--------- Website Scaling Desktop - Max --------- -------- Website Highlight Effekt ---------

Decoding LLM Risks: A Comprehensive Look at Unauthorized Code Execution

In the modern digital age, the issue of unauthorized code usage is garnering more attention than ever. As AI technology advances, so do the associated cybersecurity risks. The recent excitement surrounding AI language models, such as OpenAI's ChatGPT, has only added to the urgency of the situation. The swift emergence of unauthorized code usage as a major threat, along with the new capabilities of AI models like ChatGPT, has raised legitimate concerns about potential misuse.

Understanding what is unauthorized use of code

So, what exactly does unauthorized use of code mean? Simply put, it's the act of exploiting, altering, or copying software code without the consent of its rightful owner or creator. This could range from manipulating software for dangerous or harmful purposes, such as creating malware, to exploiting identified vulnerabilities in a system for unauthorized access or malicious intent. It's a form of cyber threat that poses a significant challenge to individuals and businesses alike. (source: Unauthorized Code Execution (allassignmenthelp.com)

In the context of large language models (LLMs) such as OpenAI's ChatGPT, unauthorized code execution can occur when the AI model is manipulated to generate malicious code. As these models have the ability to generate text based on given prompts, they could potentially be leveraged by less-skilled individuals or cybercriminals to create harmful scripts and tools. (source:OWASP Top 10 LLM risks - what we learned | Vulcan Cyber)

Read more: ChatGPT shows promise of using AI to write malware | CyberScoop

The output produced by LLMs is frequently employed to carry out tasks using other systems or tools, such as APIs, database queries, or arbitrary code execution. Unauthorized code execution in these scenarios can have grave consequences. LLMs' capacity to generate malicious code, coupled with their contextual knowledge of the system or tool provided to the model, enables an attacker to create highly precise exploits. Without appropriate measures in place, this can lead to severe ramifications, including data loss, unauthorized access, or even system hijacking.

Real-World Scenarios: Misuse of AI Tools

With the evolution of AI technology, we've seen a rise in potential risks. A recent study by Check Point Research provides real-life examples of these dangers.

In the blog post they shared, researchers were able to convince ChatGPT, an AI language model, to craft a persuasive fake email. This email looked like it came from a make-believe web-hosting service called Host4u. Despite OpenAI giving a warning that the task might involve improper content, the AI model ended up generating the phishing email.

What happened next was even more concerning. Using the fake email as a starting point, the researchers built harmful computer instructions, cleverly hidden within an Excel document. The study showed that, when given the right text instructions, ChatGPT can produce these harmful codes.

To finish their simulated cyber attack, the researchers used another AI tool, Codex, to create a basic reverse shell, a kind of backdoor access to a computer. The end product? An Excel file that looked normal but contained harmful instructions capable of taking over a user's computer system. This was all accomplished with the help of sophisticated AI tools.

Read more: Check Point: ChatGPT Can Compose Malicious Emails, Code - (sdxcentral.com)

In another separate study conducted, security researchers demonstrated that ChatGPT could be used to create ransomware, a type of malicious software that locks users out of their own files until a ransom is paid. The researchers used ChatGPT to make a fake email campaign and harmful software targeting MacOS, the operating system used in Apple computers. The harmful software was able to find Microsoft Office files on an Apple laptop, send them to a web server over the internet, and then lock these files on the laptop. This scenario showcases how easily AI tools can be exploited for harmful purposes.

Read more: How ChatGPT can turn anyone into a ransomware and malware threat actor | VentureBeat

AI Tools to Counteract the Risks of Unauthorized Code Usage

While AI tools like ChatGPT can indeed pose potential security challenges, many experts also see them as powerful allies in strengthening defenses against cyber threats. It's worth noting that it's currently not possible to definitively identify if a malicious cyber activity was aided by AI tools like ChatGPT.

Let's take Kyle Hanslovan, for instance, the co-founder of the cybersecurity firm Huntress, and formerly part of the US government's cyber exploit development team. He believes that AI tools like ChatGPT have certain limitations. They do not have yet the sophistication to create complex and novel cyber threats similar to those produced by national-level hackers. However, they can drastically improve the quality of phishing emails, particularly for those whose first language isn't English, thus increasing risks. Interestingly, Hanslovan also sees a silver lining: tools like ChatGPT might eventually give cyber defenders an advantage over attackers.

Then there's Juan Andres Guerrero-Saade, Senior Director of Sentinel Labs at SentinelOne, who admires ChatGPT's capabilities in understanding code. He's particularly impressed with its efficiency in the complex areas of reverse engineering and deobfuscation - the process of revealing hidden aspects of malicious source code. For him, tools like ChatGPT are not just time-saving but also more cost-effective alternatives to expensive software. (source: ChatGPT Poses Propaganda and Hacking Risks, Researchers Say - Bloomberg (archive.is))

Proactive Strategies to Prevent Unauthorized Code Use

To mitigate the risks associated with unauthorized code execution in large language models (LLMs) like ChatGPT, it is important to take proactive measures. Scrutinizing the quality and authenticity of the data used to train AI tools is essential to ensure that the responses generated by the model are reliable. Comprehensive evaluations can help in improving and refining the model, while feedback from experts can assist in identifying and addressing potential issues. It is also important to integrate trustworthy output filtering mechanisms to reduce the risk of model misuse and exploitation.

In addition, it is crucial to maintain the security of systems when using AI tools. Capabilities such as executing codes or queries should be restricted if there is no requirement for them. AI tools should also be given limited access to resources and information that could potentially be misused for malicious purposes. For example, a customer service bot should not have access to APIs where it can modify or delete customer data. Human approval should be required for high-risk operations.

Another essential step in managing risks associated with LLMs like ChatGPT is to become part of a community that actively discusses and explores ways to improve the trustworthy and compliant use of AI. Engaging in dialogue with others in the field can provide valuable insights and practical solutions for the challenges you may face.

Read more: Large Language Models (LLMS) in Customer Support Chatbots (calvin-risk.com)

And, of course, consulting with experts can be invaluable. Partnering with organizations like Calvin Risk, which specializes in this very field, can offer considerable benefits. They can provide tailored advice and guidance to businesses looking to implement LLMs in their operations. Not only can they help you navigate the complex landscape of AI regulations such as the EU AI Act, but they can also support you in managing your risk exposure. By leveraging their expertise, you can ensure that your use of AI is both safe and compliant, protecting your business and your customers.


Stefan Kokov

AI Researcher & Software Engineer

Upgrade AI risk management today!

request a demo

Subscribe to our
monthly newsletter.

Join our
awesome team

e-mail us