News
100K+ Compromised ChatGPT Accounts Found On Dark Web
Egypt, Morocco, and Algeria top the list in the Middle Eastern region.
Global cybersecurity leader Group-IB has identified 101,134 infected devices with saved ChatGPT credentials. Throughout 2023, the company’s Threat Intelligence Platform found compromised account details in 26,802 malware logs traded on dark web marketplaces.

According to Group-IB’s findings, the Asia-Pacific region suffered the greatest concentration of ChatGPT credentials offered for sale, followed by the Middle East and Africa (MEA) region in second place.
Group-IB tech experts explained that when employees take advantage of ChatGPT to optimize business communications and marketing texts, the queries and responses are stored within the AI app. Consequently, any unauthorized access to a ChatGPT account could unearth a wealth of sensitive information.
Also Read: The Largest Data Breaches In The Middle East
Group-IB’s dark web analysis revealed that most compromised ChatGPT accounts were breached by a popular malware program known as “Raccoon Info Stealer”. The virus is often sent by email and can be used by hackers to gain access to sensitive data stored in internet browsers.
In the MENA area, accounts from users in Egypt, Morocco, Algeria, and Turkey topped the “most-infected” list, potentially exposing companies in the region to multiple threat actors.

“Many enterprises are integrating ChatGPT into their operational flow,” explained Dmitry Shestakov, Head of Threat Intelligence at Group-IB. “Employees enter classified correspondences or use the bot to optimize proprietary code. Given that ChatGPT’s standard configuration retains all conversations, this could inadvertently offer a trove of sensitive intelligence to threat actors if they obtain account credentials. At Group-IB, we continuously monitor underground communities to identify such accounts promptly”.
To mitigate the risks posed by compromised ChatGPT accounts, Group-IB suggests that users update passwords using current best practices while also implementing two-factor authentication.
News
Nano Banana 2 Arrives In MENA For Google Gemini Users
Google brings its latest image model to Gemini and Search, adding 4K output and tighter text control for regional users.
Google has opened access to Nano Banana 2 across the Middle East and North Africa, pushing its newest image model into everyday tools rather than keeping it inside the exclusive (and expensive) Pro tier.
The rollout spans the Google Gemini desktop and mobile apps, and extends to Google Search through Lens and AI Mode. Developers can also test it in preview via AI Studio and the Gemini API.
Nano Banana 2 runs on Gemini Flash, Google’s fast inference layer. The focus is speed, but also control. Users can export visuals from 512px up to 4K, adjusting aspect ratios for everything from vertical social posts to widescreen displays.
The model maintains character likeness across up to five figures and preserves fidelity for as many as 14 objects within a single workflow. This enables visual continuity across scenes, iterations, or edits — supporting projects like short films, storyboards, and multi-scene narratives. Text rendering has also been improved, delivering legible typography in mockups and greeting cards, with built-in translation and localization directly within images.
Also Read: RØDE Adds Direct iPhone Pairing To Wireless GO And Pro Mics
Under the hood, the system taps Gemini’s broader knowledge base and pulls in real-time information and imagery from web search to render specific subjects more accurately. Lighting and fine detail have been upgraded, without slowing output.
By embedding the model inside Gemini and Search, Google is normalizing advanced image generation for a mass audience. In MENA, where startups and marketing teams are leaning heavily on AI to scale content across languages and borders, that shift lands at a practical moment.
The move also folds creative tooling deeper into search itself, so that image generation is no longer a separate workflow. It now sits right next to the query box.
