Phishing campaigns involve adversaries masquerading as trusted vendors trying to trigger user behavior that enables them to exfiltrate private data. While URLs are an important part of phishing campaigns, communicative elements like text and images are central in triggering the required user behavior. Further, due to advances in phishing detection, attackers react by scaling campaigns to larger numbers and diversifying and personalizing content. In addition to established mechanisms, such as template-based generation, large language models (LLMs) can be used for phishing content generation, enabling attacks to scale in minutes, challenging existing phishing detection paradigms through personalized content, stealthy explicit phishing keywords, and dynamic adaptation to diverse attack scenarios. Countering these dynamically changing attack campaigns requires a comprehensive understanding of the complex LLM-related threat landscape. Existing studies are fragmented and focus on specific areas. In this work, we provide the first holistic examination of LLM-generated phishing content. First, to trace the exploitation pathways of LLMs for phishing content generation, we adopt a modular taxonomy documenting nine stages by which adversaries breach LLM safety guardrails. We then characterize how LLM-generated phishing manifests as threats, revealing that it evades detectors while emphasizing human cognitive manipulation. Third, by taxonomizing defense techniques aligned with generation methods, we expose a critical asymmetry that offensive mechanisms adapt dynamically to attack scenarios, whereas defensive strategies remain static and reactive. Finally, based on a thorough analysis of the existing literature, we highlight insights and gaps and suggest a roadmap for understanding and countering LLM-driven phishing at scale.
翻译:钓鱼攻击活动中,攻击者伪装成可信供应商,试图诱导用户做出导致私密数据泄露的行为。尽管URL是钓鱼攻击的重要组成部分,但文本和图像等沟通元素在触发目标用户行为中起着核心作用。此外,随着钓鱼检测技术的进步,攻击者通过扩大攻击规模、多样化及个性化内容进行应对。除基于模板生成等传统机制外,大型语言模型(LLMs)可用于生成钓鱼内容,使攻击能在数分钟内规模化,并通过个性化内容、隐蔽的显式钓鱼关键词以及对多样化攻击场景的动态适应,对现有钓鱼检测范式构成挑战。应对这些动态变化的攻击活动,需要全面理解与LLM相关的复杂威胁态势。现有研究较为零散且集中于特定领域。本研究首次对LLM生成的钓鱼内容进行系统性考察。首先,为追溯LLM在钓鱼内容生成中的利用路径,我们采用模块化分类法,记录攻击者突破LLM安全防护的九个阶段。其次,我们刻画LLM生成钓鱼内容如何表现为具体威胁,揭示其既能规避检测器,又着重于对人类认知的操纵。第三,通过对防御技术与生成方法进行对齐分类,我们暴露出关键的不对称性:攻击机制能动态适应攻击场景,而防御策略仍保持静态和被动反应。最后,基于对现有文献的全面分析,我们指出重要见解与现有不足,并为大规模理解和应对LLM驱动的钓鱼攻击提出发展路线图。