Spear Phishing in Social Engineering: Leveraging ChatGPT and Numberbook

PDF (390KB), PP.49-59

Views: 0 Downloads: 0

Author(s)

Fahad Alkamli 1 M. Rizwan Jameel Qureshi 1,*

1. Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia

* Corresponding author.

DOI: https://doi.org/10.5815/ijwmt.2026.02.05

Received: 16 Aug. 2025 / Revised: 10 Sep. 2025 / Accepted: 4 Nov. 2025 / Published: 8 Apr. 2026

Index Terms

Spear Phishing, Social Engineering, Artificial Intelligence, Generative AI, Cybersecurity, AI-Driven Attacks, Phishing Detection, Cyber Threats.

Abstract

This study explores the rising threat of spear phishing attacks enabled by artificial intelligence (AI) tools like ChatGPT, combined with public data platforms such as Numberbook. By leveraging these technologies, attackers can create highly personalized and convincing phishing messages, drastically improving their success rates compared to traditional methods. This research investigates how AI-generated content enhances the effectiveness of phishing campaigns and proposes a defense framework to combat these advanced threats. The study adopts a multi-faceted approach to cybersecurity, encompassing AI-driven detection models, regulatory measures to limit data exploitation, and comprehensive user education. Survey results indicate that most respondents recognize the effectiveness of AI detection models in identifying phishing attempts. However, the findings also highlight significant gaps in data protection regulations and user awareness programs, which remain critical vulnerabilities. By presenting empirical evidence and practical solutions, this research contributes to the field of cybersecurity, emphasizing the need for advanced detection technologies, stricter regulatory oversight, and enhanced public awareness. The insights offered are pivotal for organizations aiming to fortify defenses against increasingly sophisticated phishing attacks, ensuring a proactive and resilient approach to emerging cyber threats.

Cite This Paper

Fahad Alkamli, Rizwan Jameel Qureshi, "Spear Phishing in Social Engineering: Leveraging ChatGPT and Numberbook", International Journal of Wireless and Microwave Technologies(IJWMT), Vol.16, No.2, pp. 49-59, 2026. DOI:10.5815/ijwmt.2026.02.05

Reference

[1]M. Charfeddine, H. M. Kammoun, B. Hamdaoui, and M. Guizani, "ChatGPT’s security risks and benefits: Offensive and defensive use-cases, mitigation measures, and future implications," IEEE Access, vol. 12, pp. 30263–30310, 2024. doi: 10.1109/ACCESS.2024.3367792.
[2]M. Gupta, C. Akiri, K. Aryal, E. Parker, and L. Praharaj, "From ChatGPT to ThreatGPT: Impact of generative AI in cybersecurity and privacy," IEEE Access, vol. 11, pp. 80218–80245, 2023. doi: 10.1109/ACCESS.2023.3300381.
[3]F. Iqbal, F. Samsom, F. Kamoun, and Á. MacDermott, "When ChatGPT goes rogue: Exploring the potential cybersecurity threats of AI-powered conversational chatbots," Frontiers in Communications and Networks, vol. 4, 2023. doi: 10.3389/frcmn.2023.1220243.
[4]S. Temara, "Maximizing penetration testing success with effective reconnaissance techniques using ChatGPT," Asian Journal of Research in Computer Science, vol. 17, no. 5, pp. 19–29, Feb. 2024. doi: 10.9734/ajrcos/2024/v17i5435.
[5]R. Liu, "Reference-based Phishing Detection without a Pre-defined Reference List," in Proc. 33rd USENIX Security Symposium, 2024.
[6]M. Malatji and A. Tolah, "Artificial intelligence (AI) cybersecurity dimensions: A comprehensive framework for understanding adversarial and offensive AI," AI and Ethics, Feb. 2024. doi: 10.1007/s43681-024-00427-4.
[7]T. C. Truong, Q. B. Diep, and I. Zelinka, "Artificial intelligence in the cyber domain: Offense and defense," Symmetry, vol. 12, no. 3, pp. 1–20, Mar. 2020. doi: 10.3390/sym12030410.
[8]L. H. Aros, L. X. B. Molano, F. G. Portela, J. J. M. Hernández, and M. S. R. Barrero, “Financial fraud detection through the application of machine learning techniques: a literature review,” Humanities and Social Sciences Communications, vol. 11, no. 1, Art. 1130, Sept. 2024. DOI: 10.1057/s41599-024-03606-0.
[9]P. Chunawala and K. Patel, “A review on credit card fraud detection using machine learning,” SSRN Electronic Journal, Oct. 2024. DOI: 10.2139/ssrn.4982335.
[10]I. Y. Hafez, A. Y. Hafez, A. Saleh, A. A. Abd El-Mageed & A. A. Abohany, “A systematic review of AI-enhanced techniques in credit card fraud detection,” Journal of Big Data, vol. 12, Art. 6, Jan. 2025. DOI: 10.1186/s40537-024-01048-8.
[11]M. Alawida, "Unveiling the Dark Side of ChatGPT," Information, vol. 15, no. 1, Art. 27, 2024.
[12]M. B. Ozkok, B. Birinci, O. Cetin, B. Arief, and J. Hernandez-Castro, "Honeypot’s best friend? Investigating ChatGPT’s ability to evaluate honeypot logs," in Proc. ACM Int. Conf. on Computing Frontiers, Jun. 2024, pp. 128–135. doi: 10.1145/3655693.3655716.
[13]J. Logeshwaran, "AICSA – an artificial intelligence cyber security algorithm for cooperative P2P file sharing in social networks," ICTACT Journal on Data Science and Machine Learning, vol. 3, pp. 251-253, Dec. 2021.