“AI assistants are no longer just productivity tools; they are now part of the infrastructure that malware can abuse”: Experts warn that Copilot and Grok can be hijacked to spread malware.


  • Check Point warns that GenAI tools can be misused as C2 infrastructure
  • Malware can hide traffic by encoding data in URLs controlled by attackers via AI queries.
  • AI assistants can act as decision engines, enabling stealthy and adaptive operations against malware.

Hackers can use certain generative artificial intelligence (GenAI) tools as command and control (C2) infrastructure, hiding malicious traffic in plain sight and even using them as decision-making engines, experts have warned.

A Check Point study claims that the web browsing capabilities of Microsoft Copilot and xAI Grok can be exploited for malicious activities, although certain prerequisites remain.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top