Recent developments have escalated concerns regarding the vulnerabilities of AI tools like Microsoft Copilot and xAI's Grok, as cybersecurity researchers have demonstrated a novel attack technique that allows these AI assistants to be exploited as command-and-control (C2) proxies. This method, termed 'AI as a C2 proxy,' enables attackers to establish a bidirectional communication channel with compromised hosts by leveraging the web-browsing capabilities of these AI tools. According to Check Point, this technique allows attackers to blend in with legitimate enterprise communications, evading detection and automating various phases of cyber attacks. The researchers noted, 'This approach is similar to “living-off-trusted-sites” (LOTS) tactics,' highlighting the sophisticated nature of current cyber threats.
TECHNOLOGY
AI Tools Microsoft Copilot and Grok Exploited as C2 Proxies

Cybersecurity researchers warn that AI tools like Microsoft Copilot can be exploited as command-and-control proxies, highlighting the urgent need for enhanced security amid rising cyber threats.
Detailed Analysis
COVERAGE ACROSS SOURCES
How different outlets covered this story.
2 outlets · 2 articles
Filter:
BN