
Hackers Can Leverage Grok and Copilot for Stealthy Malware Communication and Control
A novel attack technique that repurposes mainstream AI assistants, specifically xAI’s Grok and Microsoft Copilot, as covert command-and-control (C2) relays, enabling attackers to tunnel malicious traffic through platforms that enterprise networks already trust and permit by default. Dubbed “AI as a C2 proxy,” the technique uncovered by Check Point Research (CPR) exploits the web-browsing and […] The post Hackers Can Leverage Grok and Copilot for Stealthy Malware Communication and Control appeared first on Cyber Security News.