Particle.news
Download on the App Store

Researchers Show Copilot and Grok Can Be Co‑opted as Covert Malware C2 Relays

The approach exploits AI browsing to retrieve attacker pages, returning embedded instructions as a bidirectional channel without API credentials.

Overview

  • Check Point Research detailed a proof-of-concept dubbed “AI as a C2 proxy” that uses Microsoft Copilot and xAI Grok via their public web interfaces.
  • The method prompts the assistant to fetch an attacker-controlled URL, with commands hidden in the page’s HTML that malware on an already-compromised host can parse and execute.
  • Automation was demonstrated through a Windows WebView2-based C++ component, enabling malware to interact with the AI interface without user visibility.
  • The channel requires no account or API key, and encoded or encrypted data can evade platform safety checks while resembling normal AI web traffic.
  • Check Point reported its findings to Microsoft and xAI, framing the issue as service abuse comparable to living-off-trusted-sites and noting related Unit 42 research on client-side LLM misuse.