’A CRM for cybercriminals’ – SpamGPT makes cybercriminals’ wildest dreams come true with business-grade marketing tools and features
By Efosa Udinmwen
Copyright techradar
Skip to main content
Tech Radar Pro
Tech Radar Gaming
Close main menu
the business technology experts
België (Nederlands)
Deutschland
North America
US (English)
Australasia
New Zealand
View Profile
Search TechRadar
Expert Insights
Website builders
Web hosting
Best web hosting
Best office chairs
Best website builder
Best antivirus
Expert Insights
Don’t miss these
Democratized cybercrime: a new lower bar for hackers and higher stakes for security
Hook, line and sinker: how to detect and protect your business from phishing attacks
Hackers are using fake Zoom or Microsoft Teams invites to spy on all your workplace activity
Watch out AI fans – cybercriminals are using jailbroken Mistral and Grok tools to build powerful new malware
SMBs are being hit by malicious productivity tools – Zoom and ChatGPT spoofed by hackers
Cyber Crime
5 worrying ways AI is being used by cybercriminals to target millions of victims
Enterprise security faces new challenge as attackers master art of digital impersonation
Phishing emails are getting smarter – and using some new tricks to snare victims
Double check your Microsoft 365 and Google accounts – this VoidProxy phishing service is hitting them hard
AI-powered phishing attacks are on the rise and getting smarter – here’s how to stay safe
How XWorm is fueling the rise of plug-and-play malware
What is DMARC and why it could prevent your organization from being hacked by cybercriminals
Criminals and scammers are using hacked websites and expired domain names to ‘poison’ ChatGPT with spammy recommendations – here’s how to stay safe
Top AI website builder Lovable hit in worrying cyberattack – here’s what we know
Malicious URLs and phishing scams remain a constant threat for businesses – here’s what can be done
’A CRM for cybercriminals’ – SpamGPT makes cybercriminals’ wildest dreams come true with business-grade marketing tools and features
Efosa Udinmwen
20 September 2025
SpamGPT reduces the skill barrier for mass spam and ransomware campaigns
When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.
(Image credit: Shutterstock)
SpamGPT turns phishing into an automated process with minimal expertise
Attackers can rotate multiple SMTP servers to dodge email throttling
Real-time inbox monitoring enables immediate adjustments to phishing strategies
Many of us are familiar with ChatGPT, but you may not have heard of SpamGPT, a new professional-grade email campaign tool created for cybercriminals.
Researchers at Varonis have revealed this platform offers “all the conveniences a Fortune 500 marketer might expect, but adapted for cybercrime.”
Its interface copies legitimate marketing dashboards, enabling attackers to design, schedule, and monitor large-scale spam and phishing operations with minimal technical expertise.
You may like
Democratized cybercrime: a new lower bar for hackers and higher stakes for security
Hook, line and sinker: how to detect and protect your business from phishing attacks
Hackers are using fake Zoom or Microsoft Teams invites to spy on all your workplace activity
Infrastructure and deliverability capabilities
By integrating AI tools directly into the platform, SpamGPT can generate convincing phishing content, refine subject lines, and suggest optimizations for scams.
This shifts phishing from a craft requiring skill to a process that even low-level criminals can execute.
“SpamGPT is essentially a CRM for cybercriminals, automating phishing at scale, personalizing attacks with stolen data, and optimizing conversion rates much like a seasoned marketer would. It’s also a chilling reminder that threat actors are embracing AI tools just as fast as defenders are,” said Rob Sobers, CMO at Varonis.
SpamGPT’s built-in modules handle SMTP/IMAP setup, inbox monitoring, and deliverability testing.
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
Contact me with news and offers from other Future brandsReceive email from us on behalf of our trusted partners or sponsorsBy submitting your information you agree to the Terms & Conditions and Privacy Policy and are aged 16 or over.
Attackers can bulk import SMTP credentials, validate them through a built-in checker, and rotate multiple servers to avoid throttling.
IMAP monitoring allows them to observe replies, bounces, and inbox placement.
Its automated inbox check feature sends test messages and instantly verifies whether they reached the inbox or spam folder, providing real-time feedback before campaigns go live.
You may like
Democratized cybercrime: a new lower bar for hackers and higher stakes for security
Hook, line and sinker: how to detect and protect your business from phishing attacks
Hackers are using fake Zoom or Microsoft Teams invites to spy on all your workplace activity
These functions, combined with campaign analytics, mirror legitimate marketing CRMs but are repurposed to facilitate phishing, ransomware, or other malicious payloads.
SpamGPT’s developers market the toolkit as an all-in-one spam-as-a-service solution.
By offering a straightforward graphical interface and detailed documentation, it reduces the need for specialized skills or deep knowledge of email protocols.
Features like “SMTP cracking mastery” tutorials instruct buyers on acquiring or compromising servers, while custom header options allow spoofing of trusted brands or domains.
This makes it possible for attackers with limited experience to bypass basic email authentication protections and deploy campaigns at scale.
The rise of SpamGPT suggests that phishing and ransomware incidents could become more frequent and advanced.
This campaign can also deliver malware disguised as harmless correspondence by bypassing spam filters and blending with legitimate mail traffic.
While this may sound alarming, there are several measures individuals and enterprises can take to stay safe.
How to stay safe
Strengthen email authentication with DMARC, SPF, and DKIM to prevent spoofed domains.
Deploy AI-powered tools to detect phishing emails generated by large language models.
Maintain robust malware removal procedures and keep regular, updated data backups.
Enforce multi-factor authentication on all accounts to limit stolen credential misuse.
Provide continuous phishing awareness training so employees can recognize suspicious emails.
Use network segmentation and least-privilege access controls to limit malware spread.
Keep all software and security patches updated to close exploitable vulnerabilities.
Test and refine an incident response plan to ensure quick, effective recovery.
You might also like
These are the best firewall offerings around today
Common internet scams and how to avoid them
Chinese firms now have just an hour to report cybersecurity incidents
Efosa Udinmwen
Freelance Journalist
Efosa has been writing about technology for over 7 years, initially driven by curiosity but now fueled by a strong passion for the field. He holds both a Master’s and a PhD in sciences, which provided him with a solid foundation in analytical thinking. Efosa developed a keen interest in technology policy, specifically exploring the intersection of privacy, security, and politics. His research delves into how technological advancements influence regulatory frameworks and societal norms, particularly concerning data protection and cybersecurity. Upon joining TechRadar Pro, in addition to privacy and technology policy, he is also focused on B2B security products. Efosa can be contacted at this email: udinmwenefosa@gmail.com
You must confirm your public display name before commenting
Please logout and then login again, you will then be prompted to enter your display name.
Democratized cybercrime: a new lower bar for hackers and higher stakes for security
Hook, line and sinker: how to detect and protect your business from phishing attacks
Hackers are using fake Zoom or Microsoft Teams invites to spy on all your workplace activity
Watch out AI fans – cybercriminals are using jailbroken Mistral and Grok tools to build powerful new malware
SMBs are being hit by malicious productivity tools – Zoom and ChatGPT spoofed by hackers
5 worrying ways AI is being used by cybercriminals to target millions of victims
Latest in Security
VPS servers hijacked into malware proxies – here’s how to stay safe
Two teenagers charged over cyber hack on Transport for London
WatchGuard warns users Firebox firewalls may have a critical issue – here’s what we know
UK’s MI6 opens dark web portal Silent Courier to recruit Russian spies
New Gold Salem ransomware could be the most worrying new strain we’ve seen for a while
Most companies admit their current security can’t stop AI cybercrime
Latest in News
The latest DJI Osmo Nano leak gives us specs and images for the Insta360 GO 3S rival
A major Samsung One 8.5 UI leak may have revealed the next big software update headed for your Galaxy phone
How to share your Gemini Gems custom AI experts with all your friends
Anthropic’s CEO gives ‘a 25% chance things go really, really badly’ with AI
ICYMI: the week’s 7 biggest tech stories from new Meta smart glasses to stylish cheap earbuds
This iOS 26 feature is causing drama at Apple Stores for iPhone 17 trade-ins – here’s how to avoid the same mistake
LATEST ARTICLES
Black Friday storage bloodbath incoming! Micron, Sandisk set to dramatically increase NAND and DRAM prices, with a direct impact expected on SSD and RAM prices within weeks
I’ve tested a whole load of Shark vacuums, and these are the 3 I’d buy with my own money
The funky JBL Go 4 is back to its lowest price this year
Asus just launched another 162-inch 4K Micro LED monitor – yes, a monitor, not a TV, and it’s almost as big as a wall
Laser Processing Units could give traditional CPUs, GPUs and quantum computers a run for their money – but don’t expect them to run Windows anytime soon
TechRadar is part of Future US Inc, an international media group and leading digital publisher. Visit our corporate site.
Contact Future’s experts
Terms and conditions
Privacy policy
Cookies policy
Advertise with us
Web notifications
Accessibility Statement
Future US, Inc. Full 7th Floor, 130 West 42nd Street,
Please login or signup to comment
Please wait…