Hackers Can Leverage Grok and Copilot for Stealthy Malware Communication and Control

A novel attack technique that repurposes mainstream AI assistants, specifically xAI’s Grok and Microsoft Copilot, as covert command-and-control (C2) relays, enabling attackers to tunnel malicious traffic through platforms that enterprise networks already trust and permit by default. Dubbed “AI as a C2 proxy,” the technique uncovered by Check Point Research (CPR) exploits the web-browsing and […]

The post Hackers Can Leverage Grok and Copilot for Stealthy Malware Communication and Control appeared first on Cyber Security News.

This article has been indexed from Cyber Security News

Read the original article: