Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Do Scammers dream of electric Phish? Lessons le...

Do Scammers dream of electric Phish? Lessons learned from deploying AI-driven phishing ops

DEF CON 33 Social Engineering Community Village (Aug/2025)

Effective phishing campaigns traditionally demand extensive manual effort, involving detailed target reconnaissance, crafting believable scenarios, and setting up infrastructure. These manual processes significantly restrict scalability and customization. This talk explores a practical approach to leveraging Generative AI for automating core aspects of phishing workflows, drawing on direct experiences and real-world threat actors such as Emerald Sleet, Crimson Sandstorm, and Charcoal Typhoon.

The session thoroughly compares results from different models and platforms, including OpenAI ChatGPT, Anthropic Claude, and local alternatives, highlighting distinct strengths, weaknesses, and techniques for optimizing outcomes. Attendees will gain insights into deploying an end-to-end phishing campaign, emphasizing the models’ effectiveness in reducing the technical barrier of scaling phishing attacks. Finally, the talk underscores that while AI significantly enhances operational efficiency, it functions best when complemented by human judgment and expertise, reinforcing the critical human factor in cybersecurity practices.

DEF CON Social Engineering Community Village: https://www.se.community/presentations/

Avatar for Daniel Marques

Daniel Marques PRO

August 09, 2025
Tweet

Resources

Demo 1: Using GPT-5 to classify a screenshot

https://youtu.be/S-avMH2hY9Y

This recorded demo demonstrates how a threat actor can leverage AI (in this case, OpenAI's GPT-5) to classify a screenshot as a target either for phishing or password guessing.

Demo 2: Using GPT-5 to extract HTML from an EML file

https://youtu.be/qDERkeKXoVE

This recorded demo demonstrates how a threat actor can leverage AI (in this case, OpenAI's GPT-5) to extract the complete HTML from an EML file, generating an exact copy of the original email.

Demo 3: Using n8n to automate the phishing workflow

https://youtu.be/gkZOteaj57M

This demo illustrates how a threat actor can utilize n8n, along with multiple AI models, to automate the deployment of a phishing campaign. It begins by receiving a domain and proceeds to use LLMs to ideate phishing content, ultimately sending the messages created.

More Decks by Daniel Marques

Other Decks in Technology

Transcript

  1. Do Scammers Dream of Electric Phish? Lessons learned from deploying

    AI-driven phishing ops Daniel Marques (0xc0da)
  2. Disclaimer The views and opinions expressed in this talk are

    our own and do not necessarily represent those of our employer. These slides are for educational purposes only and are not to be relied upon as professional advice.
  3. TYPICAL PHISHING WORKFLOW Pretext creation Recon GO! Deploy Infrastructure Craft

    emails Launch campaign Data collection & correlation Scenario ideation Automation & orchestration Text generation
  4. Most of these activities require TIME AND MANUAL EFFORT (Specially

    for cross-border targets in spear phishing campaigns)
  5. Threat actors abusing AI for phishing? Are there any https://www.microsoft.com/en-us/security/blog/2024/02/14/staying-ahead-of-threat-actors-in-the-age-of-ai/

    Emerald Sleet (THALLIUM) Using LLMs to generate regionalized content. Crimson Sandstorm (CURIUM) Using LLMs to generate phishing emails and web scraping. Charcoal Typhoon (CHROMIUM) Using LLMs for translations and communications.
  6. IDEAS WORTH SPREADING Somebody might be watching Models “want” to

    make you happy These models are tools, not the holy grail Keep these in mind when working with AI models
  7. Key. Takeaways Your phishing workflow can be automated You might

    still need to do some clean-up work Consider your OPSEC and jailbreaking effort
  8. Credits • Opening slide background: IA generated with human touch-up.

    • A Person Holding a Prosthetic Arm - cottonbro studio - https://www.pexels.com/photo/a-person-holding-a- prosthetic-arm-6153345/ • Two People Using Computers - Tima Miroshnichenko - https://www.pexels.com/photo/two-people-using- computers-5380607/ • Pensive black man thinking in light room – Andres Ayrton - https://www.pexels.com/photo/pensive-black-man- thinking-in-light-room-6578415/ • LinkedIn logo - https://www.vecteezy.com/png/18930480- linkedin-logo-png-linkedin-icon-transparent-png • ‘Thank you’ slide background: IA generated with human touch-up.