---
title: "GhostGPT- GenAI model that boosts cybercrime | Phish Protection"
description: "GhostGPT- GenAI model that boosts cybercrime: Artificial Intelligence is dangerous when manipulated and exploited by threat actors. One such recent example."
image: "https://phishprotection.com/og/blog/ghostgpt-genai-model-that-boosts-cybercrime.png"
canonical: "https://phishprotection.com/blog/ghostgpt-genai-model-that-boosts-cybercrime/"
---

Share 

[ ](https://www.linkedin.com/sharing/share-offsite/?url=https%3A%2F%2Fphishprotection.com%2Fblog%2Fghostgpt-genai-model-that-boosts-cybercrime%2F "Share on LinkedIn") [ ](https://twitter.com/intent/tweet?text=GhostGPT-%20GenAI%20model%20that%20boosts%20cybercrime&url=https%3A%2F%2Fphishprotection.com%2Fblog%2Fghostgpt-genai-model-that-boosts-cybercrime%2F "Share on X/Twitter") [ ](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fphishprotection.com%2Fblog%2Fghostgpt-genai-model-that-boosts-cybercrime%2F "Share on Facebook") [ ](https://reddit.com/submit?url=https%3A%2F%2Fphishprotection.com%2Fblog%2Fghostgpt-genai-model-that-boosts-cybercrime%2F&title=GhostGPT-%20GenAI%20model%20that%20boosts%20cybercrime "Share on Reddit") [ ](mailto:?subject=GhostGPT-%20GenAI%20model%20that%20boosts%20cybercrime&body=Check out this article: https%3A%2F%2Fphishprotection.com%2Fblog%2Fghostgpt-genai-model-that-boosts-cybercrime%2F "Share via Email") 

![Phish Protection blog post image](https://media.mailhop.org/phishprotection/images/2025/01/GhostGPT-threat-actors.jpg) 

**Artificial Intelligence**is dangerous when manipulated and exploited by threat actors. One such recent example of AI menace is GhostGPT. It’s yet another AI chatbot that was developed with the sole purpose of making it easy and convenient for

cybercriminals

. This unrestricted generative AI model has garnered immense popularity within days of its launch.

The researchers at[Abnormal Security](https://abnormalsecurity.com/)found out about GhostGPT in a Telegram channel back in November 2024\. As per their[report](https://abnormalsecurity.com/blog/ghostgpt-uncensored-ai-chatbot), Cybercriminals have been actively using GhostGPT to create malware, write**phishing messages**, and so much more. 

This article aims to find out what makes GhostGPT an absolute favorite among**cybercriminals**and how much damage it can impart to businesses and individuals alike. Let’s get started!

### **What is GhostGPT?**

This is a relatively new, handy AI tool for beginner-level and intermediate cybercriminals. It is the latest addition to the**uncensored Gen AI ecosystem**. An easy-to-access and convenient-to-use AI chatbot, GhostGPT doesn’t have the traditional restrictions that legitimate platforms such as ChatGPT,[Gemini](https://gemini.google.com/?hl=en-IN)and CoPilot have. 

It operates seamlessly without any kind of guardrails, thereby enabling[cybercriminals](/cybersecurity/cybercriminals-may-try-to-misuse-la-fire)to misuse it for generating**harmful outputs**. Threat actors can ask anything under the sun to this AI chatbot and get refined answers on topics like malware, phishing scams, hacking strategies and so on. 

Abnormal believes that GhostGPT is “a chatbot specifically designed to cater to cyber criminals.”

The AI chatbot is actually capable of sharing unfiltered, direct answers to harmful questions and**sensitive queries**. There’s no system of flagging or blocking at all.

GhostGPT is in no way close to other[ethical AI models](https://keymakr.com/blog/ethical-considerations-in-ai-model-development/). Authorities have not yet been able to find out the details about the developer of this**rogue GPT**. 

### **Easy accessibility making things worse**

The worst thing about GhostGPT is its ease of accessibility. The pricing has been done tactfully enough to attract aspiring[threat actors](/phishing/threat-actor-entices-eu-diplomats-with-fake-wine-tasting-invitation). There are three major**pricing models**for GhostGPT. You can use the uncensored

AI chatbot

for one week and all you need to pay is just $50\. 

The pricing is $150 and $300 for 30 days and 90 days of usage, respectively. The quick and apt responses help the \*\* cybercriminals \*\* amp up their process and save up their time. Any threat actor who is interested in using the Gen AI model can access it through a particular Telegram channel. 

There’s literally no barrier to entry because of the minimal pricing structure. Also, cybercriminals do not require any kind of specialized training to access and use GhostGPT. Even less skilled**threat actors**can easily make the most out of this unrestricted[AI chatbot](https://www.salesforce.com/in/agentforce/chatbot/what-is-an-ai-chatbot/).

### **What makes GhostGPT incredibly popular among threat actors?**

![GhostGPT threat actors](https://media.mailhop.org/phishprotection/images/2025/01/GhostGPT-threat-actors.jpg) 

The developers have worked extensively on this AI chatbot to make it one of the best among its contemporaries. Here are a**few features**that help it stand out and make it irresistible to cybercriminals:

#### **No logs policy**

This is perhaps the top feature that makes it an absolute favorite among cybercriminals . GhostGPT does not record[user activity](https://www.activtrak.com/user-activity-monitoring/). This makes it super convenient for the attackers to carry out their queries and yet be able t**o conceal their illegitimate activities**. GhostGPT gives them a safe haven to share their query, get answers and move on without leaving a trace behind.

#### **Lightening quick processing**

GhostGPT offers quick results. It saves a great deal of time for cybercriminals by giving them the desired responses within a very short**span of time**. Generating malicious content has never been so easy, effortless and quick!

#### **Easy to access**

This is yet another aspect of why GhostGPT is gaining popularity across the[cybercrime](https://en.wikipedia.org/wiki/Cybercrime)ecosystem. There is no need to download any 

[LLM library](https://www.upsilonit.com/blog/top-ai-frameworks-and-llm-libraries) or even use a jailbreak prompt to start using GhostGPT. Even a**beginner-level threat actor**with zero or minimal skills can make the affordable payment of $50 and use GhostGPT straight for the next 7 days through a dedicated Telegram channel.

The developers have marketed this uncensored Gen AI model as a tool that can be used to enhance[cybersecurity](/phishing/cybersecurity-emerging-threats-phishing-email-security-malware). However, experts believe that this is merely a pretense, given that GhostGPT is available on**cybercrime forums**and is majorly focused on[BEC](https://www.infosecurity-magazine.com/news/manufacturing-loses-60m-bec/)scams.

### **Rogue chatbots- the latest trend in the cyber ecosystem**

GhostGPT is not a**one-of-a-kind AI chatbot**that comes with no guardrails.

It is preceded by other similar Gen AI models such as WormGPT, EscapeGPT, WolfGPT, FraudGPT and so on.

All these[AI tools](https://cloud.google.com/use-cases/free-ai-tools)were developed with the ultimate goal of monetizing through cybercrime marketplaces. 

However, none of them turned out to be as appealing as GhostGPT. They didn’t stand true to their claims. Apart from that, there were multiple entry barriers that dampened the**enthusiasm**of cybercriminals.

[Rogue chatbots](https://www.forbes.com/sites/anishasircar/2024/11/27/when-chatbots-go-rogue-the-dangers-of-poorly-trained-ai/)are currently one of the biggest concerns for**cybersecurity organizations**as these tools do not require high-level coding skills . Also, their quick response time enables cybercriminals to plan and execute their attacks more conveniently. 

![Spear phishing protection](https://media.mailhop.org/phishprotection/images/2025/01/spear-phishing-protection-4532.jpg) 

### **Accuracy level of GhostGPT**

Experts decided to test the abilities of GhostGPT. So, the researchers designed a query around the creation of a Docusign[phishing email](https://betanews.com/2024/12/18/threat-actors-spoof-email-security-providers/). The result was convincing enough, as GhostGPT generated a decent template. It was flawless, with**no grammatical or spelling errors**. Also, it generated the result within a fraction of a second.

The best way to combat rogue[AI](https://www.ibm.com/think/topics/artificial-intelligence)models is by deploying AI-powered defensive cybersecurity mechanisms with robust[phishing protection](/). Combining these technologies under the guidance of**skilled professionals**can effectively counter uncensored AI chatbots. The concern is that AI models like GhostGPT are strategically designed to bypass security filters, making advanced protection essential.

Their design allows them to ditch \*\* traditional security mechanisms\*\* . This is why it is important to build a solid[cybersecurity](https://www.checkpoint.com/cyber-hub/cyber-security/what-is-cybersecurity/)system backed by defensive AI.

The focus should be on identifying any kind of anomalies as well as anticipating and neutralizing any kind of threat attacks before the real damage is done.

In short, brands and individuals need to pull up their socks and be completely prepared to prevent and fight any kind of cyberattack .

## Topics

[ Phishing ](/tags/phishing/) 

![Brad Slavin](https://media.mailhop.org/phishprotection/images/authors/brad-slavin.jpg) 

[ Brad Slavin ](/authors/brad-slavin/) 

General Manager

Founder and General Manager of DuoCircle. Product strategy and commercial lead across DuoCircle's 2,000+ customer base.

[LinkedIn Profile →](https://www.linkedin.com/in/bradslavin) 

## Protect your inbox from phishing attacks

Real-time email security with 60-day free trial. No credit card required.

[Start Free Trial](https://portal.duocircle.com/cart.php?a=add&pid=101&brand=phishprotection) [View Pricing](/pricing/) 

## Related Articles

[  Foundational 5m  0ktapus, Okta Breach Helps Attackers Launch Sophisticated Supply Chain Attacks  Sep 5, 2022 ](/blog/0ktapus-okta-breach-helps-attackers-launch-sophisticated-supply-chain-attacks/)[  Foundational 4m  13 Spear Phishing Attacks Examples To Justify Investment For Phishing Prevention Solutions In Your Organization  Aug 1, 2019 ](/blog/13-spear-phishing-attacks-examples-to-justify-investment-for-phishing-prevention-solutions-in-your-organization/)[  Foundational 4m  All 14 centers of Kettering Health were affected by a massive ransomware attack, Major outage in the Ohio medical center  May 23, 2025 ](/blog/14-centers-of-kettering-health-were-affected-by-massive-ransomware-attack-in-ohio-medical-center/)[  Foundational 4m  2021 Phishing Trends You Need To Be Wary Of  Aug 2, 2021 ](/blog/2021-phishing-trends-to-be-wary-of/)

```json
{"@context":"https://schema.org","@type":"Organization","name":"Phish Protection","url":"https://phishprotection.com","logo":{"@type":"ImageObject","url":"https://phishprotection.com/images/phishprotection-logo.png"},"description":"Advanced phishing protection and email security for businesses. Real-time threat defense, time-of-click protection, and seamless Office 365 integration.","parentOrganization":{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138883901","name":"DuoCircle LLC","url":"https://www.duocircle.com","sameAs":["https://www.wikidata.org/wiki/Q138883901","https://www.crunchbase.com/organization/duocircle-llc","https://www.linkedin.com/company/duocircle","https://github.com/duocircle"],"subOrganization":[{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138898167","name":"DMARC Report","url":"https://dmarcreport.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897474","name":"AutoSPF","url":"https://autospf.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897912","name":"Phish Protection","url":"https://www.phishprotection.com"}]},"sameAs":["https://www.linkedin.com/company/duocircle","https://x.com/duocirclellc","https://www.facebook.com/duocirclellc","https://github.com/duocircle"],"contactPoint":{"@type":"ContactPoint","contactType":"customer support","url":"https://phishprotection.com/contact/"},"knowsAbout":["Phishing Protection","Email Security","Anti-Phishing","Business Email Compromise","Ransomware Protection","Time of Click Protection","Office 365 Email Security","Advanced Threat Defense"]}
```

```json
{"@context":"https://schema.org","@type":"WebSite","name":"Phish Protection","url":"https://phishprotection.com","description":"Advanced phishing protection and email security for businesses. Real-time threat defense, time-of-click protection, and seamless Office 365 integration.","publisher":{"@type":"Organization","name":"Phish Protection","url":"https://phishprotection.com","logo":{"@type":"ImageObject","url":"https://phishprotection.com/images/phishprotection-logo.png"},"description":"Advanced phishing protection and email security for businesses. Real-time threat defense, time-of-click protection, and seamless Office 365 integration.","parentOrganization":{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138883901","name":"DuoCircle LLC","url":"https://www.duocircle.com","sameAs":["https://www.wikidata.org/wiki/Q138883901","https://www.crunchbase.com/organization/duocircle-llc","https://www.linkedin.com/company/duocircle","https://github.com/duocircle"],"subOrganization":[{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138898167","name":"DMARC Report","url":"https://dmarcreport.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897474","name":"AutoSPF","url":"https://autospf.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897912","name":"Phish Protection","url":"https://www.phishprotection.com"}]}}}
```

```json
{"@context":"https://schema.org","@type":"BlogPosting","headline":"GhostGPT- GenAI model that boosts cybercrime","description":"GhostGPT- GenAI model that boosts cybercrime: Artificial Intelligence is dangerous when manipulated and exploited by threat actors. One such recent example.","url":"https://phishprotection.com/blog/ghostgpt-genai-model-that-boosts-cybercrime/","datePublished":"2025-01-29T10:38:09.000Z","dateModified":"2026-04-17T15:43:10.000Z","dateCreated":"2025-01-29T10:38:09.000Z","author":{"@type":"Person","@id":"https://phishprotection.com/authors/brad-slavin/#person","name":"Brad Slavin","url":"https://phishprotection.com/authors/brad-slavin/","jobTitle":"General Manager","description":"Brad Slavin is the founder and General Manager of DuoCircle, the company behind DMARC Report, AutoSPF, Phish Protection, and Mailhop. He founded DuoCircle in 2014 and has led the company's growth to 2,000+ customers across its email security product family. Brad's focus is product strategy, customer relationships, and the commercial and compliance side of email authentication (DPAs, SLAs, enterprise procurement).","image":"https://media.mailhop.org/phishprotection/images/authors/brad-slavin.jpg","knowsAbout":["Email Security Strategy","SaaS Product Management","Enterprise Compliance","Customer Success","Email Deliverability Business"],"worksFor":{"@type":"Organization","name":"Phish Protection","url":"https://phishprotection.com"},"sameAs":["https://www.linkedin.com/in/bradslavin"]},"publisher":{"@type":"Organization","name":"Phish Protection","url":"https://phishprotection.com","logo":{"@type":"ImageObject","url":"https://phishprotection.com/images/phishprotection-logo.png"},"description":"Advanced phishing protection and email security for businesses. Real-time threat defense, time-of-click protection, and seamless Office 365 integration.","parentOrganization":{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138883901","name":"DuoCircle LLC","url":"https://www.duocircle.com","sameAs":["https://www.wikidata.org/wiki/Q138883901","https://www.crunchbase.com/organization/duocircle-llc","https://www.linkedin.com/company/duocircle","https://github.com/duocircle"],"subOrganization":[{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138898167","name":"DMARC Report","url":"https://dmarcreport.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897474","name":"AutoSPF","url":"https://autospf.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897912","name":"Phish Protection","url":"https://www.phishprotection.com"}]},"sameAs":["https://www.linkedin.com/company/duocircle","https://x.com/duocirclellc","https://www.facebook.com/duocirclellc","https://github.com/duocircle"],"contactPoint":{"@type":"ContactPoint","contactType":"customer support","url":"https://phishprotection.com/contact/"},"knowsAbout":["Phishing Protection","Email Security","Anti-Phishing","Business Email Compromise","Ransomware Protection","Time of Click Protection","Office 365 Email Security","Advanced Threat Defense"]},"mainEntityOfPage":{"@type":"WebPage","@id":"https://phishprotection.com/blog/ghostgpt-genai-model-that-boosts-cybercrime/"},"articleSection":"foundational","keywords":"Phishing","wordCount":1129,"image":{"@type":"ImageObject","url":"https://media.mailhop.org/phishprotection/images/2025/01/GhostGPT-threat-actors.jpg","caption":"Phish Protection blog post image","width":1200,"height":630}}
```

```json
{"@context":"https://schema.org","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https://phishprotection.com/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https://phishprotection.com/blog/"},{"@type":"ListItem","position":3,"name":"Foundational","item":"https://phishprotection.com/foundational/"},{"@type":"ListItem","position":4,"name":"GhostGPT- GenAI model that boosts cybercrime","item":"https://phishprotection.com/blog/ghostgpt-genai-model-that-boosts-cybercrime/"}]}
```
