Loading...

09 Apr 2026 08:57

Leadership Perspectives

We’re All a Target: Generative AI and the Automation of Spear Phishing- Jim Downey, Senior Product Marketing Manager, F5

Not long ago, we could pick out phishing emails by their bad spelling, grammatical errors, and non-English syntax. We could spot widely used, generic ploys like the Nigerian prince scam. Most of us have not faced well-polished, targeted spear phishing because researching our background and crafting personalized messages has been too costly for criminals. With generative AI, that’s rapidly changing, and as security professionals, we need to prepare for the consequences.

Generative AI enables end-to-end automation of spear phishing, lowering its cost and broadening its use. Think of the work that an attacker must go through to craft an effective spear phishing message for a business email compromise (BEC). The attacker picks a target, researches their social media, discovers their closest connections, and picks out the target’s interests. With this information, the attacker crafts a personalized email in a tone of voice intended to avoid suspicion. This requires a thoughtful following of leads and psychological intuition.

Could this work be automated? Certainly. Attackers automate the scraping of social media content and use credential stuffing to take over accounts for information gathering. Similarly, through automation, attackers can build a knowledge graph about the life of a target.

With this knowledge graph, attackers can feed highly personal information into a ChatGPT-like service–one without ethical safeguards–to create targeted and effective spear phishing messages. The attacker could create entire sequences of messages that span multiple channels from email to social media with messages originating from multiple fake accounts, each with a well-crafted persona generated based on the target’s trust propensities.

There are signs that this threat is imminent. Reports of new attack tools for sale on the dark web, including WormGPT and FraudGPT, indicate criminals have begun to adapt generative AI to nefarious purposes, including phishing. While the use of this technology has not yet reached large scale end-to-end automation, the pieces are coming together, and the economic dynamics of cybercrime make the development nearly inevitable.

Within the economy of cybercrime, there is a specialization that drives innovation. The World Economic Forum (WEF) estimates that cybercrime is now the world’s third-largest economy, coming in behind the United States and China, with costs expected to reach $8 trillion in 2023 and $10.5 trillion in 2025. The cybercrime economy includes vendors with specializations: there are vendors who sell stolen credentials, vendors who provide access to compromised accounts, and vendors offering IP address proxying over tens of millions of residential IP addresses.

Moreover, there are phishing-as-a-service providers offering complete toolkits from email templates to real-time phishing proxy sites. As vendors compete to win the business of criminals, the highest prizes will go to those organizations providing an end-to-end service at the lowest cost —a dynamic likely to drive forward the automation of spear phishing. We can imagine organizations that specialize in various types of data gathering around targets, data aggregation, and LLMs focused on specific industries or that excel at distinct types of fraud.

Given the likelihood of increases in spear phishing to new targets, organizations need to bolster their existing anti-phishing practices:

Uplevel phishing awareness training: It has long been important to regularly educate employees about the dangers of phishing, how to recognize suspicious emails, and what steps to take if they encounter a potential phishing attempt. However, many organizations train employees to recognize phishing emails by their spelling and grammar mistakes. Instead, training is going to have to go deeper to train people to look out for any request from a non-trusted, non-verified source. In conducting simulated phishing campaigns to test employees’ ability to identify phishing emails, use phishing messages that are well-written, professional, targeted at specific employees, and originating from sources that appear legitimate.

Defend against real-time phishing proxies: Attackers often use phishing to bypass multi-factor authentication (MFA) via real-time phishing proxies. The criminals use phishing to fool users into entering their credentials and one-time password into a site that they control, which they then proxy to the real application to gain access.

Defend more rigorously against account takeovers: Criminals gain control of massive numbers of accounts through credential stuffing using bots. In addition to financial fraud, criminals gather additional personal data through scraping that they can use in further phishing attacks. Defending effectively against bots requires rich signal collection and machine learning.

Use AI to battle AI: With criminals exploiting generative AI to commit fraud, organizations should leverage AI in their defence. F5 partners with organizations to take advantage of rich signal collection and AI to battle fraud. F5 Distributed Cloud Account Protection monitors transactions in real time from across the user journey to detect malicious activity and deliver accurate fraud detection rates. If you can detect fraud within applications, it reduces the harm of phishing. Inspecting traffic with AI requires decrypting traffic efficiently, which you can accomplish with TLS orchestration.

What’s next?

Generative AI clearly poses a new set of security challenges. With the onset of automated spear phishing, we need to unlearn many of our heuristics of trust. While in the past we may have trusted based on the appearances of professionalism, we now need more rigorous protocols for determining the veracity of communications. We need to become more suspicious in this new age of misinformation campaigns, deep fakes, and automated spear phishing, and organizations will need to deploy AI in defence at least as rigorously as criminals use it against us.

(Visited 85 times, 1 visits today)
peri hokiperihokiduta76duta 76ABC1131 - MPO SLOTABC1131 Bandar Slot Togelmix parlay agen slot qrisMPOGALAXYslot thailandAWSBEThttps://premium-soft.com/Consulta-Licencias/https://sintnicolaasschool.com/https://abc1131aa.com/kincir88Slot mahjongABC1131ABC1131 LOGINhttps://abc1131.hartanzah.com/https://www.abc1131.it.com/era77https://ayodonktolong.pages.dev/stc76analisis teknis psikologi mekanisme mahjong ways 2teknik memahami indikator balikan pola tersembunyianalisis alur pemain ahli scatter hitamrekonstruksi matriks scatter mahjong ways 2arsitektur mekanik mahjong wins 3 analis profesionalrahasia cuan hujan deras mahjong ways 2026cara instan hasil maksimal mahjong wins scatter hitambocoran angka hasil mahjong ways april 2026riset indikator balikan mahjong viral macau abc1131alasan analis abc1131 bocoran indikator terbukae5 pola adaptif bermain berdasarkan tren rtp hariane5 pola spin terarah sebagai kunci stabilitas rtpe5 rahasia pola scatter dan wild yang sering diabaikan pemaine5 rahasia tersembunyi scatter dan wild akhirnya terungkap lewat analisis algoritmae5 strategi berbasis algoritma dalam mengidentifikasi scatter dan wilde5 strategi bermain adaptif berbasis analisis rtp hariane5 strategi bermain modern dengan pendekatan analisis rtp hariane5 strategi dinamis permainan mengacu pada analisis rtp hariane5 strategi efektif berbasis evaluasi rtp hariane5 strategi fleksibel permainan berlandaskan data rtp hariane5 strategi maksimalkan rtp dengan pola spin terarahe5 strategi memanfaatkan tumble mahjong ways dalam kombinasi beruntune5 strategi mengurai pola scatter dan wild berbasis sistem algoritmaanalisis distribusi hasil pada mahjong ways dan wild banditoanalisis pola mahjong ways dalam mengamati variasi hasilpendekatan observasional mahjong ways 2 terhadap frekuensimahjong wins 3 dalam studi sesi responsanalysis pola permainan mahjong ways dan dinamika rtpe5 strategi modern membaca scatter dan wild dengan pendekatan sistematise5 strategi responsif permainan dari evaluasi rtp hariane5 strategi spin disiplin dalam mengontrol pergerakan rtpe5 strategi taktis permainan mengikuti pergerakan rtp hariane5 strategi terukur dengan dukungan analisis rtp hariane5 struktur tumble mahjong ways dalam menciptakan kombinasi panjange5 studi komparatif industri game lokal dan global dinamika dan peluang di indonesiae5 studi mekanisme tumble mahjong ways untuk kombinasi panjange5 studi perbandingan model bisnis game lokal dan internasional masa depan industri digital indonesiaaws analisis scatter starlight multiplier sesiaws arsitektur data mahjong output pengalamanaws emas antam rtp mahjong trenaws kebiasaan online mahjong rekomendasi minataws kebiasaan tab mahjong beranda informasiaws minat digital mahjong ways perhatianaws minat generasi digital mahjong berandaaws probabilitas simbol mahjong siklus interaksiaws tren mahjong data realtime aktivitasaws waktu akses mahjong visibilitas penggunaekstraksi peluang analisa pola mahjong wild deluxe teknik dadu sicbo strategi rtp live gates of olympusarsitektur probabilitas teknik peluang baccarat analisa pola mahjong ways 2 pgsoft strategi rtp live starlight princesskalibrasi probabilitas teknik analisa blackjack strategi pola mahjong wins 3 pragmatic taktik rtp live sweet bonanzarekayasa rotasi taruhan analisa peluang roulette taktik pola mahjong ways 2 pgsoft strategi teknik rtp live wild west goldspektrum risiko multidimensi taktik peluang sv388 analisa blackjack strategi pola mahjong wins 3 pragmatic teknik rtp live sugar rushsinkronisasi taktik peluang dadu sicbo analisa rtp live gates of olympus strategi pola mahjong wild deluxe patenanatomi kemenangan taktik pola mahjong ways 2 pgsoft analisa strategi rtp live starlight princess teknik peluang baccaratpemetaan spektrum volatilitas strategi peluang blackjack teknik analisa rtp live sweet bonanza taktik pola mahjong wins 3 pragmaticmanajemen bantalan risiko teknik analisa peluang roulette taktik pola mahjong ways 2 pgsoft strategi rtp live wild west goldnavigasi kontras probabilitas teknik taktik blackjack analisa peluang sv388 strategi pola mahjong wins 3 pragmatic rtp live sugar rushmekanika kemenangan teknik dadu sicbo analisa pola mahjong wild deluxe taktik rtp live gates of olympussinergi taruhan taktis analisa peluang baccarat teknik pola mahjong ways 2 pgsoft strategi rtp live starlight princessagresi taruhan terstruktur taktik peluang blackjack analisa pola mahjong wins 3 pragmatic teknik strategi rtp live sweet bonanzaeksekusi hibrida terkalkulasi taktik analisa peluang roulette strategi pola mahjong ways 2 pgsoft teknik rtp live wild west goldekspansi taruhan terukur analisa strategi rtp live sugar rush teknik pola mahjong wins 3 pragmatic taktik peluang sv388 blackjackadaptasi kemenangan live casino taktik mahjong ways terbaru pastikan 5 lions megawaysadaptasi rtp live pastikan mahjong ways deluxe memecahkan gates of gatotkacadekonstruksi peluang roullete mampu tingkatkan rtp mahjong ways 2 tanpa sweet bonanza super scattereksplorasi teknik baccarat dengan pola fortune gods pastikan starlight archer 1000fakta terbaru dari dragon tiger mampu wild bounty showdown rtp live gates of olympus deluxeformula rtp live deluxe mahjong wins 3 dengan teknik baccarat tanpa pola aztec gemsmembaca rtp live sicbo algoritma mahjong wins menghasilkan fortune of olympuspenguasaan tanpa pola rtp live deluxe mahjong wins 2 lebih terpercaya starlight princess x1000rasio kemenangan sicbo saat rtp mahjong wins black scatter terbaru sweet bonanza superrasio lebih memilih dragon tiger saat mahjong black scatter menguasai starlight princessrasio lebih memilih roullete saat mahjong ways terpercaya rtp gates of olympus deluxestrategi memecahkan baccarat sesuai mahjong ways deluxe dengan teknik gates of olympusstrategi probabilitas mahjong ways 2 menggunakan baccarat deluxe pecahkan starlight princessstrategi ritme roullete memecahkan peluang mahjong ways 2 pastikan sweet bonanza xmasvoltalitas kemenangan sicbo berhasil capai puncak mahjong ways dengan gates of olympus x1000 Top