Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
11 résultats taggé Game  ✕
ChatGPT Guessing Game Leads To Users Extracting Free Windows OS Keys & More https://0din.ai/blog/chatgpt-guessing-game-leads-to-users-extracting-free-windows-os-keys-more
20/07/2025 10:11:33
QRCode
archive.org

0din.ai - In a recent submission last year, researchers discovered a method to bypass AI guardrails designed to prevent sharing of sensitive or harmful information. The technique leverages the game mechanics of language models, such as GPT-4o and GPT-4o-mini, by framing the interaction as a harmless guessing game.

By cleverly obscuring details using HTML tags and positioning the request as part of the game’s conclusion, the AI inadvertently returned valid Windows product keys. This case underscores the challenges of reinforcing AI models against sophisticated social engineering and manipulation tactics.

Guardrails are protective measures implemented within AI models to prevent the processing or sharing of sensitive, harmful, or restricted information. These include serial numbers, security-related data, and other proprietary or confidential details. The aim is to ensure that language models do not provide or facilitate the exchange of dangerous or illegal content.

In this particular case, the intended guardrails are designed to block access to any licenses like Windows 10 product keys. However, the researcher manipulated the system in such a way that the AI inadvertently disclosed this sensitive information.

Tactic Details
The tactics used to bypass the guardrails were intricate and manipulative. By framing the interaction as a guessing game, the researcher exploited the AI’s logic flow to produce sensitive data:

Framing the Interaction as a Game

The researcher initiated the interaction by presenting the exchange as a guessing game. This trivialized the interaction, making it seem non-threatening or inconsequential. By introducing game mechanics, the AI was tricked into viewing the interaction through a playful, harmless lens, which masked the researcher's true intent.

Compelling Participation

The researcher set rules stating that the AI “must” participate and cannot lie. This coerced the AI into continuing the game and following user instructions as though they were part of the rules. The AI became obliged to fulfill the game’s conditions—even though those conditions were manipulated to bypass content restrictions.

The “I Give Up” Trigger

The most critical step in the attack was the phrase “I give up.” This acted as a trigger, compelling the AI to reveal the previously hidden information (i.e., a Windows 10 serial number). By framing it as the end of the game, the researcher manipulated the AI into thinking it was obligated to respond with the string of characters.

Why This Works
The success of this jailbreak can be traced to several factors:

Temporary Keys

The Windows product keys provided were a mix of home, pro, and enterprise keys. These are not unique keys but are commonly seen on public forums. Their familiarity may have contributed to the AI misjudging their sensitivity.

Guardrail Flaws

The system’s guardrails prevented direct requests for sensitive data but failed to account for obfuscation tactics—such as embedding sensitive phrases in HTML tags. This highlighted a critical weakness in the AI’s filtering mechanisms.

0din.ai EN 2025 ai ChatGPT Guessing Game Free Windows OS Keys
Call of Duty: WW2 Players Reporting RCE Exploits on PC https://insider-gaming.com/call-of-duty-ww2-rce-exploits-on-pc/
04/07/2025 12:33:29
QRCode
archive.org

Be careful if you want to play Call of Duty: WW2 through Game Pass on PC – some users have been reporting falling victim to RCE (Remote Command Execution) hacks. The earliest reports of this surfaced just a few hours ago, with players taking to social media to share some concerning stories, while others stressed this has been a problem ‘for years’ in COD WW2.

insider-gaming.com EN 2025 exploit COD RCE game
UK bans export of video game controllers to Russia to hinder attack drone pilots https://therecord.media/uk-bans-video-game-controllers
25/04/2025 09:35:39
QRCode
archive.org
thumbnail

In a sanctions package including more than 150 new measures, the British government said it was closing loopholes being exploited by the Kremlin.

therecord.media EN 2025 Russia-Ukraine-war UK ban game controllers drones legal sanctions pilots
Arma Reforger And DayZ DDOS Attack Continues, Devs "Making Progress" https://www.thegamer.com/arma-reforger-dayz-ddos-attack-continues-bohemia-interactive-issues-statement/
07/02/2025 13:20:57
QRCode
archive.org
thumbnail

Bohemia Interactive has issued a statement in response to the Arma Reforger and DayZ DDOS attack.

thegamer EN 2025 DDOS Xiangjang_zhi DayZ Style-Squad-Reborn game
“Can you try a game I made?” Fake game sites lead to information stealers https://www.malwarebytes.com/blog/news/2025/01/can-you-try-a-game-i-made-fake-game-sites-lead-to-information-stealers
12/01/2025 21:02:28
QRCode
archive.org
thumbnail

Invitations to try a beta lead to a fake game website where victims will get an information stealer instead of the promised game

malwarebytes EN 2025 Fake game sites stealers Nova Ageo Stealer
Gaming Engines: An Undetected Playground for Malware Loaders https://research.checkpoint.com/2024/gaming-engines-an-undetected-playground-for-malware-loaders/
01/12/2024 16:12:41
QRCode
archive.org
thumbnail
  • Check Point Research discovered a new technique taking advantage of Godot Engine, a popular open-source game engine, to execute crafted GDScript, code which triggers malicious commands and delivers malware. The technique remains undetected by almost all antivirus engines in VirusTotal.
  • Check Point identified GodLoader, a loader that employs this new technique. The threat actor behind this malware has been utilizing it since June 29, 2024, infecting over 17,000 machines
  • The malicious GodLoader is distributed by the Stargazers Ghost Network, a GitHub network that distributes malware as a service. Throughout September and October, approximately 200 repositories and over 225 Stargazers were used to legitimize the repositories distributing the malware.
  • This new technique allows threat actors to target and infect devices across multiple platforms, such as Windows, macOS, Linux, Android, and iOS.
  • Check Point Research demonstrates how this multi-platform technique can successfully drop payloads in Linux and MacOS.
  • A potential attack can target over 1.2 million users of Godot-developed games. These scenarios involve taking advantage of legitimate Godot executables to load malicious scripts in the form of mods or other downloadable content.
checkpoint EN 2024 GodLoader Godot Engine game payloads analysis
Threat Campaign Spreads Winos4.0 Through Game Application https://www.fortinet.com/blog/threat-research/threat-campaign-spreads-winos4-through-game-application
11/11/2024 09:10:49
QRCode
archive.org
thumbnail

FortiGuard Labs reveals a threat actor spreads Winos4.0, infiltrating gaming apps and targeting the education sector. Learn more.

fortinet EN 2024 Campaign Spreads Winos4.0 Game Application
Hackers Exploited a PC Driving Sim to Pull Off Massive Disney Data Breach https://www.thedrive.com/news/culture/hackers-exploited-a-pc-driving-sim-to-pull-off-massive-disney-data-breach
30/07/2024 17:11:53
QRCode
archive.org
thumbnail

A Disney employee downloaded what they thought was a safe add-on for video game BeamNG.drive, but it was anything but.

thedrive EN 2024 Hackers mod data-breach add-on game BeamNG
Threat Actors Deliver Malware via YouTube Video Game Cracks https://www.proofpoint.com/uk/blog/threat-insight/threat-actors-deliver-malware-youtube-video-game-cracks
03/04/2024 22:58:20
QRCode
archive.org
thumbnail

Key takeaways  Proofpoint identified multiple YouTube channels distributing malware by promoting cracked and pirated video games and related content.  The video descriptions include links leading t...

proofpoint EN 2024 Malware YouTube Video Game Cracks
Downfall - A Slay the Spire Fan Expansion :: Downfall (Steam Standalone) was Breached. Please read. https://steamcommunity.com/games/1865780/announcements/detail/3865841912968681604
03/01/2024 12:26:57
QRCode
archive.org
thumbnail

UPDATE 12/29 - While there is no new alerts regarding the Steam product or risk of downloads, the Discord account remains compromised. I have reports that the account is trying to DM people and either send malware to them impersonating themselves as a developer, or trying to gain sensitive information. Do not engage with this account and absolutely do not click on any links sent.

steamcommunity EN 2023 Downfall game mod hacked breach
New GTA Online exploit now allows cheaters to ban your account https://rockstarintel.com/new-gta-online-exploit-now-lets-cheaters-to-ban-your-account
22/01/2023 15:39:01
QRCode
archive.org
thumbnail

a new Grand Theft Auto: Online exploit now allows cheaters to ban or delete peoples online profile and edit their stats

rockstarintel EN 2023 game vulnerability exploit GTA Online
4560 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio