Hackers Can Leverage Grok and Copilot for Stealthy Malware Communication and Control