Tech
Artificial Intelligence

The dark web is overflowing with stolen ChatGPT accounts

ChatGPT login credentials are a popular target for hackers now.
By Matt Binder  on 
OpenAI's ChatGPT on a mobile phone in front of the word "PASSWORD"
Hackers are stealing ChatGPT login credentials and selling access to the accounts on the dark web. Credit: Avishek Das/SOPA Images/LightRocket via Getty Images

There's no doubt about it: ChatGPT, the AI chatbot from OpenAI, is extremely popular and has seemingly single-handedly thrust chatbots and AI language models into the mainstream.

But with this popularity come some side effects. For one: ChatGPT accounts are now a prime target for hackers.

In a new recently released report(opens in a new tab), researchers at the cybersecurity firm Group-IB share that they have found over 101,000 compromised ChatGPT login credentials for sale on dark web marketplaces over the past year.

ChatGPT crossed 100 million users in February, just months after it first launched to the public. However, as the AI chatbot's popularity has grown over the months, so has the number of stolen login credentials for ChatGPT accounts. Group-IB says it found more than 26,800 ChatGPT credentials last month, a peak since they began tracking the data.

Group-IB researchers say the majority of these stolen ChatGPT credentials have been accessed thanks to the popular Raccoon malware. Raccoon works just as basic malware does, stealing info from a target's computer after the user downloads the software, which is often disguised as an app or file that the user actually wants. However, Raccoon is easy to use and is available as a dependable, maintained subscription service, which makes it a popular choice among hackers.

There are a number of potential security concerns unique to having a ChatGPT account compromised by hackers. For one, OpenAI released a feature a few months ago that saves a user's chat history. Many companies, like Google, warn their employees not to input sensitive information into ChatGPT because that data could be used to train the AI language models. However, the fact that they need to warn employees about this means that it does happen. If a hacker has access to a user's ChatGPT history, they can see all that sensitive information that's previously been input into ChatGPT.

"Many enterprises are integrating ChatGPT into their operational flow," said Group-IB's Head of Threat Intelligence Dmitry Shestakov in a statement. "Employees enter classified correspondences or use the bot to optimize proprietary code. Given that ChatGPT’s standard configuration retains all conversations, this could inadvertently offer a trove of sensitive intelligence to threat actors if they obtain account credentials."

In addition, if a user reuses their password for multiple different platforms, a hacker who has access to their ChatGPT account could also soon access their other accounts as well. And, if the target is paying for ChatGPT's premium plan, ChatGPT Plus, they may also be unwittingly paying for others to use the paid-for service as well.

ChatGPT users should be cautious of unauthorized access to their accounts and make sure they don't reuse their account password for other platforms.


Recommended For You

5 ChatGPT plugins that aren't worth your time

OpenAI launches an iOS app for ChatGPT

How to unblock porn sites and stream anonymously

5 ChatGPT plugins that do what they promise

Trending on Mashable
Wordle today: Here's the answer and hints for July 1

Spectacular Webb telescope image reveals things scientists can't explain

NASA's new Mars video is astonishing

Twitter now blocks visitors from viewing tweets, and profiles unless they're logged in

Elon Musk claims Twitter login requirement just 'temporary'
The biggest stories of the day delivered to your inbox.
This newsletter may contain advertising, deals, or affiliate links. Subscribing to a newsletter indicates your consent to our Terms of Use(opens in a new tab) and Privacy Policy(opens in a new tab). You may unsubscribe from the newsletters at any time.
Thanks for signing up. See you at your inbox!