{"id":26495,"date":"2023-02-10T14:30:43","date_gmt":"2023-02-10T14:30:43","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=26495"},"modified":"2023-02-10T14:36:10","modified_gmt":"2023-02-10T14:36:10","slug":"using-chatgpt-for-malicious-code-analysis","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/trends\/using-chatgpt-for-malicious-code-analysis\/","title":{"rendered":"Cybersecurity Analysts Using ChatGPT for Malicious Code Analysis, Predicting Threats"},"content":{"rendered":"<p>ChatGPT has raised alarm among cybersecurity researchers for its unnerving ability in composing everything from sophisticated malware to phishing lures \u2013 but it&#8217;s important to keep in mind that the tool can help support cybersecurity defenses as well.<\/p>\n<p>Shiran Grinberg, director of research and cyber operations at Cynet, told <em>eSecurity Planet<\/em> that too many companies are deterred by ChatGPT, rather than encouraging employees to leverage its functionality. &#8220;After all, I doubt you&#8217;ll find a manager today who won&#8217;t encourage his employees to use Google when searching for information, unless you are a citizen of China, Russia, North Korea, or Iran,&#8221; he said.<\/p>\n<p><strong>Also read:<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/www.esecurityplanet.com\/trends\/chatgpt-cybersecurity\/\" target=\"_blank\" rel=\"noopener\">ChatGPT: A Brave New World for Cybersecurity<\/a><\/li>\n<li><a href=\"https:\/\/www.esecurityplanet.com\/threats\/chatgpt-malware\/\" target=\"_blank\" rel=\"noopener\">ChatGPT&#8217;s Dark Side: An Endless Supply of Polymorphic Malware<\/a><\/li>\n<\/ul>\n<h2>ChatGPT&#8217;s Good Security Uses<\/h2>\n<p>And ChatGPT&#8217;s security benefits, Grinberg said, are significant. &#8220;Let&#8217;s assume you have a team of analysts and you encourage them to use ChatGPT in order to come to conclusions and look up all kinds of information,&#8221; he said. &#8220;You can actually put a piece of code into ChatGPT and ask it to identify the malicious part in it \u2013 so indeed, it can aid a lot.&#8221;<\/p>\n<p>Analysts, responders, and investigators, Grinberg said, can use ChatGPT to assemble a detailed incident response report, aligned with SANS methodology, in minutes. They can then fill the report with analysis of malicious code, scripts and different malware functions, &#8220;all done with the help of ChatGPT,&#8221; he said.<\/p>\n<p>Grinberg said Cynet has already started leveraging ChatGPT to future-proof its defenses. &#8220;We are able to take a machine learning model and to turn it into an AI mechanism which basically learns many types of legitimate files versus many malicious files,&#8221; he said. &#8220;By using huge amounts of data, we can conclude which future files would be malicious versus legitimate.&#8221;<\/p>\n<p>However, one security researcher &#8211; Chris Anley,\u00a0chief scientist at NCC Group &#8211; cautions that using ChatGPT for security code analysis <a href=\"https:\/\/research.nccgroup.com\/2023\/02\/09\/security-code-review-with-chatgpt\/\" target=\"_blank\" rel=\"noopener\">can result in inaccuracies<\/a> and requires expert review.<\/p>\n<p>As Anley noted in one code analysis example, &#8220;this output is stunning at first sight, but has some problems that require human understanding and careful revision for the output to be trusted.&#8221;<\/p>\n<h2>Malicious Uses<\/h2>\n<p>On the other hand, the tool can help malicious users generate threats that would previously have been beyond their abilities. &#8220;The main threat lies in the fact that ChatGPT makes life easier and simpler for threat actors in terms of creating an attack with little previous knowledge of technical capabilities,&#8221; Grinberg said.<\/p>\n<p>It&#8217;s relatively easy, he said, for threat actors to leverage ChatGPT to develop malicious code. Even though ChatGPT will prompt you if you are trying to do something illegal, Grinberg said, &#8220;you can trick it by playing scenarios and it will give you code that with a few tweaks can be malicious.&#8221;<\/p>\n<p>A group on Reddit, for example, has been working on jailbreaks that <a href=\"https:\/\/www.reddit.com\/r\/ChatGPT\/comments\/10tevu1\/new_jailbreak_proudly_unveiling_the_tried_and\/\" target=\"_blank\" rel=\"noopener\">bypass ChatGPT controls<\/a>.<\/p>\n<p>To some degree, bringing advanced hacking techniques to the less technical is not a new issue \u2013 across the board, the average age of attackers is decreasing as they find the barriers to entry falling away. &#8220;There are all kinds of available services today, like malware-as-a-service, <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-as-a-service-raas-ttp-protections\/\" target=\"_blank\" rel=\"noopener\">ransomware-as-a-service<\/a>, initial-access-as-a-service, and now ChatGPT, which allows the expert hacker to all of a sudden be able to write malicious code and carry out attacks,&#8221; Grinberg said.<\/p>\n<h2>ChatGPT Security Tools Coming?<\/h2>\n<p>It&#8217;s also worth noting, Grinberg said, that new tools are increasingly available to help determine whether content was generated by AI \u2013 examples include the <a href=\"https:\/\/platform.openai.com\/ai-text-classifier\" target=\"_blank\" rel=\"noopener\">OpenAI AI Text Classifier<\/a>, the <a href=\"https:\/\/contentatscale.ai\/ai-content-detector\/\" target=\"_blank\" rel=\"noopener\">Content at Scale AI Detector<\/a>, and the <a href=\"https:\/\/openai-openai-detector.hf.space\/\" target=\"_blank\" rel=\"noopener\">GPT-2 Output Detector<\/a>. &#8220;My estimation is that we will see additional tools and solutions aimed at the detection of malicious content crafted by AI models,&#8221; he said.<\/p>\n<p>Grinberg said the broader lesson is simple: don&#8217;t ignore the threats. &#8220;Work on empowering your employees, encourage them to interact with this new technology, intertwine it with <a href=\"https:\/\/www.esecurityplanet.com\/products\/cybersecurity-training\/\">cyber security awareness training<\/a>,&#8221; he said. &#8220;It will be fun, engaging, and memorable.&#8221;<\/p>\n<p>See the <a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/\">Top Endpoint Detection and Response (EDR) tools<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d700ed16e42-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d700ed16e42\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d700ed16e42\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d700ed16e42\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d700ed16e42\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d700ed16e42\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d700ed16e42\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>ChatGPT has raised alarm among cybersecurity researchers for its unnerving ability in composing everything from sophisticated malware to phishing lures \u2013 but it&#8217;s important to keep in mind that the tool can help support cybersecurity defenses as well. Shiran Grinberg, director of research and cyber operations at Cynet, told eSecurity Planet that too many companies [&hellip;]<\/p>\n","protected":false},"author":166,"featured_media":26497,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[16],"tags":[31986,3790,1146],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[394,378,31789,31790,31782,392],"class_list":["post-26495","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trends","tag-ai-security","tag-cybersecurity","tag-malware","b2b_audience-awareness-and-consideration","b2b_product-email-security","b2b_product-endpoint-security","b2b_product-phishing-and-spear-phishing","b2b_product-ransomware","b2b_product-threat-intelligence","b2b_product-web-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity Analysts Using ChatGPT for Malicious Code Analysis, Predicting Threats | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"ChatGPT isn&#039;t all bad news for cybersecurity - analysts are using it to identify malicious code and predict threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/trends\/using-chatgpt-for-malicious-code-analysis\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Analysts Using ChatGPT for Malicious Code Analysis, Predicting Threats | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"ChatGPT isn&#039;t all bad news for cybersecurity - analysts are using it to identify malicious code and predict threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/trends\/using-chatgpt-for-malicious-code-analysis\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-10T14:30:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-10T14:36:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/chatgpt-code.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"958\" \/>\n\t<meta property=\"og:image:height\" content=\"515\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jeff Goldman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeff Goldman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/using-chatgpt-for-malicious-code-analysis\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/using-chatgpt-for-malicious-code-analysis\/\"},\"author\":{\"name\":\"Jeff Goldman\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795\"},\"headline\":\"Cybersecurity Analysts Using ChatGPT for Malicious Code Analysis, Predicting Threats\",\"datePublished\":\"2023-02-10T14:30:43+00:00\",\"dateModified\":\"2023-02-10T14:36:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/using-chatgpt-for-malicious-code-analysis\/\"},\"wordCount\":685,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/using-chatgpt-for-malicious-code-analysis\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/chatgpt-code.jpg\",\"keywords\":[\"AI security\",\"cybersecurity\",\"malware\"],\"articleSection\":[\"Trends\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/using-chatgpt-for-malicious-code-analysis\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/trends\/using-chatgpt-for-malicious-code-analysis\/\",\"name\":\"Cybersecurity Analysts Using ChatGPT for Malicious Code Analysis, Predicting Threats | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/using-chatgpt-for-malicious-code-analysis\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/using-chatgpt-for-malicious-code-analysis\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/chatgpt-code.jpg\",\"datePublished\":\"2023-02-10T14:30:43+00:00\",\"dateModified\":\"2023-02-10T14:36:10+00:00\",\"description\":\"ChatGPT isn't all bad news for cybersecurity - analysts are using it to identify malicious code and predict threats.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/using-chatgpt-for-malicious-code-analysis\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/trends\/using-chatgpt-for-malicious-code-analysis\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/using-chatgpt-for-malicious-code-analysis\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/chatgpt-code.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/chatgpt-code.jpg\",\"width\":958,\"height\":515},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/using-chatgpt-for-malicious-code-analysis\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Analysts Using ChatGPT for Malicious Code Analysis, Predicting Threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795\",\"name\":\"Jeff Goldman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg\",\"caption\":\"Jeff Goldman\"},\"description\":\"eSecurity Planet contributor Jeff Goldman has been a technology journalist for more than 20 years and an eSecurity Planet contributor since 2009. He's also written extensively about wireless and broadband infrastructure and semiconductor engineering. He started his career at MTV, but soon decided that technology writing was a more promising path.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jeff-goldman\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Analysts Using ChatGPT for Malicious Code Analysis, Predicting Threats | eSecurity Planet","description":"ChatGPT isn't all bad news for cybersecurity - analysts are using it to identify malicious code and predict threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/trends\/using-chatgpt-for-malicious-code-analysis\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Analysts Using ChatGPT for Malicious Code Analysis, Predicting Threats | eSecurity Planet","og_description":"ChatGPT isn't all bad news for cybersecurity - analysts are using it to identify malicious code and predict threats.","og_url":"https:\/\/www.esecurityplanet.com\/trends\/using-chatgpt-for-malicious-code-analysis\/","og_site_name":"eSecurity Planet","article_published_time":"2023-02-10T14:30:43+00:00","article_modified_time":"2023-02-10T14:36:10+00:00","og_image":[{"width":958,"height":515,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/chatgpt-code.jpg","type":"image\/jpeg"}],"author":"Jeff Goldman","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jeff Goldman","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/trends\/using-chatgpt-for-malicious-code-analysis\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/using-chatgpt-for-malicious-code-analysis\/"},"author":{"name":"Jeff Goldman","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795"},"headline":"Cybersecurity Analysts Using ChatGPT for Malicious Code Analysis, Predicting Threats","datePublished":"2023-02-10T14:30:43+00:00","dateModified":"2023-02-10T14:36:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/using-chatgpt-for-malicious-code-analysis\/"},"wordCount":685,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/using-chatgpt-for-malicious-code-analysis\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/chatgpt-code.jpg","keywords":["AI security","cybersecurity","malware"],"articleSection":["Trends"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/trends\/using-chatgpt-for-malicious-code-analysis\/","url":"https:\/\/www.esecurityplanet.com\/trends\/using-chatgpt-for-malicious-code-analysis\/","name":"Cybersecurity Analysts Using ChatGPT for Malicious Code Analysis, Predicting Threats | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/using-chatgpt-for-malicious-code-analysis\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/using-chatgpt-for-malicious-code-analysis\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/chatgpt-code.jpg","datePublished":"2023-02-10T14:30:43+00:00","dateModified":"2023-02-10T14:36:10+00:00","description":"ChatGPT isn't all bad news for cybersecurity - analysts are using it to identify malicious code and predict threats.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/using-chatgpt-for-malicious-code-analysis\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/trends\/using-chatgpt-for-malicious-code-analysis\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/trends\/using-chatgpt-for-malicious-code-analysis\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/chatgpt-code.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/chatgpt-code.jpg","width":958,"height":515},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/trends\/using-chatgpt-for-malicious-code-analysis\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Analysts Using ChatGPT for Malicious Code Analysis, Predicting Threats"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795","name":"Jeff Goldman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg","caption":"Jeff Goldman"},"description":"eSecurity Planet contributor Jeff Goldman has been a technology journalist for more than 20 years and an eSecurity Planet contributor since 2009. He's also written extensively about wireless and broadband infrastructure and semiconductor engineering. He started his career at MTV, but soon decided that technology writing was a more promising path.","url":"https:\/\/www.esecurityplanet.com\/author\/jeff-goldman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/26495"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/166"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=26495"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/26495\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/26497"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=26495"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=26495"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=26495"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=26495"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=26495"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=26495"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}