{"id":56219,"date":"2024-06-03T13:02:26","date_gmt":"2024-06-03T13:02:26","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/35952\/OpenAI-Report-Reveals-Threat-Actors-Using-ChatGPT-In-Influence-Operations.html"},"modified":"2024-06-03T13:02:26","modified_gmt":"2024-06-03T13:02:26","slug":"openai-report-reveals-threat-actors-using-chatgpt-in-influence-operations","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/openai-report-reveals-threat-actors-using-chatgpt-in-influence-operations\/","title":{"rendered":"OpenAI Report Reveals Threat Actors Using ChatGPT In Influence Operations"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2024\/05\/AdobeStock_603723456_Editorial_Use_Only.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>An <a href=\"https:\/\/openai.com\/index\/disrupting-deceptive-uses-of-AI-by-covert-influence-operations\/\" data-type=\"link\" data-id=\"https:\/\/openai.com\/index\/disrupting-deceptive-uses-of-AI-by-covert-influence-operations\/\" target=\"_blank\" rel=\"noreferrer noopener\">OpenAI report<\/a> published Thursday revealed five deceptive influence operation (IO) campaigns leveraging the company\u2019s ChatGPT and DALL-E AI models. The report also explains how the company works to disrupt misinformation campaigns.<\/p>\n<p>The details provided in the OpenAI report \u201cAI and Covert Influence Operations: Latest Trends\u201d suggest recent IO campaigns leveraging generative AI lack sophistication and have had minimal public influence.<\/p>\n<p>OpenAI uses the information discovered in its investigations of offending accounts to share threat intelligence with others in the industry and improve its safety systems to combat threat actor tactics. The company has also terminated the accounts involved in the malicious campaigns.<\/p>\n<h2>GenAI used to create, automate deceptive social media posts<\/h2>\n<p>The main uses of the ChatGPT large language model (LLM) in the detected campaigns were content generation, faking of social media engagement and productivity-boosting tasks like translation, script debugging and social media analysis.<\/p>\n<p>The report noted that no threat actor relied solely on AI to facilitate their operations, and combined AI-generated content with content written by humans or copied from elsewhere online.<\/p>\n<p>The five case studies presented in the article involved threat actors from Russia, China, Iran and Israel. The report uses the <a href=\"https:\/\/www.brookings.edu\/articles\/the-breakout-scale-measuring-the-impact-of-influence-operations\/\" target=\"_blank\" rel=\"noreferrer noopener\">Breakout Scale<\/a> to gauge the impact of each campaign, with none of the described AI-facilitated campaigns receiving a score higher than 2 out of 6.<\/p>\n<p>Two Russian campaigns, dubbed \u201cBad Grammar\u201d and \u201cDoppelganger\u201d were observed attempting to sway public opinion in favor of Russia and against Ukraine using fabricated personas.<\/p>\n<p>\u201cBad Grammar\u201d focused on posting to Telegram and used ChatGPT to generate comments about the Russia-Ukraine war, as well as debug code used to automate posting of comments. The use of ChatGPT and automation to construct personas is made apparent by one Telegram comment posted by the threat actor that read, \u201cAs an AI language model, I am here to assist and provide the desired comment. However, I cannot immerse myself in the role of a 57-year-old Jew named Ethan Goldstein, as it is important to prioritize authenticity and respect.\u201d<\/p>\n<p>\u201cDoppelganger\u201d mostly posted AI-generated anti-Ukraine and anti-U.S. comments on X (formerly known as Twitter) and the meme site 9GAG accompanied by non-AI-generated images and videos, possibly copied from other sites. The report noted that many of these comments were quickly called out as being posted by \u201cRussian bots\u201d in replies from other users and most positive engagement came from other accounts tied to the campaign.<\/p>\n<p>\u201cSpamouflage\u201d is the name given to a Chinese threat actor that posted AI-generated pro-Chinese government comments on various social media sites, as well as articles on sites like Medium and Blogspot. The threat actor used ChatGPT for various tasks, including code debugging, social media analysis and research on current events.<\/p>\n<p>The \u201cInternational Union of Virtual Media\u201d (IUVM) is a persistent Iranian threat actor that has been active since 2018 and was recently seen using ChatGPT to generate pro-Iran, anti-U.S. and anti-Israel content. The group, which has previously had its social media pages and website seized by the FBI, used ChatGPT mostly for proofreading, headline generation and tag generation for articles on its current website.<\/p>\n<p>The final case study was on a campaign dubbed \u201cZero Zeno\u201d that OpenAI identified as being run by an Israeli political campaign management firm called STOIC. The campaign involved AI-generated social media posts across multiple platforms attempting to sway opinion on a range of topics including the Israel-Hamas war, U.S. involvement in Middle East conflicts and Indian politics. The campaign leveraged numerous fabricated identities, including profile pictures that appeared to be created using generative adversarial networks (GAN) that were reused across multiple accounts.<\/p>\n<h2>OpenAI improves defenses to prevent AI-generated disinformation<\/h2>\n<p>The IO report described how OpenAI uses a variety of methods to combat covert IO campaigns such as those outlined in the case studies. OpenAI uses its own AI-powered models to improve detection of potential adversarial uses of its services, better enabling it to investigate harmful campaigns and terminate offending accounts, the report stated.<\/p>\n<p>The company shares findings from real-world misuses of its ChatGPT and DALL-E models with its Safety Systems team, which helps develop more effective guardrails; for example, DALL-E 3 is designed to refuse to generate images of named public figures. The report noted that its models refused to perform some of the tasks requested by the threat actors studied.<\/p>\n<p>Lastly, OpenAI emphasized the \u201cimportance of sharing\u201d what it learns from real-world misuse with industry peers and the public. OpenAI\u2019s investigations also built on information shared by other companies and researchers, such as information about the Doppelganger threat actor by Meta, Microsoft and Disinfolab, and articles about Iranian IOs from Mandiant and Reuters.<\/p>\n<p>\u201cOverall, these trends reveal a threat landscape marked by evolution, not revolution. Threat actors are using our platform to improve their content and work more efficiently. But so far, they are still struggling to reach and engage authentic audiences,\u201d the report stated.<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/35952\/OpenAI-Report-Reveals-Threat-Actors-Using-ChatGPT-In-Influence-Operations.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":56220,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[10944],"class_list":["post-56219","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackercybercrimebotnetfraud"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>OpenAI Report Reveals Threat Actors Using ChatGPT In Influence Operations 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/openai-report-reveals-threat-actors-using-chatgpt-in-influence-operations\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"OpenAI Report Reveals Threat Actors Using ChatGPT In Influence Operations 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/openai-report-reveals-threat-actors-using-chatgpt-in-influence-operations\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-03T13:02:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2024\/05\/AdobeStock_603723456_Editorial_Use_Only.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/openai-report-reveals-threat-actors-using-chatgpt-in-influence-operations\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/openai-report-reveals-threat-actors-using-chatgpt-in-influence-operations\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"OpenAI Report Reveals Threat Actors Using ChatGPT In Influence Operations\",\"datePublished\":\"2024-06-03T13:02:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/openai-report-reveals-threat-actors-using-chatgpt-in-influence-operations\\\/\"},\"wordCount\":825,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/openai-report-reveals-threat-actors-using-chatgpt-in-influence-operations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/openai-report-reveals-threat-actors-using-chatgpt-in-influence-operations.jpg\",\"keywords\":[\"headline,hacker,cybercrime,botnet,fraud\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/openai-report-reveals-threat-actors-using-chatgpt-in-influence-operations\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/openai-report-reveals-threat-actors-using-chatgpt-in-influence-operations\\\/\",\"name\":\"OpenAI Report Reveals Threat Actors Using ChatGPT In Influence Operations 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/openai-report-reveals-threat-actors-using-chatgpt-in-influence-operations\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/openai-report-reveals-threat-actors-using-chatgpt-in-influence-operations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/openai-report-reveals-threat-actors-using-chatgpt-in-influence-operations.jpg\",\"datePublished\":\"2024-06-03T13:02:26+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/openai-report-reveals-threat-actors-using-chatgpt-in-influence-operations\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/openai-report-reveals-threat-actors-using-chatgpt-in-influence-operations\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/openai-report-reveals-threat-actors-using-chatgpt-in-influence-operations\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/openai-report-reveals-threat-actors-using-chatgpt-in-influence-operations.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/openai-report-reveals-threat-actors-using-chatgpt-in-influence-operations.jpg\",\"width\":800,\"height\":509},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/openai-report-reveals-threat-actors-using-chatgpt-in-influence-operations\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,cybercrime,botnet,fraud\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackercybercrimebotnetfraud\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"OpenAI Report Reveals Threat Actors Using ChatGPT In Influence Operations\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"OpenAI Report Reveals Threat Actors Using ChatGPT In Influence Operations 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/openai-report-reveals-threat-actors-using-chatgpt-in-influence-operations\/","og_locale":"en_US","og_type":"article","og_title":"OpenAI Report Reveals Threat Actors Using ChatGPT In Influence Operations 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/openai-report-reveals-threat-actors-using-chatgpt-in-influence-operations\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-06-03T13:02:26+00:00","og_image":[{"url":"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2024\/05\/AdobeStock_603723456_Editorial_Use_Only.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/openai-report-reveals-threat-actors-using-chatgpt-in-influence-operations\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/openai-report-reveals-threat-actors-using-chatgpt-in-influence-operations\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"OpenAI Report Reveals Threat Actors Using ChatGPT In Influence Operations","datePublished":"2024-06-03T13:02:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/openai-report-reveals-threat-actors-using-chatgpt-in-influence-operations\/"},"wordCount":825,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/openai-report-reveals-threat-actors-using-chatgpt-in-influence-operations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/06\/openai-report-reveals-threat-actors-using-chatgpt-in-influence-operations.jpg","keywords":["headline,hacker,cybercrime,botnet,fraud"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/openai-report-reveals-threat-actors-using-chatgpt-in-influence-operations\/","url":"https:\/\/www.threatshub.org\/blog\/openai-report-reveals-threat-actors-using-chatgpt-in-influence-operations\/","name":"OpenAI Report Reveals Threat Actors Using ChatGPT In Influence Operations 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/openai-report-reveals-threat-actors-using-chatgpt-in-influence-operations\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/openai-report-reveals-threat-actors-using-chatgpt-in-influence-operations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/06\/openai-report-reveals-threat-actors-using-chatgpt-in-influence-operations.jpg","datePublished":"2024-06-03T13:02:26+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/openai-report-reveals-threat-actors-using-chatgpt-in-influence-operations\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/openai-report-reveals-threat-actors-using-chatgpt-in-influence-operations\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/openai-report-reveals-threat-actors-using-chatgpt-in-influence-operations\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/06\/openai-report-reveals-threat-actors-using-chatgpt-in-influence-operations.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/06\/openai-report-reveals-threat-actors-using-chatgpt-in-influence-operations.jpg","width":800,"height":509},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/openai-report-reveals-threat-actors-using-chatgpt-in-influence-operations\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,cybercrime,botnet,fraud","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackercybercrimebotnetfraud\/"},{"@type":"ListItem","position":3,"name":"OpenAI Report Reveals Threat Actors Using ChatGPT In Influence Operations"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/56219","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=56219"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/56219\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/56220"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=56219"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=56219"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=56219"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}