{"id":171872,"date":"2023-07-28T01:46:25","date_gmt":"2023-07-28T08:46:25","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=171872"},"modified":"2024-11-20T21:36:43","modified_gmt":"2024-11-21T05:36:43","slug":"ai-in-the-wild-malicious-applications-of-mainstream-ai-tools","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/ai-in-the-wild-malicious-applications-of-mainstream-ai-tools\/","title":{"rendered":"AI in the Wild: Malicious Applications of Mainstream AI Tools"},"content":{"rendered":"<p><span data-contrast=\"none\">It\u2019s not all funny limericks, bizarre portraits, and hilarious viral skits. <\/span><a href=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/chatgpt-a-scammers-newest-tool\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">ChatGPT<\/span><\/a><span data-contrast=\"none\">, Bard, DALL-E, Craiyon, Voice.ai, and a whole host of other mainstream artificial intelligence tools are great for whiling away an afternoon or helping you with your latest school or work assignment; however, cybercriminals are bending AI tools like these to aid in their schemes, adding a whole new dimension to phishing, vishing, malware, and social engineering.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Here are some recent reports of AI\u2019s use in scams plus a few pointers that might tip you off should any of these happen to you.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"none\">1. AI Voice Scams<\/span><\/b><\/h2>\n<p><a href=\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/those-annoying-scam-calls-and-texts-how-to-fight-back-against-vishing-and-smishing\/\"><span data-contrast=\"none\">Vishing<\/span><\/a><span data-contrast=\"none\"> \u2013 or phishing over the phone \u2013 is not a new scheme; however, AI voice mimickers are making these scamming phone calls more believable than ever. In Arizona, a fake kidnapping phone call caused several minutes of panic for one family, as a mother received a demand for ransom to release her alleged kidnapped daughter. On the phone, the mother heard a voice that sounded exactly like her child\u2019s, but it turned out to be an AI-generated facsimile.\u00a0\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">In reality, the daughter was not kidnapped. She was safe and sound. The family didn\u2019t lose any money because they did the right thing: They contacted law enforcement and kept the scammer on the phone while they located the daughter.<\/span><span data-contrast=\"none\">1<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Imposter scams accounted for a loss of $2.6 billion in the U.S. in 2022. Emerging AI scams could increase that staggering total. Globally, about 25% of people have either experienced an AI voice scam or know someone who has, according to <\/span><a href=\"https:\/\/mcas-proxyweb.mcas.ms\/certificate-checker?login=false&amp;originalUrl=https%3A%2F%2Fmedia.mcafeeassets.com.mcas.ms%2Fcontent%2Fdam%2Fnpcld%2Fecommerce%2Fen-us%2Fresources%2Fcybersecurity%2Fartificial-intelligence%2Frp-beware-the-artificial-impostor-report.pdf%3FMcasTsid%3D20892&amp;McasCSRF=b6928ee9d9a54a4ce95fa03a5e8cc3311a3d0f56dc5d94994f9113bae2a5a1fc\"><span data-contrast=\"none\">McAfee\u2019s Beware the Artificial Imposter report<\/span><\/a><span data-contrast=\"none\">. Additionally, the study discovered that 77% of voice scam targets lost money as a result.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"none\">How to hear the difference<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"none\">No doubt about it, it\u2019s frightening to hear a loved one in distress, but try to stay as calm as possible if you receive a phone call claiming to be someone in trouble. Do your best to really listen to the \u201cvoice\u201d of your loved one. AI voice technology is incredible, but there are still some kinks in the technology. For example, does the voice have unnatural hitches? Do words cut off just a little too early? Does the tone of certain words not quite match your loved one\u2019s accent? To pick up on these small details, a level head is necessary.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">What you can do as a family today to avoid falling for an AI vishing scam is to agree on a family password. This can be an obscure word or phrase that is meaningful to you. Keep this password to yourselves and never post about it on social media. This way, if a scammer ever calls you claiming to have or be a family member, this password could determine a fake emergency from a real one.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"none\">2. Deepfake Ransom and Fake Advertisements<\/span><\/b><\/h2>\n<p><a href=\"https:\/\/mcas-proxyweb.mcas.ms\/certificate-checker?login=false&amp;originalUrl=https%3A%2F%2Fwww.mcafee.com.mcas.ms%2Fblogs%2Fprivacy-identity-protection%2Fai-in-the-hands-of-cybercriminals-how-to-spot-fake-art-and-deepfakes%2F%3FMcasTsid%3D20892&amp;McasCSRF=b6928ee9d9a54a4ce95fa03a5e8cc3311a3d0f56dc5d94994f9113bae2a5a1fc\"><span data-contrast=\"none\">Deepfake<\/span><\/a><span data-contrast=\"none\">, or the digital manipulation of an authentic image, video, or audio clip, is an AI capability that unsettles a lot of people. It challenges the long-held axiom that \u201cseeing is believing.\u201d If you can\u2019t quite believe what you see, then what\u2019s real? What\u2019s not?<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">The FBI is warning the public against a new scheme where cybercriminals are editing explicit footage and then blackmailing innocent people into sending money or gift cards in exchange for not posting the compromising content.<\/span><span data-contrast=\"none\">2<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Deepfake technology was also at the center of an incident involving a fake ad. A scammer created a fake ad depicting Martin Lewis, a trusted finance expert, advocating for an investment venture. The Facebook ad attempted to add legitimacy to its nefarious endeavor by including the deepfaked Lewis.<\/span><span data-contrast=\"none\">3<\/span><span data-contrast=\"none\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"none\">How to respond to ransom demands and questionable online ads<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"none\">No response is the best response to a ransom demand. You\u2019re dealing with a criminal. Who\u2019s to say they won\u2019t release their fake documents even if you give in to the ransom? Involve law enforcement as soon as a scammer approaches you, and they can help you resolve the issue.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Just because a reputable social media platform hosts an advertisement doesn\u2019t mean that the advertiser is a legitimate business. Before buying anything or investing your money with a business you found through an advertisement, conduct your own background research on the company. All it takes is five minutes to look up its Better Business Bureau rating and other online reviews to determine if the company is reputable.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">To identify a deepfake video or image, check for inconsistent shadows and lighting, face distortions, and people\u2019s hands. That\u2019s where you\u2019ll most likely spot small details that aren\u2019t quite right. Like AI voices, deepfake technology is often accurate, but it\u2019s not perfect. Alternatively, try McAfee&#8217;s <a href=\"https:\/\/www.mcafee.com\/ai\/deepfake-detector\/\">Deepfake Detector<\/a>, which flags AI-generated audio within seconds.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"none\">3. AI-generated Malware and Phishing Emails<\/span><\/b><\/h2>\n<p><span data-contrast=\"none\">Content generation tools have some safeguards in place to prevent them from creating text that could be used illegally; however, some cybercriminals have found ways around those rules and are using ChatGPT and Bard to assist in their malware and phishing operations. For example, if a criminal asked ChatGPT to write a key-logging malware, it would refuse. But if they rephrased and asked it to compose code that captures keystrokes, it may comply with that request. One researcher demonstrated that even someone with little knowledge of coding could use ChatGPT, thus making malware creation simpler and more available than ever.<\/span><span data-contrast=\"none\">4<\/span><span data-contrast=\"none\"> Similarly, AI text generation tools can create convincing phishing emails and create them quickly. In theory, this could speed up a phisher\u2019s operation and widen their reach.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"none\">How to avoid AI-written malware and phishing attempts<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"none\">You can avoid AI-generated malware and phishing correspondences the same way you deal with the human-written variety: Be careful and distrust anything that seems suspicious. To steer clear of malware, stick to websites you know you can trust. A safe browsing tool like McAfee web protection \u2013 which is included in <\/span><a href=\"https:\/\/www.mcafee.com\/en-us\/identity-theft\/protection.html?path=blogs\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">McAfee+<\/span><\/a><span data-contrast=\"none\"> \u2013 can double-check that you stay off of sketchy websites.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">As for phishing, when you see emails or texts that demand a quick response or seem out of the ordinary, be on alert. Traditional phishing correspondences are usually riddled with typos, misspellings, and poor grammar. AI-written lures are often written well and rarely contain errors. This means that you must be diligent in vetting every message in your inbox.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"none\">Slow Down, Keep Calm, and Be Confident<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"none\">While the debate about regulating AI heats up, the best thing you can do is to <\/span><a href=\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/four-ways-to-use-ai-responsibly\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">use AI responsibly<\/span><\/a><span data-contrast=\"none\">. Be transparent when you use it. And if you suspect you\u2019re encountering a malicious use of AI, slow down and try your best to evaluate the situation with a clear mind. AI can create some convincing content, but trust your instincts and follow the above best practices to keep your money and personal information out of the hands of cybercriminals.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">1<\/span><span data-contrast=\"none\">CNN, \u201c\u2018<\/span><a href=\"https:\/\/edition.cnn.com\/2023\/04\/29\/us\/ai-scam-calls-kidnapping-cec\/index.html\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">Mom, these bad men have me\u2019: She believes scammers cloned her daughter\u2019s voice in a fake kidnapping<\/span><\/a><span data-contrast=\"none\">\u201d<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">2<\/span><span data-contrast=\"none\">NBC News, \u201c<\/span><a href=\"https:\/\/www.nbcnews.com\/tech\/security\/fbi-warns-deepfake-porn-scams-rcna88190\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">FBI warns about deepfake porn scams<\/span><\/a><span data-contrast=\"none\">\u201d<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">3<\/span><span data-contrast=\"none\">BBC, \u201c<\/span><a href=\"https:\/\/www.bbc.com\/news\/uk-66130785\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">Martin Lewis felt \u2018sick\u2019 seeing deepfake scam ad on Facebook<\/span><\/a><span data-contrast=\"none\">\u201d<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">4<\/span><span data-contrast=\"none\">Dark Reading, \u201c<\/span><a href=\"https:\/\/www.darkreading.com\/cyberattacks-data-breaches\/researcher-tricks-chatgpt-undetectable-steganography-malware\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">Researcher Tricks ChatGPT Into Building Undetectable Steganoraphy Malware<\/span><\/a><span data-contrast=\"none\">\u201d<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>It\u2019s not all funny limericks, bizarre portraits, and hilarious viral skits. ChatGPT, Bard, DALL-E, Craiyon, Voice.ai, and a whole host&#8230;<\/p>\n","protected":false},"author":674,"featured_media":171873,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661],"tags":[5091,5975,4549],"coauthors":[3973],"class_list":["post-171872","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","tag-ai","tag-deepfakes","tag-ransomware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>AI in the Wild: Malicious Applications of Mainstream AI Tools | McAfee Blog<\/title>\n<meta name=\"description\" content=\"It\u2019s not all funny limericks, bizarre portraits, and hilarious viral skits. ChatGPT, Bard, DALL-E, Craiyon, Voice.ai, and a whole host of other mainstream\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AI in the Wild: Malicious Applications of Mainstream AI Tools | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"It\u2019s not all funny limericks, bizarre portraits, and hilarious viral skits. ChatGPT, Bard, DALL-E, Craiyon, Voice.ai, and a whole host of other mainstream\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/ai-in-the-wild-malicious-applications-of-mainstream-ai-tools\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-28T08:46:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-21T05:36:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/300x200_Blog_072823-a.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/ai-in-the-wild-malicious-applications-of-mainstream-ai-tools\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/ai-in-the-wild-malicious-applications-of-mainstream-ai-tools\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"AI in the Wild: Malicious Applications of Mainstream AI Tools\",\"datePublished\":\"2023-07-28T08:46:25+00:00\",\"dateModified\":\"2024-11-21T05:36:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/ai-in-the-wild-malicious-applications-of-mainstream-ai-tools\/\"},\"wordCount\":1195,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/ai-in-the-wild-malicious-applications-of-mainstream-ai-tools\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/300x200_Blog_072823-a.png\",\"keywords\":[\"AI\",\"deepfakes\",\"ransomware\"],\"articleSection\":[\"Internet Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/ai-in-the-wild-malicious-applications-of-mainstream-ai-tools\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/ai-in-the-wild-malicious-applications-of-mainstream-ai-tools\/\",\"name\":\"AI in the Wild: Malicious Applications of Mainstream AI Tools | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/ai-in-the-wild-malicious-applications-of-mainstream-ai-tools\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/ai-in-the-wild-malicious-applications-of-mainstream-ai-tools\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/300x200_Blog_072823-a.png\",\"datePublished\":\"2023-07-28T08:46:25+00:00\",\"dateModified\":\"2024-11-21T05:36:43+00:00\",\"description\":\"It\u2019s not all funny limericks, bizarre portraits, and hilarious viral skits. ChatGPT, Bard, DALL-E, Craiyon, Voice.ai, and a whole host of other mainstream\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/ai-in-the-wild-malicious-applications-of-mainstream-ai-tools\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/ai-in-the-wild-malicious-applications-of-mainstream-ai-tools\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/ai-in-the-wild-malicious-applications-of-mainstream-ai-tools\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/300x200_Blog_072823-a.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/300x200_Blog_072823-a.png\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/ai-in-the-wild-malicious-applications-of-mainstream-ai-tools\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"AI in the Wild: Malicious Applications of Mainstream AI Tools\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"AI in the Wild: Malicious Applications of Mainstream AI Tools | McAfee Blog","description":"It\u2019s not all funny limericks, bizarre portraits, and hilarious viral skits. ChatGPT, Bard, DALL-E, Craiyon, Voice.ai, and a whole host of other mainstream","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"AI in the Wild: Malicious Applications of Mainstream AI Tools | McAfee Blog","og_description":"It\u2019s not all funny limericks, bizarre portraits, and hilarious viral skits. ChatGPT, Bard, DALL-E, Craiyon, Voice.ai, and a whole host of other mainstream","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/ai-in-the-wild-malicious-applications-of-mainstream-ai-tools\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2023-07-28T08:46:25+00:00","article_modified_time":"2024-11-21T05:36:43+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/300x200_Blog_072823-a.png","type":"image\/png"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/ai-in-the-wild-malicious-applications-of-mainstream-ai-tools\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/ai-in-the-wild-malicious-applications-of-mainstream-ai-tools\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"AI in the Wild: Malicious Applications of Mainstream AI Tools","datePublished":"2023-07-28T08:46:25+00:00","dateModified":"2024-11-21T05:36:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/ai-in-the-wild-malicious-applications-of-mainstream-ai-tools\/"},"wordCount":1195,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/ai-in-the-wild-malicious-applications-of-mainstream-ai-tools\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/300x200_Blog_072823-a.png","keywords":["AI","deepfakes","ransomware"],"articleSection":["Internet Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/ai-in-the-wild-malicious-applications-of-mainstream-ai-tools\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/ai-in-the-wild-malicious-applications-of-mainstream-ai-tools\/","name":"AI in the Wild: Malicious Applications of Mainstream AI Tools | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/ai-in-the-wild-malicious-applications-of-mainstream-ai-tools\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/ai-in-the-wild-malicious-applications-of-mainstream-ai-tools\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/300x200_Blog_072823-a.png","datePublished":"2023-07-28T08:46:25+00:00","dateModified":"2024-11-21T05:36:43+00:00","description":"It\u2019s not all funny limericks, bizarre portraits, and hilarious viral skits. ChatGPT, Bard, DALL-E, Craiyon, Voice.ai, and a whole host of other mainstream","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/ai-in-the-wild-malicious-applications-of-mainstream-ai-tools\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/ai-in-the-wild-malicious-applications-of-mainstream-ai-tools\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/ai-in-the-wild-malicious-applications-of-mainstream-ai-tools\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/300x200_Blog_072823-a.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/300x200_Blog_072823-a.png","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/ai-in-the-wild-malicious-applications-of-mainstream-ai-tools\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"AI in the Wild: Malicious Applications of Mainstream AI Tools"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/171872","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=171872"}],"version-history":[{"count":5,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/171872\/revisions"}],"predecessor-version":[{"id":205031,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/171872\/revisions\/205031"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/171873"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=171872"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=171872"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=171872"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=171872"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}