Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors

February 22, 2026

Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History

February 22, 2026

npm’s Update to Harden Their Supply Chain, and Points to Consider

February 22, 2026
Facebook X (Twitter) Instagram
Sunday, February 22
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»AI Assistants Used as Covert Command-and-Control Relays
News

AI Assistants Used as Covert Command-and-Control Relays

Team-CWDBy Team-CWDFebruary 18, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


AI assistants with web browsing features can be repurposed as covert command-and-control (C2) channels, allowing malicious traffic to blend into routine enterprise communications.

According to new findings from Check Point Research (CPR), platforms including Grok and Microsoft Copilot can be manipulated through their public web interfaces to fetch attacker-controlled URLs and return responses.

In effect, the AI service acts as a proxy, relaying commands to infected machines and sending stolen data back out, without requiring an API key or even a registered account.

This approach shifts AI from a development aid for attackers into an operational component of malware itself.

How The Proxy Technique Works

The method relies on AI assistants that support URL fetching and content summarization. By prompting the assistant to visit a malicious website and summarise its contents, attackers can tunnel encoded data through query parameters and receive embedded commands in the AI’s reply.

In a proof-of-concept (PoC), the CPR team set up a benign-looking website and instructed the AI to retrieve specific information from it. The returned output contained commands planted in the site’s HTML, which malware could then parse and execute.

Read more on AI-driven malware: Nation-State Hackers Embrace Gemini AI for Malicious Campaigns, Google Finds

To automate the process, the researchers used a WebView2 browser component inside a C++ program, enabling malware to interact with the AI interface invisibly.

The implant gathered basic system data, appended it to a URL and asked the AI to summarise the page. The AI’s response delivered instructions back to the infected host.

Key characteristics of the technique include:

  • No authentication or API key required

  • Encrypted or encoded data to bypass safeguards

  • Traffic disguised as legitimate AI web usage

Toward Adaptive AI-Driven Malware

The research also outlined a broader trend: malware that integrates AI into its runtime decision-making. Rather than relying on fixed logic, an implant could send host information to a model and receive guidance on what actions to prioritise, whether to proceed or remain dormant and which files to target.

Such AI-driven campaigns could refine reconnaissance, avoid sandbox environments and selectively encrypt or exfiltrate high-value data, reducing noise and limiting detection. Instead of encrypting 100 GB of files, for example, attackers might focus only on critical assets, shortening execution time to minutes or less.

CPR argued that AI-enabled web features pose a service-abuse risk rather than a software flaw. 

“As AI continues to integrate into everyday workflows, it will also integrate into attacker workflows,” the researchers said.

“Understanding how these systems can be misused today is the first step toward hardening them for the future, and ensuring that AI remains more useful to defenders than to the malware that tries to hide behind it.”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleDPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies
Next Article North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations
Team-CWD
  • Website

Related Posts

News

UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors

February 22, 2026
News

Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History

February 22, 2026
News

npm’s Update to Harden Their Supply Chain, and Points to Consider

February 22, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

In memoriam: David Harley

November 12, 2025

How chatbots can help spread scams

October 14, 2025

AI-powered financial scams swamp social media

September 11, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.