CERRT.ng Gives Advisory On CHATGPT-Based Phishing Attacks

The Computer Emergency Readiness And Response Team, a trusted CERRT.ng providing networking, collaboration, and sharing platform to ensure safe cyberspace has issued a warning advisory on CHATGPT-Based Phishing Attacks


Several phishing websites are being promoted through accounts to spread various Facebook Messenger accounts to spread various types of malware. The illegitimate Facebook accounts pose as CHATGPT pages and publish links that lead to phishing websites that look like CHATGPT websites.
This website trick users into downloading malicious files or software onto their machines.


When an unsuspecting user clicks on a link on the Facebook page, it directs the user to a phishing website that features a number of malwares that are masquerading as CHATGPT and its variants. If a user download any of the proposed software that contains potentially harmful executable files, the user’s device is susceptible to theft of sensitive data like call logs, contacts list, SMS, media files, and others.

Preventive measures

  • Be wary of clicking on links you are unsure of.
  • Avoid downloading files or Apps from unknown websites.
  • Ensure your devices, applications, and operating systems are updated.
  • Download and install apps only from Google Play
  • Store, IOS App Store or other trusted sources.
  • Install Anti-virus or Anti-malware on your devices.
  • Advisory on hundreds of banking Apps at risk from the new Nexus android trojan


The new Nexus Android banking trojan is designed to operate stealthily, with the ability to hide from detection and evade security measures.

A staggering variety of different banking and financial apps are susceptible to attack by this Trojan. The malware is being distributed through phishing pages disguised as legitimate websites called YouTube Vanced.


The trojan can intercept and steal sensitive data, including login credentials, credit card information, and other financial information, once it has been installed on your device. Additionally, it has the ability to intercept codes from the Google Authenticator app as well as two-factor authentication messages
delivered by text. The banking malware can also delete text messages that have been received on an infected device and periodically update itself by pinging a command-and-control server that is under the control of cybercriminals.

Preventive Measures

• Avoid clicking on ads or unverified links.
• Avoid visiting or downloading apps from unauthorized websites.
• Ensure to install Antivirus software is on the device.