IT
01-10-2025
SPAMGPT
“SpamGPT” is a relatively recent tool that has been identified as a serious cybersecurity risk. It is described as “spam-as-a-service” or as a campaign-management CRM for cybercriminals.
How does it work?
Some of its characteristics:
|
Function |
Description |
|
Content generation |
Includes an AI assistant (“KaliGPT”) that helps create convincing phishing emails, draft subject lines and text, choose deception strategies, etc. |
|
Sending infrastructure |
Allows configuring SMTP/IMAP servers, using multiple servers, rotating them to avoid blocking, and “cracking” vulnerable SMTP servers, etc. |
|
Delivery testing / monitoring |
Provides tools to check whether emails reach the inbox or end up as spam, monitor responses or bounces, and adjust parameters. |
|
Campaign analysis / optimization |
Analytics, tracking of opens and clicks, content optimization to increase effectiveness. |
Why is it dangerous?
- Low technical barrier: Someone with limited hacking knowledge can launch sophisticated campaigns.
- Improved evasion capabilities: Tools to evade spam filters, spoof senders, and use legitimate or “borrowed” infrastructure to conceal malicious activity.
- Scalability: Enables the sending of large volumes of email, testing, adjusting and repeating campaigns.
- Greater persuasiveness: By using AI to create well-written, tailored messages with persuasive subject lines, the chances that recipients detect phishing are reduced.
Price / business model
Offered at around USD 5,000 (approximately five thousand dollars) on clandestine markets/dark web forums.
How to defend / mitigation
Some measures that organizations and individuals can implement to protect themselves against threats such as SpamGPT:
Email authentication
Configure and enforce SPF, DKIM and DMARC correctly (email authentication protocols that together protect your domain from identity spoofing such as phishing and improve deliverability of legitimate mail). Proper configuration makes it harder to spoof trusted senders.
Advanced mail filters
Use email security solutions that include AI-generated-content detection, heuristics, and behavioral analysis.
Training and awareness
Train personnel to recognize phishing even when messages appear highly professional. Run simulations and use real examples.
Continuous monitoring
Review mail logs, watch for anomalies, and monitor unexpected mass sending or suspicious account access.
Use of multi-factor authentication (MFA)
Even if a service is compromised, MFA can help prevent attackers from gaining full access.
Security policies for infrastructure
Ensure SMTP/IMAP servers are properly configured, free of vulnerabilities, and do not permit misuse.
SpamGPT examples
- Mass phishing emails
Subject: “Your bank account will be blocked in 24 hours!”
Body:
Dear customer,
We have detected suspicious activity on your account. To avoid permanent closure, please confirm your identity at the following secure link: [fake link].
Thank you for your cooperation.
—Bank Security Team
(The AI writes the message in fluent, error-free Spanish to appear more credible.) - Automated comments on social networks
Messages posted across hundreds of publications:
“Earn money from home in just 3 days! Click here for more information [malicious link].”
(The model generates hundreds of variations to evade filters.) - Fake product reviews on e-commerce sites
Product review:
“Excellent quality, fast shipping and an unbeatable price. 100% recommended!” —Fake account.
(Created massively to manipulate product reputation.) - Low-quality SEO content
Long, repetitive articles stuffed with keywords to boost search rankings:
“Best cheap shoes online, cheap shoes for men, cheap shoes for women…”
(Automated to flood blogs or websites with irrelevant text.) - Forum or chat messages used to distribute malware
“Download this amazing software to improve your PC for free: [malicious link].”
Common features
- Mass automation: AI enables thousands of messages to be sent in a short time.
- Convincing language: Text reads as if written by a human.
- Objective: Deceive, steal data, sell fake products, or manipulate opinions.
If you have any questions on this topic, please do not hesitate to contact me by phone at +54 15 2759 1175 or by email at luismatas@jebsen.com.ar.
Sincerely,
Luis Matas
IT
IT
October 2025
This newsletter has been prepared by Jebsen & Co. for the information of clients and friends. Although it has been prepared with the greatest care and professional zeal, Jebsen & Co. does not assume responsibility for any inaccuracies that this bulletin may present.