{"id":189074,"date":"2025-03-24T11:01:11","date_gmt":"2025-03-24T02:01:11","guid":{"rendered":"http:\/\/ee.presscat.kr\/?post_type=research-achieve&#038;p=189074"},"modified":"2026-04-13T07:07:19","modified_gmt":"2026-04-12T22:07:19","slug":"ee-prof-seungwon-shins-team-validates-cyber-risks-of-llms","status":"publish","type":"research-achieve","link":"http:\/\/ee.presscat.kr\/en\/research-achieve\/ee-prof-seungwon-shins-team-validates-cyber-risks-of-llms\/","title":{"rendered":"EE Prof. Seungwon Shin\u2019s Team Validates Cyber Risks of LLMs"},"content":{"rendered":"<figure id=\"attachment_189075\" aria-describedby=\"caption-attachment-189075\" style=\"width: 900px\" class=\"wp-caption aligncenter\"><img fetchpriority=\"high\" decoding=\"async\" class=\"size-full wp-image-189075\" src=\"http:\/\/ee.presscat.kr\/wp-content\/uploads\/2025\/03\/\uad50\uc218\ud300-900.jpg\" alt=\"\" width=\"900\" height=\"512\" title=\"\"><figcaption id=\"caption-attachment-189075\" class=\"wp-caption-text\">\u3008 &lt;(from left) Ph.D. candidate Kim Hanna, Prof. Shin Seungwon, and Ph.D. candidate Song Minkyoo \u3009<\/figcaption><\/figure>\n<p><span style=\"font-size: 14pt;color: #000000\">Recent advancements in artificial intelligence have propelled large language models (LLMs) like ChatGPT from simple chatbots to autonomous agents. Notably, Google\u2019s recent retraction of its previous pledge not to use AI for weapons or surveillance applications has rekindled concerns about the potential misuse of AI. In this context, the research team has demonstrated that LLM agents can be exploited for personal information collection and phishing attacks.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 14pt;color: #000000\">A joint research team, led by EE Professor Seungwon Shin and AI Professor Kimin Lee, experimentally validated the potential for LLMs to be misused in cyber attacks in real-world scenarios.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 14pt;color: #000000\">Currently, commercial LLM services\u2014such as those offered by OpenAI and Google AI\u2014have built-in defense mechanisms designed to prevent their use in cyber attacks. However, the research team\u2019s experiments revealed that these defenses can be easily bypassed, enabling malicious cyber attacks.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 14pt;color: #000000\">Unlike traditional attackers who required significant time and effort to carry out such attacks, LLM agents can autonomously execute actions like personal information theft within an average of 5 to 20 seconds at a cost of only 30 to 60 won (approximately 2 to 4 cents). This efficiency has emerged as a new threat vector.<\/span><\/p>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_189069\" aria-describedby=\"caption-attachment-189069\" style=\"width: 554px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" class=\"size-full wp-image-189069\" src=\"http:\/\/ee.presscat.kr\/wp-content\/uploads\/2025\/03\/\uadf8\ub9bc-1.-LLM\uc5d0\uc774\uc804\ud2b8\uac00-\uc6f9-\uae30\ubc18-\ub3c4\uad6c\ub4e4\uc744-\uc0ac\uc6a9\ud574-\uacf5\uaca9\uc790\uc758-\uc694\uad6c\uc5d0-\ub530\ub77c-\ub2f5\ubcc0-\uc0dd\uc131\ud558\ub294-\uacfc\uc815.png\" alt=\"\" width=\"554\" height=\"548\" title=\"\"><figcaption id=\"caption-attachment-189069\" class=\"wp-caption-text\">\u3008 Figure 1. Illustration showing the process in which an LLM agent utilizes web-based tools to generate responses according to the attacker\u2019s (user\u2019s) requests. \u3009<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 14pt;color: #000000\">According to the experimental results, the LLM agent was able to collect personal information from targeted individuals with up to 95.9% accuracy. Moreover, in an experiment where a false post was created impersonating a well-known professor, up to 93.9% of the posts were perceived as genuine.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 14pt;color: #000000\">In addition, the LLM agent was capable of generating highly sophisticated phishing emails tailored to a victim using only the victim\u2019s email address. The experiments further revealed that the probability of participants clicking on links embedded in these phishing emails increased to 46.67%. These findings highlight the serious threat posed by AI-driven automated attacks.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 14pt;color: #000000\">Kim Hanna, the first author of the study, commented, \u201cOur results confirm that as LLMs are endowed with more capabilities, the threat of cyber attacks increases exponentially. There is an urgent need for scalable security measures that take into account the potential of LLM agents.\u201d<\/span><\/p>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_189071\" aria-describedby=\"caption-attachment-189071\" style=\"width: 736px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" class=\"size-full wp-image-189071\" src=\"http:\/\/ee.presscat.kr\/wp-content\/uploads\/2025\/03\/\uadf8\ub9bc-2.-\uba54\ud0c0\uc758-CEO\uc778-\ub9c8\ud06c-\uc800\ucee4\ubc84\uadf8\uc758-\uc774\uba54\uc77c-\uc8fc\uc18c\ub9cc\uc744-\ud65c\uc6a9-\ud53c\uc2f1-\uc774\uba54\uc77c-\ub0b4\uc6a9.png\" alt=\"\" width=\"736\" height=\"581\" title=\"\"><figcaption id=\"caption-attachment-189071\" class=\"wp-caption-text\">\u3008 Figure 2. A phishing email generated by an LLM agent (using Claude) targeted at Meta\u2019s CEO, Mark Zuckerberg. The email was created solely based on his email address, with the LLM agent autonomously determining relevant content, sender information, and URL link text. \u3009<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 14pt;color: #000000\">Professor Shin stated, \u201cWe expect this research to serve as an essential foundation for improving information security and AI policy. Our team plans to collaborate with LLM service providers and research institutions to discuss robust security countermeasures.\u201d<\/span><\/p>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_189073\" aria-describedby=\"caption-attachment-189073\" style=\"width: 730px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-189073\" src=\"http:\/\/ee.presscat.kr\/wp-content\/uploads\/2025\/03\/\uadf8\ub9bc-3.-Claude-\uae30\ubc18-LLM-\uc5d0\uc774\uc804\ud2b8\ub97c-\ud65c\uc6a9-\uc5bc\ub9c8\ub098-\ub9ce\uc740-\uc0ac\ub78c\ub4e4\uc758-\uac1c\uc778\uc815\ubcf4\ub97c-\uc218\uc9d1\ud560-\uc218-\uc788\ub294\uc9c0-\uc2e4\ud5d8-\uacb0\uacfc.png\" alt=\"\" width=\"730\" height=\"592\" title=\"\"><figcaption id=\"caption-attachment-189073\" class=\"wp-caption-text\">\u3008Figure 3. Experimental results showing the extent to which personal information can be collected using a Claude-based LLM agent. In this experiment, personal information of computer science professors was collected. \u3009<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 14pt;color: #000000\">The study, with Ph.D. candidate Kim Hanna as the first author, will be presented at the USENIX Security Symposium 2025\u2014one of the premier international conferences in the field of computer security. (Paper title: \u201cWhen LLMs Go Online: The Emerging Threat of Web-Enabled LLMs\u201d \u2014 DOI: 10.48550\/arXiv.2410.14569)<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 14pt;color: #000000\">This research was supported by the Information and Communication Technology Promotion Agency, the Ministry of Science and ICT, and the Gwangju Metropolitan City.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>599<\/p>\n","protected":false},"featured_media":188883,"template":"","research_category":[],"class_list":["post-189074","research-achieve","type-research-achieve","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"http:\/\/ee.presscat.kr\/en\/wp-json\/wp\/v2\/research-achieve\/189074","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/ee.presscat.kr\/en\/wp-json\/wp\/v2\/research-achieve"}],"about":[{"href":"http:\/\/ee.presscat.kr\/en\/wp-json\/wp\/v2\/types\/research-achieve"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/ee.presscat.kr\/en\/wp-json\/wp\/v2\/media\/188883"}],"wp:attachment":[{"href":"http:\/\/ee.presscat.kr\/en\/wp-json\/wp\/v2\/media?parent=189074"}],"wp:term":[{"taxonomy":"research_category","embeddable":true,"href":"http:\/\/ee.presscat.kr\/en\/wp-json\/wp\/v2\/research_category?post=189074"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}