Check Point Research demonstrates how AI assistants like Grok and Microsoft Copilot can be exploited as covert command-and-control proxies without API keys or accounts. The research shows attackers can use web-based AI services to tunnel malware communications by having AI agents fetch attacker-controlled URLs and relay

17m read timeFrom research.checkpoint.com
Post cover image
Table of contents
Key PointsIntroductionAI-Driven (AID) MalwareAI Agent As A C2 ProxyWeb App PoCWeb View Instead of APIMany More Possibilities(Near)-Future AI-Driven Malware(Near)-Future AI-Driven CampaignsConclusion

Sort: