← Back to feed

The Malicious LLM Ecosystem: WormGPT, FraudGPT, GhostGPT and Beyond

Date: 2026-03-20
TLP: TLP:CLEAR
Tags: Malicious Tool, Underground Economy

Executive Summary

The underground market for malicious LLM tools has expanded steadily since mid-2023, with at least a dozen distinct offerings identified across Telegram channels and dark web forums. This report maps the current ecosystem, tracking tool availability, pricing, capabilities, and the evolution from simple jailbreak wrappers to purpose-built offensive AI platforms.

Detailed Findings

The malicious LLM market emerged in July 2023 with WormGPT, a service built on the GPT-J 6B model with safety guardrails removed. WormGPT was marketed primarily for business email compromise content generation and demonstrated that removing alignment constraints from open-weight models created a commercially viable underground product.

FraudGPT followed within weeks, offering a subscription model at $200/month and positioning itself as a general-purpose offensive AI tool. Its capabilities included phishing page generation, malware code writing, and social engineering content creation. The tool's operator, going by the handle "CanadianKingpin," promoted it aggressively across multiple dark web marketplaces.

GhostGPT emerged in early 2024 as a Telegram-native service, lowering the barrier to entry by eliminating the need for dark web access. Users interact with a Telegram bot that proxies requests to a jailbroken LLM backend. The convenience of Telegram as a distribution channel has made GhostGPT one of the more widely adopted tools in the ecosystem.

Evolution of the Market

The ecosystem has evolved along several axes. Early tools were simple jailbreak wrappers around existing models. Current offerings increasingly use fine-tuned models trained specifically on offensive security content, red team playbooks, and exploitation code. Some operators have moved from single-model offerings to multi-model platforms that route requests to whichever backend model performs best for the specific task.

Pricing ranges from $50/month for basic access to $500+ for premium tiers with dedicated infrastructure and higher request limits. Some operators offer pay-per-query models for occasional users.

Tool Inventory

Currently tracked malicious LLM tools include WormGPT (v1 through v3), FraudGPT, GhostGPT, DarkGPT, EvilGPT, DarkBARD, XXXGPT, WolfGPT, and several unnamed Telegram bot services. The proliferation of offerings suggests demand is strong and the barrier to creating new services remains low, particularly as more capable open-weight models become available.

MITRE ATT&CK Mapping

TechniqueIDContext
Phishing: Spearphishing AttachmentT1566.001BEC and phishing content generation
User Execution: Malicious LinkT1204.001Phishing page creation
Command and Scripting InterpreterT1059Malware code generation
Obfuscated Files or InformationT1027Code obfuscation assistance

IOCs

Domains

wormgpt.ai
fraudgpt.com
ghostgpt.chat
darkgpt.bot

Splunk Format

"wormgpt.ai" OR "fraudgpt.com" OR "ghostgpt.chat" OR "darkgpt.bot"

Detection Recommendations

Monitor for access to known malicious LLM service domains and Telegram bot APIs from corporate networks. DNS and proxy log analysis for the listed domains provides the most straightforward detection path. Browser history forensics on compromised or suspect machines should include checks for these domains.

References