Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Do Scammers dream of electric Phish? Lessons le...

Do Scammers dream of electric Phish? Lessons learned from deploying AI-driven phishing ops

HOU.SEC.CON (Sep/2025)

Effective phishing campaigns traditionally demand extensive manual effort, involving detailed target reconnaissance, crafting believable scenarios, and setting up infrastructure. These manual processes significantly restrict scalability and customization. This talk explores a practical approach to leveraging Generative AI for automating core aspects of phishing workflows, drawing on direct experiences and real-world threat actors such as Emerald Sleet, Crimson Sandstorm, and Charcoal Typhoon.

The session thoroughly compares results from different models and platforms, including OpenAI ChatGPT, Anthropic Claude, and local alternatives, highlighting distinct strengths, weaknesses, and techniques for optimizing outcomes. Attendees will gain insights into deploying an end-to-end phishing campaign, emphasizing the models’ effectiveness in reducing the technical barrier of scaling phishing attacks. Finally, the talk underscores that while AI significantly enhances operational efficiency, it functions best when complemented by human judgment and expertise, reinforcing the critical human factor in cybersecurity practices.

HOU.SEC.CON 2025: https://web.cvent.com/event/9ba9c5ea-9502-44a2-922e-d026c047c9f3/websitePage:dd3dff4f-9597-4a4b-960e-eb732a9a3853?session=6c9e50ba-cce4-4ff0-a21b-8b59bc245729

Avatar for Daniel Marques

Daniel Marques PRO

September 30, 2025
Tweet

More Decks by Daniel Marques

Other Decks in Technology

Transcript

  1. Disclaimer The views and opinions expressed in this talk are

    our own and do not necessarily represent those of our employer. These slides are for educational purposes only and are not to be relied upon as professional advice.
  2. TYPICAL PHISHING WORKFLOW Pretext creation Recon GO! Deploy Infrastructure Craft

    emails Launch campaign Data collection & correlation Scenario ideation Automation & orchestration Text generation
  3. Most of these activities require TIME AND MANUAL EFFORT (Specially

    for cross-border targets in spear phishing campaigns)
  4. Threat actors abusing AI for phishing? Are there any https://www.microsoft.com/en-us/security/blog/2024/02/14/staying-ahead-of-threat-actors-in-the-age-of-ai/

    Emerald Sleet (THALLIUM) Using LLMs to generate regionalized content. Crimson Sandstorm (CURIUM) Using LLMs to generate phishing emails and web scraping. Charcoal Typhoon (CHROMIUM) Using LLMs for translations and communications.
  5. IDEAS WORTH SPREADING Somebody might be watching Models “want” to

    make you happy These models are tools, not the holy grail Keep these in mind when working with AI models
  6. Key. Takeaways Your phishing workflow can be automated You might

    still need to do some clean-up work Consider your OPSEC and jailbreaking effort
  7. Credits • Opening slide background: IA generated with human touch-up.

    • A Person Holding a Prosthetic Arm - cottonbro studio - https://www.pexels.com/photo/a-person-holding-a-prosthetic-arm- 6153345/ • Two People Using Computers - Tima Miroshnichenko - https://www.pexels.com/photo/two-people-using-computers- 5380607/ • Pensive black man thinking in light room – Andres Ayrton - https://www.pexels.com/photo/pensive-black-man-thinking-in-light- room-6578415/ • LinkedIn logo - https://www.vecteezy.com/png/18930480-linkedin- logo-png-linkedin-icon-transparent-png • Hacker icon by rukanicon - Flaticon - https://www.flaticon.com/free- icons/spy • Social icons – Flowicon – Flaticon - https://www.flaticon.com/free- icons/social • ‘Thank you’ slide background: IA generated with human touch-up.