Researchers Show Copilot and Grok Can Be Abused as Malware C2 Proxies

Cybersecurity researchers have disclosed that artificial intelligence (AI) assistants that support web browsing or URL fetching capabilities can be turned into stealthy command-and-control (C2) relays, a technique that could allow attackers to blend into legitimate enterprise communications and evade detection.
The attack method, which has been demonstrated against Microsoft Copilot and xAI Grok

Total
0
Shares
Leave a Reply

Your email address will not be published. Required fields are marked *

Previous Post

Keenadu Firmware Backdoor Infects Android Tablets via Signed OTA Updates

Next Post

Webinar: How Modern SOC Teams Use AI and Context to Investigate Cloud Breaches Faster

Related Posts
Total
0
Share