Researchers Show Copilot and Grok Can Be Abused as Malware C2 Proxies
-
Researchers Show Copilot and Grok Can Be Abused as Malware C2 Proxies
Cybersecurity researchers have disclosed that artificial intelligence (AI) assistants that support web browsing or URL fetching capabilities can be turned into stealthy command-and-control (C2) relays, a technique that could allow attackers to blend into legitimate enterprise communications and evade detection.
https://thehackernews.com/2026/02/researchers-show-copilot-and-grok-can.html#copilot #crok #ai #malware #itsecurity #cybersecurity #attack #xai #ms #c2 #microsoft
-
Researchers Show Copilot and Grok Can Be Abused as Malware C2 Proxies
Cybersecurity researchers have disclosed that artificial intelligence (AI) assistants that support web browsing or URL fetching capabilities can be turned into stealthy command-and-control (C2) relays, a technique that could allow attackers to blend into legitimate enterprise communications and evade detection.
https://thehackernews.com/2026/02/researchers-show-copilot-and-grok-can.html#copilot #crok #ai #malware #itsecurity #cybersecurity #attack #xai #ms #c2 #microsoft
@kubikpixel Nothing good can come from an anonymous proxy service that the entire establishment are forcing onto everyone.
-
@kubikpixel Nothing good can come from an anonymous proxy service that the entire establishment are forcing onto everyone.
@merospit @kubikpixel I'm surprised that somebody has come up with a use case for copilot. I'm not surprised that it's the malware crowd.
-
C crossgolf_rebel@moppels.bar shared this topic