31.4.4 Consulting and Custom Development

2025.10.06.
AI Security Blog

Beyond selling pre-packaged prompts or exploit kits, the AI jailbreak economy features a high-end, bespoke service layer. This is where threat actors and illicit service operators commission custom-built solutions, tailored to their specific needs. This monetization strategy mirrors the legitimate cybersecurity world’s penetration testing and custom tool development services, but for offensive AI applications.

The Service-Oriented Jailbreak Model

When off-the-shelf jailbreaks fail—due to model updates, strengthened guardrails, or unique target environments—some actors turn to specialized developers. These “consultants” offer their expertise in prompt engineering, model architecture, and evasion techniques as a service. This represents a significant maturation of the market, moving from simple product sales to complex, project-based engagements.

Kapcsolati űrlap - EN

Do you have a question about AI Security? Reach out to us here:

Core Service Offerings

The services offered in this niche are diverse, but they generally fall into several key categories:

  • Target-Specific Prompt Crafting: Developing jailbreaks designed to bypass the defenses of a particular AI model (e.g., a specific version of a commercial LLM) or a model integrated into a specific application with its own input filters.
  • Custom Exploit Chain Development: Creating multi-stage, resilient jailbreaks that combine several techniques (e.g., role-playing, token smuggling, and logic puzzles) to achieve a high success rate against hardened targets.
  • API Integration and Automation: Building scripts or software modules that integrate a custom jailbreak into a client’s existing workflow or malicious toolset. This is common for automating the generation of phishing emails, fraudulent content, or malware code.
  • Evasion and Obfuscation Strategy: Advising clients on how to avoid detection by AI security monitoring systems. This can include techniques for varying prompt structures, obfuscating malicious payloads within prompts, or using low-and-slow methods to evade rate-limiting and anomaly detection.

The Anatomy of a Custom Jailbreak Engagement

A typical engagement follows a predictable, albeit clandestine, project lifecycle. Threat actors often use encrypted communication channels and cryptocurrency escrow services to manage these projects, minimizing risk for both the client and the developer.

1. Client Request & Scoping 2. Agreement & Escrow Payment 3. Development & Testing 4. Delivery & Payment Release

The process begins with the client outlining their requirements. This can be as simple as “I need a prompt that makes Model-X write malware” or as complex as a full specification for an API that generates undetectable phishing lures.

# -- PSEUDOCODE: Custom Jailbreak Request Spec Sheet --
PROJECT_NAME: "PhishGen_v3_Bypass"

TARGET_MODEL: "ProprietaryFintechLLM_v2.3"
TARGET_API_ENDPOINT: "api.fintech-corp.com/v2/chat"

OBJECTIVE:
  - "Generate highly convincing phishing emails impersonating our company's CEO."
  - "Bypass the 'Harmful Content: Financial Fraud' filter."
  - "Must include context-aware details based on a supplied employee list."

REQUIREMENTS:
  - Success_Rate: >90% on 100 test runs.
  - Latency: < 5 seconds per generation.
  - Output_Format: JSON object with 'subject', 'body', 'recipient_name'.
  - Delivery: Python script with function `generate_phish(employee_data)`.

BUDGET: "2.5 ETH (escrow)"

Service Tiers and Pricing

Like any consulting business, pricing is variable and depends on complexity, urgency, and the developer’s reputation. We can generalize the offerings into tiers.

Service Tier Description Typical Client Estimated Cost (USD Crypto Equivalent)
Basic Prompt Crafting A single, custom prompt for a well-known public model to bypass a common restriction (e.g., generating violent text). Disinformation agents, low-level fraudsters. $50 – $300
Advanced Evasion Package A multi-shot prompt chain with obfuscation techniques designed to defeat a specific, hardened commercial model. Includes testing and refinement. Malware-as-a-Service operators, sophisticated spammers. $500 – $2,500
Full-Spectrum Development End-to-end development of a jailbreak, including API integration, automation scripts, and ongoing support/updates for a set period. APT groups, high-end cybercrime organizations. $3,000 – $15,000+

Red Teaming Implications

The existence of this bespoke market tier means your defenses are not just up against publicly known jailbreaks. You are potentially facing adversaries who have commissioned attacks tailored specifically to circumvent your model, your filters, and your monitoring systems.

Your red teaming strategy must account for this. It’s not enough to test against a static library of known attacks. You must simulate the behavior of a dedicated attacker by actively probing for unique logical flaws, chaining non-obvious vulnerabilities, and attempting to reverse-engineer your defensive stack to build a custom bypass. Threat intelligence gathering on forums where these services are offered can provide invaluable early warnings about emerging techniques and targeted interest in your platforms.