By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Researchers Show Copilot and Grok Can Be Abused as Malware C2 Proxies
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Researchers Show Copilot and Grok Can Be Abused as Malware C2 Proxies
Computing

Researchers Show Copilot and Grok Can Be Abused as Malware C2 Proxies

News Room
Last updated: 2026/02/17 at 2:06 PM
News Room Published 17 February 2026
Share
Researchers Show Copilot and Grok Can Be Abused as Malware C2 Proxies
SHARE

Ravie LakshmananFeb 17, 2026Malware / Artificial Intelligence

Cybersecurity researchers have disclosed that artificial intelligence (AI) assistants that support web browsing or URL fetching capabilities can be turned into stealthy command-and-control (C2) relays, a technique that could allow attackers to blend into legitimate enterprise communications and evade detection.

The attack method, which has been demonstrated against Microsoft Copilot and xAI Grok, has been codenamed AI as a C2 proxy by Check Point.

It leverages “anonymous web access combined with browsing and summarization prompts,” the cybersecurity company said. “The same mechanism can also enable AI-assisted malware operations, including generating reconnaissance workflows, scripting attacker actions, and dynamically deciding ‘what to do next’ during an intrusion.”

The development signals yet another consequential evolution in how threat actors could abuse AI systems, not just to scale or accelerate different phases of the cyber attack cycle, but also leverage APIs to dynamically generate code at runtime that can adapt its behavior based on information gathered from the compromised host and evade detection.

AI tools already act as a force multiplier for adversaries, allowing them to delegate key steps in their campaigns, whether it be for conducting reconnaissance, vulnerability scanning, crafting convincing phishing emails, creating synthetic identities, debugging code, or developing malware. But AI as a C2 proxy goes a step further.

It essentially leverages Grok and Microsoft Copilot’s web-browsing and URL-fetch capabilities to retrieve attacker-controlled URLs and return responses through their web interfaces, essentially transforming it into a bidirectional communication channel to accept operator-issued commands and tunnel victim data out.

Notably, all of this works without requiring an API key or a registered account, thereby rendering traditional approaches like key revocation or account suspension useless.

Viewed differently, this approach is no different from attack campaigns that have weaponized trusted services for malware distribution and C2. It’s also referred to as living-off-trusted-sites (LOTS).

However, for all this to happen, there is a key prerequisite: the threat actor must have already compromised a machine by some other means and installed malware, which then uses Copilot or Grok as a C2 channel using specially crafted prompts that cause the AI agent to contact the attacker-controlled infrastructure and pass the response containing the command to be executed on the host back to the malware.

Check Point also noted that an attacker could go beyond command generation to the AI agent to devise an evasion strategy and determine the next course of action by passing details about the system and validating if it’s even worth exploiting.

“Once AI services can be used as a stealthy transport layer, the same interface can also carry prompts and model outputs that act as an external decision engine, a stepping stone toward AI-Driven implants and AIOps-style C2 that automate triage, targeting, and operational choices in real time, Check Point said.

The disclosure comes weeks after Palo Alto Networks Unit 42 demonstrated a novel attack technique where a seemingly innocuous web page can be turned into a phishing site by using client-side API calls to trusted large language model (LLM) services for generating malicious JavaScript dynamically in real time.

The method is similar to Last Mile Reassembly (LMR) attacks, which involves smuggling malware through the network via unmonitored channels like WebRTC and WebSocket and piecing them directly in the victim’s browser, effectively bypassing security controls in the process.

“Attackers could use carefully engineered prompts to bypass AI safety guardrails, tricking the LLM into returning malicious code snippets,” Unit 42 researchers Shehroze Farooqi, Alex Starov, Diva-Oriane Marty, and Billy Melicher said. “These snippets are returned via the LLM service API, then assembled and executed in the victim’s browser at runtime, resulting in a fully functional phishing page.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Tesla hasn’t adopted Apple CarPlay yet for this shocking reason Tesla hasn’t adopted Apple CarPlay yet for this shocking reason
Next Article Google shares how Android 17 is making everything run smoother Google shares how Android 17 is making everything run smoother
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Apple is reportedly planning to launch AI-powered glasses, a pendant, and AirPods
Apple is reportedly planning to launch AI-powered glasses, a pendant, and AirPods
News
2026 guide to finding the perfect social media target audience
2026 guide to finding the perfect social media target audience
Computing
Meta wins patent for AI that could post for dead social media users
Meta wins patent for AI that could post for dead social media users
News
11 Influencer Marketing Campaign Examples You Should Try in 2025
Computing

You Might also Like

2026 guide to finding the perfect social media target audience
Computing

2026 guide to finding the perfect social media target audience

21 Min Read

11 Influencer Marketing Campaign Examples You Should Try in 2025

23 Min Read
Tyler Perry Pauses 0 Million Studio Expansion Due To Open AI’s Sora – Automators Lab
Computing

Tyler Perry Pauses $800 Million Studio Expansion Due To Open AI’s Sora – Automators Lab

4 Min Read
How To Get More Customer Feedback via Social Media |
Computing

How To Get More Customer Feedback via Social Media |

17 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?