Goodizz.

Researchers Warn North Korean Hackers Used ChatGPT to Forge Fake Military IDs

Internet Trends

September 15, 2025
A North Korean hacking group allegedly used ChatGPT to forge South Korean military ID cards in phishing campaigns. Here’s how AI misuse is reshaping cyber threats.
Researchers Warn North Korean Hackers Used ChatGPT to Forge Fake Military IDs

North Korean Hackers Misuse ChatGPT for Fake Military IDs

A new cybersecurity report has uncovered that a suspected North Korean hacking group used ChatGPT to generate a deepfake version of a South Korean military ID card. The fake identification was reportedly deployed in phishing attempts designed to look more credible, tricking recipients into downloading malware that could steal sensitive information.

The group, known as Kimsuky, has long been linked to espionage campaigns targeting South Korean institutions. U.S. Homeland Security officials have also identified the group as part of North Korea’s broader strategy to collect global intelligence and bypass international sanctions.

How the AI Exploit Worked

According to researchers at South Korean cybersecurity firm Genians, the hackers manipulated ChatGPT into bypassing restrictions against creating government IDs. By tweaking their prompts, they were able to exploit the system and generate fraudulent documents.

Mun Chong-hyun, director at Genians, explained that this is part of a broader pattern: cybercriminals are now using AI to streamline their operations — from planning attacks and writing malicious code to impersonating legitimate recruiters online.

Growing Trend: Hackers Turning to AI

This incident isn’t isolated. In recent months, cybersecurity experts have flagged multiple examples of AI misuse linked to North Korean actors:

  • Fake identities for job scams: Reports suggest hackers used Anthropic’s Claude Code AI tool to help secure remote jobs at U.S. Fortune 500 companies. The system reportedly assisted in generating resumes, cover letters, and even completing technical tasks once hired.
  • Recruitment impersonation: Earlier this year, researchers found AI-generated resumes and social media content being used to impersonate recruiters.
  • Phishing attacks: Emails targeting South Korean journalists, researchers, and human rights activists were disguised with domains that looked like official military addresses, raising the risk of successful breaches.

Why It Matters

North Korea has already been accused of cryptocurrency theft, IT contracting fraud, and cyber-espionage operations to generate revenue and support its nuclear program. The integration of AI-driven tools into these schemes marks a dangerous evolution, making scams more convincing and attacks more efficient.

Cybersecurity experts stress that governments and tech companies must work together to improve safeguards against AI misuse while raising awareness among potential targets of phishing campaigns.

Want to stay updated on AI security risks? You might also like:

End of Article

Up Next

Internet Trends

Facebook’s $725 Million Privacy Settlement: Who Gets Paid, How Much, and What to Expect

September 12, 2025
Facebook’s $725 million privacy settlement payouts have begun. Learn who qualifies, how much users are getting, and the full payment timeline.
Facebook’s $725 Million Privacy Settlement: Who Gets Paid, How Much, and What to Expect

Facebook’s $725 Million Settlement Payments Begin

Meta, Facebook’s parent company, has officially started distributing payments from its $725 million privacy settlement, one of the largest of its kind in U.S. history. The settlement stems from lawsuits accusing Facebook of mishandling user data and sharing personal information with third parties, a controversy that peaked during the 2018 Cambridge Analytica scandal.

Millions of Facebook users in the U.S. who had accounts between 2007 and 2022 were eligible to file claims in 2023. Although Meta has consistently denied any wrongdoing, the company agreed to the massive payout to close the case.

Who Is Eligible to Receive Payment?

To qualify, users needed to:

  • Have had an active Facebook account anytime between May 24, 2007 and December 22, 2022.
  • Submit a claim form by the August 25, 2023 deadline.

Those who successfully filed claims are now receiving confirmation emails from the Facebook User Privacy Settlement Administrator, complete with a Claimant ID and payout details.

When Are Payments Being Sent?

The administrator confirmed that settlement payments started rolling out in September 2025 and will continue for about 10 weeks. Claimants can expect:

  • An email notification 3–4 days before payment is issued.
  • Delivery via the payment method selected during the claim process (direct deposit, PayPal, Venmo, or prepaid card).

This staggered schedule ensures that millions of approved users receive their share smoothly.

How Much Will Users Actually Get?

Although $725 million sounds huge, the settlement is split across millions of claimants, which brings the individual payout down to a modest sum. Court filings show:

  • Average payout: $29.43
  • Maximum payout: $38.36 (for those active the full 15 years)

The distribution is based on an allocation points system, where each month of Facebook activity during the eligibility period adds to the final amount. In short, the longer you’ve been active on Facebook, the bigger your share.

Why This Settlement Matters

The trending keyword here is “privacy”—and this settlement underscores just how valuable it has become. While the cash payouts may not be life-changing, the case is a reminder of the importance of data protection and accountability in the tech industry.

For everyday users, this is a wake-up call to:

  • Regularly check privacy settings on apps and platforms.
  • Be mindful of what data is shared with third-party apps.
  • Stay updated on digital rights and online security.

Up Next

Internet Trends

FBI Warns iPhone & Android Users About New Scam

September 10, 2025
The FBI warns of rising smishing scams in 2025, from fake toll payment texts to QR code “brushing” packages. Learn how these scams work and how to protect yourself.
FBI Warns iPhone & Android Users About New Scam

FBI Warns of Fake Toll Texts and Delivery Smishing Scams

In early 2025, the FBI flagged a surge in smishing—SMS phishing—scams targeting both iPhone and Android users. Unlike phishing emails, these deceptive messages arrive via text and often impersonate toll agencies or courier services, claiming urgent payment is needed to avoid penalties. Many of these messages lure recipients to fake websites via links that steal personal data or infect devices with malware.

Cybersecurity units, like Palo Alto Networks' Unit 42, have discovered that thousands of domains—many using the Chinese .xin top-level domain—are being used in these scams. This tactic makes the URLs appear official while steering users toward phishing traps.

New QR Code Scam: The Brushing Technique Arrives in the Mail

More recently, the FBI warned about clever new scams involving QR codes sent inside unsolicited packages—often with no return address. Known as the brushing technique, this method lures curious victims into scanning QR codes that lead to phishing sites or silently install malware.

Once scanned, these codes may lead to fraudulent payment pages or trigger downloads of malicious apps, putting your personal and financial information at risk. It’s become a modern twist on old-school phishing—but with an impressive disguise.

Why These Scams Work—and Why You Should Be Cautious

  • Sense of Urgency: Fake messages mimic official notices that prompt immediate action.
  • Authority Mimicry: Scammers pretend to be from toll or government services.
  • Curiosity Tactics: Mystery packages with QR codes spark curiosity and lower defenses.
  • Encrypted Path Evasion: Some smishing links instruct users to copy-paste URLs, bypassing protections like iMessage's link hiding.

How to Protect Yourself from Smishing and QR Scams

Smishing Texts: Link claiming unpaid toll or delivery alert - Delete suspicious texts immediately. Do not click links. Report to IC3.

QR Box Scams: QR in an unknown or unsolicited package - Never scan unknown QR codes. Use antivirus/mobile security apps and report to authorities if received.

Community Reactions and Real-World Behavior

From Reddit discussions, smartphone users report an increase in volume of scam texts, though not all are highly convincing.

“I’ve been getting tons of scam texts lately. They’re not very convincing but the volume has increased…”Reddit

This highlights the evolving nature of these scams: often low-effort for attackers but still effective due to the sheer volume and automation involved.