-everything-you-need-to-know\/\" rel=\"follow\">ChatGPT<\/a> is a natural language processing tool able to answer queries and provide information based on datasets gleaned from datasets, including books and online web pages, and has since become a valued tool for on-the-fly information gathering, analysis, and writing tasks for millions of users worldwide.&nbsp;<\/p>\n<p><strong>Also:&nbsp;<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/best-vpn\/\" rel=\"follow\"><strong>The 5 best VPN services (and tips to choose the right one for you)<\/strong><\/a><\/p>\n<p>While some experts believe the technology could prove to reach an internet level of disruption, others note that ChatGPT demonstrates &#8216;confident inaccuracy.&#8217; Students in droves have been caught <a href=\"https:\/\/www.zdnet.com\/article\/how-to-use-chatgpt-to-write-an-essay\/\" rel=\"follow\">plagiarising coursework<\/a> by way of the tool, and unless datasets are verified, tools such as ChatGPT could become unwitting tools to <a href=\"https:\/\/www.zdnet.com\/article\/real-time-deepfake-detection-how-intel-labs-uses-ai-to-fight-misinformation\/\" rel=\"follow\">spread misinformation<\/a> and propaganda.&nbsp;<\/p>\n<p>Indeed, the US <a href=\"https:\/\/topclassactions.com\/lawsuit-settlements\/privacy\/ftc-announces-investigation-into-chatgpt-over-data-handling\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"c-regularLink\">Federal Trade Commission<\/a> (FTC) is investigating Open AI over its handling of personal information and the data used to create its language model.&nbsp;<\/p>\n<p><!----><\/p>\n<p>Beyond data protection concerns, however, whenever a new technological innovation is made, so are pathways for abuse. It was only a matter of time before the AI chatbot was emulated for malicious purposes &#8212; and one such tool is now on the market, known as WormGPT.<\/p>\n<div id=\"c96ef669-a8cf-4440-a383-a5fb55676a3b\" class=\"c-shortcodeListicle g-outer-spacing-bottom-medium\">\n<div class=\"c-shortcodeListicle_conten\"><!----> <!----> <\/p>\n<div readability=\"14.149253731343\">\n<div class=\"c-ShortcodeContent\" readability=\"45.985074626866\">\n<p>On July 13, researchers from cybersecurity firm SlashNext published&nbsp;<a href=\"https:\/\/slashnext.com\/blog\/wormgpt-the-generative-ai-tool-cybercriminals-are-using-to-launch-business-email-compromise-attacks\/\" target=\"_blank\" class=\"c-regularLink\" rel=\"noopener\">a blog post<\/a>&nbsp;revealing the discovery of WormGPT, a tool being promoted for sale on a hacker forum.<\/p>\n<p>According to the forum user, the WormGPT project aims to be a blackhat &#8220;alternative&#8221; to ChatGPT, &#8220;one that lets you do all sorts of illegal stuff and easily sell it online in the future.&#8221;<\/p>\n<p><strong>Also:&nbsp;<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/scammers-are-using-ai-to-impersonate-your-loved-ones-heres-what-to-watch-for\/\" rel=\"follow\"><strong>Scammers are using AI to impersonate your loved ones. Here&#8217;s what to watch out for<\/strong><\/a><\/p>\n<p>SlashNext gained access to the tool, described as an AI module based on the GPTJ language model. WormGPT has allegedly been trained with data sources including malware-related information &#8212; but the specific datasets remain known only to WormGPT&#8217;s author.&nbsp;<\/p>\n<p>It may be possible for WormGPT to generate malicious code, for example, or convincing phishing emails.&nbsp;<\/p>\n<\/div>\n<\/div>\n<p> <!----><\/div>\n<p> <!----> <!----><\/div>\n<div id=\"a80a7a6f-b07b-4a8f-82f3-bc04b125ca04\" class=\"c-shortcodeListicle g-outer-spacing-bottom-medium\">\n<div class=\"c-shortcodeListicle_conten\"><!----> <!----> <\/p>\n<div readability=\"18.064686737185\">\n<div class=\"c-ShortcodeContent\" readability=\"53.753458096013\">\n<p>WormGTP is described as &#8220;similar to ChatGPT but has no ethical boundaries or limitations.&#8221;<\/p>\n<p>ChatGPT has a set of rules in place to try and stop users from abusing the chatbot unethically. This includes refusing to complete tasks related to criminality and malware. However, users are constantly finding ways to circumvent these limitations.<\/p>\n<p><strong>Also:<\/strong> <a href=\"https:\/\/www.zdnet.com\/article\/gpt-4-is-getting-significantly-dumber-over-time-according-to-a-study\/\" rel=\"follow\"><strong>GPT-4 is getting significantly dumber over time, according to a study<\/strong><\/a><\/p>\n<p>The researchers were able to use WormGPT to &#8220;generate an email intended to pressure an unsuspecting account manager into paying a fraudulent invoice.&#8221; The team was surprised at how well the language model managed the task, branding the result &#8220;remarkably persuasive [and] also strategically cunning.&#8221;<\/p>\n<p>While they didn&#8217;t say if they tried the malware-writing service, it is plausible that the AI bot could &#8212; given that ChatGPT&#8217;s limitations do not exist.&nbsp;<\/p>\n<p><strong>Also:&nbsp;<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/gmail-will-help-you-write-your-emails-now-how-to-access-googles-new-ai-tool\/\" rel=\"follow\"><strong>Gmail will help you write your emails now: How to access Google&#8217;s new AI tool<\/strong><\/a><\/p>\n<p>According to a Telegram channel reportedly launched to promote the tool, posts viewed by ZDNET indicate the developer is creating a subscription model for access, ranging from $60 to $700. A channel member, &#8220;darkstux,&#8221; alleges that there are already over 1,500 users of WormGPT.<\/p>\n<\/div>\n<\/div>\n<p> <!----><\/div>\n<p> <!----> <!----><\/div>\n<figure class=\"c-shortcodeTwitterTweet\"><\/figure>\n<div id=\"f8ca6ef4-549f-46a2-841c-05565d52b726\" class=\"c-shortcodeListicle g-outer-spacing-bottom-medium\">\n<div class=\"c-shortcodeListicle_conten\"><!----> <!----> <\/p>\n<div readability=\"7.5\">\n<div class=\"c-ShortcodeContent\" readability=\"35\">\n<p>No. ChatGPT has been developed by OpenAI, a legitimate and respected organization. WormGMT is not their creation and is an example of how cybercriminals can take inspiration from advanced AI chatbots to develop their own malicious tools.&nbsp;<\/p>\n<\/div>\n<\/div>\n<p> <!----><\/div>\n<p> <!----> <!----><\/div>\n<div id=\"8665df7a-f188-4adf-a53a-1a853c605b29\" class=\"c-shortcodeListicle g-outer-spacing-bottom-medium\">\n<div class=\"c-shortcodeListicle_conten\"><!----> <!----> <\/p>\n<div readability=\"9.9305555555556\">\n<div class=\"c-ShortcodeContent\" readability=\"37.916666666667\">\n<p>Even in the hands of novices and your typical scammer, natural language models could turn basic, easily avoided phishing and BEC scams into sophisticated operations more likely to succeed. There&#8217;s no doubt that where money is to be made, cybercriminals will pursue the lead &#8212; and WormGPT is only the start of a new range of cybercriminals tools set to be traded in underground markets.&nbsp;<\/p>\n<p><strong>Also:&nbsp;<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/six-skills-you-need-to-become-an-ai-prompt-engineer\/\" rel=\"follow\"><strong>6 skills you need to become an AI prompt engineer<\/strong><\/a><\/p>\n<p>It&#8217;s also unlikely that WormGPT is the only one out there.&nbsp;<\/p>\n<\/div>\n<\/div>\n<p> <!----><\/div>\n<p> <!----> <!----><\/div>\n<div id=\"a6d8a807-5cb1-4c1a-8604-35bd75ff72fb\" class=\"c-shortcodeListicle g-outer-spacing-bottom-medium\">\n<div class=\"c-shortcodeListicle_conten\"><!----> <!----> <\/p>\n<div>\n<div class=\"c-ShortcodeContent\">\n<ul>\n<li><a href=\"https:\/\/www.europol.europa.eu\/publications-events\/publications\/chatgpt-impact-of-large-language-models-law-enforcement\" target=\"_blank\" class=\"c-regularLink\" rel=\"noopener\">Europol<\/a>: Europol said in the 2023 report, &#8220;The impact of Large Language Models on Law Enforcement,&#8221; that &#8220;it will be crucial to monitor [&#8230;] development, as dark LLMs (large language models) trained to facilitate harmful output may become a key criminal business model of the future. This poses a new challenge for law enforcement, whereby it will become easier than ever for malicious actors to perpetrate criminal activities with no necessary prior knowledge.&#8221;<\/li>\n<li><a href=\"https:\/\/www.washingtonpost.com\/technology\/2023\/07\/13\/ftc-openai-chatgpt-sam-altman-lina-khan\/\" target=\"_blank\" class=\"c-regularLink\" rel=\"noopener\">Federal Trade Commission<\/a>: The FTC is investigating ChatGPT maker OpenAI over data usage policies and inaccuracy.<\/li>\n<li><a href=\"https:\/\/www.theguardian.com\/society\/2023\/jul\/18\/ai-could-worsen-epidemic-of-child-sexual-abuse-warns-uk-agency\" target=\"_blank\" class=\"c-regularLink\" rel=\"noopener\">UK National Crime Agency<\/a>&nbsp;(NCA): The NCA warns that AI could prompt an explosion in risk to young people and abuse.<\/li>\n<li><a href=\"https:\/\/www.csoonline.com\/article\/574941\/uk-data-regulator-issues-warning-over-generative-ai-data-protection-concerns.html\" target=\"_blank\" class=\"c-regularLink\" rel=\"noopener\">UK Information Commission&#8217;s Office<\/a>&nbsp;(ICO): The ICO has reminded organizations that their AI tools are still bound by existing data protection laws.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<p> <!----><\/div>\n<p> <!----> <!----><\/div>\n<div id=\"eec86223-6800-4589-bf33-714d0231b856\" class=\"c-shortcodeListicle g-outer-spacing-bottom-medium\">\n<div class=\"c-shortcodeListicle_conten\"><!----> <!----> <\/p>\n<div readability=\"17.948514851485\">\n<div class=\"c-ShortcodeContent\" readability=\"52.213861386139\">\n<p>Not without covert tactics, but with the right prompts, many natural language models can be persuaded to particular actions and tasks.&nbsp;<\/p>\n<p><strong>Also:<\/strong> <a href=\"https:\/\/www.zdnet.com\/article\/real-time-deepfake-detection-how-intel-labs-uses-ai-to-fight-misinformation\/\" rel=\"follow\"><strong>Real-time deepfake detection: How Intel Labs uses AI to fight misinformation<\/strong><\/a><\/p>\n<p>ChatGPT, for example, <a href=\"https:\/\/www.zdnet.com\/article\/gmail-will-help-you-write-your-emails-now-how-to-access-googles-new-ai-tool\/\" rel=\"follow\">can draft professional emails<\/a>, cover letters, resumes, purchase orders, and more. This alone can remove some of the most common indicators of a phishing email: spelling mistakes, grammar issues, and secondary language problems. In itself, this alone could cause a headache for businesses attempting to detect and train their staff to recognize suspicious messages. &nbsp;<\/p>\n<p>SlashNext researchers say, &#8220;cybercriminals can use such technology to automate the creation of highly convincing fake emails, personalized to the recipient, thus increasing the chances of success for the attack.&#8221;<\/p>\n<p><strong>Also:<\/strong>&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/7-advanced-chatgpt-prompt-writing-tips-you-need-to-know\/\" rel=\"follow\"><strong>7 advanced ChatGPT prompt-writing tips you need to know<\/strong><\/a><\/p>\n<p>For step-by-step instructions on using ChatGPT for legitimate purposes, check out ZDNET&#8217;s guide on&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/how-to-use-chatgpt\/\" rel=\"follow\">how to start using ChatGPT<\/a>.&nbsp;<\/p>\n<\/div>\n<\/div>\n<p> <!----><\/div>\n<p> <!----> <!----><\/div>\n<div id=\"8c06d64b-ae4b-406c-bc7c-e9edc43e02b1\" class=\"c-shortcodeListicle g-outer-spacing-bottom-medium\">\n<div class=\"c-shortcodeListicle_conten\"><!----> <!----> <\/p>\n<div readability=\"7.5\">\n<div class=\"c-ShortcodeContent\" readability=\"35\">\n<p>ChatGPT is free to use. The tool can be used to answer general queries, write content and code, or generate prompts for everything from creative stories to marketing projects.&nbsp;<\/p>\n<\/div>\n<\/div>\n<p> <!----><\/div>\n<p> <!----> <!----><\/div>\n<p>There is a subscription option,&nbsp;<span class=\"c-commerceLink\"><a href=\"https:\/\/openai.com\/blog\/chatgpt-plus\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"><span>ChatGPT Plus<\/span><!----><\/a><\/span>, which users can sign up for. The subscription costs $20 per month and provides users with access to ChatGPT during peak times and otherwise, faster response times, and priority access to improvements and fixes.<\/p>\n<p><strong>Also<\/strong>:&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/how-to-access-install-and-use-ai-chatgpt-4-plugins\/\" rel=\"follow\"><strong>How to access, install, and use AI ChatGPT-4 plugins (and why you should)<\/strong><\/a><\/p>\n<h2><\/h2>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/wormgpt-what-to-know-about-chatgpts-malicious-cousin\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Should we be concerned about the cybercriminal&#8217;s answer to ChatGPT? Here&#8217;s everything you need to know.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-52889","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>WormGPT: What to know about ChatGPT&#039;s malicious cousin 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/wormgpt-what-to-know-about-chatgpts-malicious-cousin\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"WormGPT: What to know about ChatGPT&#039;s malicious cousin 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/wormgpt-what-to-know-about-chatgpts-malicious-cousin\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-20T13:41:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/3cb9d26875688aece1af950e23b50617876e806d\/2023\/07\/19\/66cc3eef-0122-4e71-8c91-e73f00db6153\/screenshot-2023-07-19-111112worm.jpg?auto=webp&amp;width=1280\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wormgpt-what-to-know-about-chatgpts-malicious-cousin\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wormgpt-what-to-know-about-chatgpts-malicious-cousin\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"WormGPT: What to know about ChatGPT&#8217;s malicious cousin\",\"datePublished\":\"2023-07-20T13:41:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wormgpt-what-to-know-about-chatgpts-malicious-cousin\\\/\"},\"wordCount\":1102,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wormgpt-what-to-know-about-chatgpts-malicious-cousin\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/3cb9d26875688aece1af950e23b50617876e806d\\\/2023\\\/07\\\/19\\\/66cc3eef-0122-4e71-8c91-e73f00db6153\\\/screenshot-2023-07-19-111112worm.jpg?auto=webp&amp;width=1280\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wormgpt-what-to-know-about-chatgpts-malicious-cousin\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wormgpt-what-to-know-about-chatgpts-malicious-cousin\\\/\",\"name\":\"WormGPT: What to know about ChatGPT's malicious cousin 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wormgpt-what-to-know-about-chatgpts-malicious-cousin\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wormgpt-what-to-know-about-chatgpts-malicious-cousin\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/3cb9d26875688aece1af950e23b50617876e806d\\\/2023\\\/07\\\/19\\\/66cc3eef-0122-4e71-8c91-e73f00db6153\\\/screenshot-2023-07-19-111112worm.jpg?auto=webp&amp;width=1280\",\"datePublished\":\"2023-07-20T13:41:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wormgpt-what-to-know-about-chatgpts-malicious-cousin\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wormgpt-what-to-know-about-chatgpts-malicious-cousin\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wormgpt-what-to-know-about-chatgpts-malicious-cousin\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/3cb9d26875688aece1af950e23b50617876e806d\\\/2023\\\/07\\\/19\\\/66cc3eef-0122-4e71-8c91-e73f00db6153\\\/screenshot-2023-07-19-111112worm.jpg?auto=webp&amp;width=1280\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/3cb9d26875688aece1af950e23b50617876e806d\\\/2023\\\/07\\\/19\\\/66cc3eef-0122-4e71-8c91-e73f00db6153\\\/screenshot-2023-07-19-111112worm.jpg?auto=webp&amp;width=1280\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wormgpt-what-to-know-about-chatgpts-malicious-cousin\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"WormGPT: What to know about ChatGPT&#8217;s malicious cousin\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"WormGPT: What to know about ChatGPT's malicious cousin 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/wormgpt-what-to-know-about-chatgpts-malicious-cousin\/","og_locale":"en_US","og_type":"article","og_title":"WormGPT: What to know about ChatGPT's malicious cousin 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/wormgpt-what-to-know-about-chatgpts-malicious-cousin\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-07-20T13:41:00+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/3cb9d26875688aece1af950e23b50617876e806d\/2023\/07\/19\/66cc3eef-0122-4e71-8c91-e73f00db6153\/screenshot-2023-07-19-111112worm.jpg?auto=webp&amp;width=1280","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/wormgpt-what-to-know-about-chatgpts-malicious-cousin\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/wormgpt-what-to-know-about-chatgpts-malicious-cousin\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"WormGPT: What to know about ChatGPT&#8217;s malicious cousin","datePublished":"2023-07-20T13:41:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/wormgpt-what-to-know-about-chatgpts-malicious-cousin\/"},"wordCount":1102,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/wormgpt-what-to-know-about-chatgpts-malicious-cousin\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/3cb9d26875688aece1af950e23b50617876e806d\/2023\/07\/19\/66cc3eef-0122-4e71-8c91-e73f00db6153\/screenshot-2023-07-19-111112worm.jpg?auto=webp&amp;width=1280","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/wormgpt-what-to-know-about-chatgpts-malicious-cousin\/","url":"https:\/\/www.threatshub.org\/blog\/wormgpt-what-to-know-about-chatgpts-malicious-cousin\/","name":"WormGPT: What to know about ChatGPT's malicious cousin 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/wormgpt-what-to-know-about-chatgpts-malicious-cousin\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/wormgpt-what-to-know-about-chatgpts-malicious-cousin\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/3cb9d26875688aece1af950e23b50617876e806d\/2023\/07\/19\/66cc3eef-0122-4e71-8c91-e73f00db6153\/screenshot-2023-07-19-111112worm.jpg?auto=webp&amp;width=1280","datePublished":"2023-07-20T13:41:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/wormgpt-what-to-know-about-chatgpts-malicious-cousin\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/wormgpt-what-to-know-about-chatgpts-malicious-cousin\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/wormgpt-what-to-know-about-chatgpts-malicious-cousin\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/3cb9d26875688aece1af950e23b50617876e806d\/2023\/07\/19\/66cc3eef-0122-4e71-8c91-e73f00db6153\/screenshot-2023-07-19-111112worm.jpg?auto=webp&amp;width=1280","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/3cb9d26875688aece1af950e23b50617876e806d\/2023\/07\/19\/66cc3eef-0122-4e71-8c91-e73f00db6153\/screenshot-2023-07-19-111112worm.jpg?auto=webp&amp;width=1280"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/wormgpt-what-to-know-about-chatgpts-malicious-cousin\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"WormGPT: What to know about ChatGPT&#8217;s malicious cousin"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/52889","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=52889"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/52889\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=52889"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=52889"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=52889"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}