Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»AI platforms can be abused for stealthy malware communication
    Cybersecurity

    AI platforms can be abused for stealthy malware communication

    adminBy adminFebruary 19, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    DKnife Linux toolkit hijacks router traffic to spy, deliver malware
    Share
    Facebook Twitter LinkedIn Pinterest Email

    AI platforms can be abused for stealthy malware communication

    AI assistants like Grok and Microsoft Copilot with web browsing and URL-fetching capabilities can be abused to intermediate command-and-control (C2) activity.

    Researchers at cybersecurity company Check Point discovered that threat actors can use AI services to relay communication between the C2 server and the target machine.

    Attackers can exploit this mechanism to deliver commands and retrieve stolen data from victim systems.

    Wiz

    The researchers created a proof-of-concept to show how it all works and disclosed their findings to Microsoft and xAI.

    AI as a stealthy relay

    Instead of malware connecting directly to a C2 server hosted on the attacker’s infrastructure, Check Point’s idea was to have it communicate with an AI web interface, instructing the agent to fetch an attacker-controlled URL and receive the response in the AI’s output.

    In Check Point’s scenario, the malware interacts with the AI service using the WebView2 component in Windows 11. The researchers say that even if the component is missing on the target system, the threat actor can deliver it embedded in the malware.

    WebView2 is used by developers to show web content in the interface of native desktop applications, thus eliminating the need of a full-featured browser.

    The researchers created “a C++ program that opens a WebView pointing to either Grok or Copilot.” This way, the attacker can submit to the assistant instructions that can include commands to be executed or extract information from the compromised machine.

    Interaction flow
    Malware to AI agent interaction flow
    Source: Check Point

    The webpage responds with embedded instructions that the attacker can change at will, which the AI extracts or summarizes in response to the malware’s query.

    The malware parses the AI assistant’s response in the chat and extracts the instructions.

    Grok and Copilot summarize the C2's encrypted data response
    Grok and Copilot summarize the C2’s encrypted data response
    Source: Check Point

    This creates a bidirectional communication channel via the AI service, which is trusted by internet security tools and can thus help carry out data exchanges without being flagged or blocked.

    Check Point’s PoC, tested on Grok and Microsoft Copilot, does not require an account or API keys for the AI services, making traceability and primary infrastructure blocks less of a problem.

    “The usual downside for attackers [abusing legitimate services for C2] is how easily these channels can be shut down: block the account, revoke the API key, suspend the tenant,” explains Check Point.

    “Directly interacting with an AI agent through a web page changes this. There is no API key to revoke, and if anonymous usage is allowed, there may not even be an account to block.”

    The researchers explain that safeguards exist to block obviously malicious exchanges on the said AI platforms, but these safety checks can be easily bypassed by encrypting the data into high-entropy blobs.

    CheckPoint argues that AI as a C2 proxy is just one of multiple options for abusing AI services, which could include operational reasoning such as assessing if the target system is worth exploiting and how to proceed without raising alarms.

    BleepingComputer has contacted Microsoft to ask whether Copilot is still exploitable in the way demonstrated by Check Point and the safeguards that could prevent such attacks. A reply was not immediately available, but we will update the article when we receive one.


    tines

    Modern IT infrastructure moves faster than manual workflows can handle.

    In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.

    abused communication Malware Platforms stealthy
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleVulnerabilities in Popular PDF Platforms Allowed Account Takeover, Data Exfiltration
    Next Article Microsoft Advertising adds a multi image creative to Shopping ads
    admin
    • Website

    Related Posts

    Apple account change alerts abused to send phishing emails

    April 19, 2026

    Social media bans might steer kids into riskier corners of the internet

    April 19, 2026

    Vercel confirms breach as hackers claim to be selling stolen data

    April 19, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Galaxy S26 Ultra vs Galaxy S23 Ultra – Is it FINALLY time to upgrade? [Video]

    April 20, 2026

    That screenless Google band on Stephen Curry’s wrist may finally have a name

    April 20, 2026

    Starbucks’ New ChatGPT Integration Is a Potential Privacy Nightmare

    April 20, 2026

    I replaced my entire streaming setup with a $30 device and free apps

    April 20, 2026
    Categories
    • Blogging (65)
    • Cybersecurity (1,403)
    • Privacy & Online Earning (172)
    • SEO & Digital Marketing (850)
    • Tech Tools & Mobile / Apps (1,689)
    • WiFi / Internet & Networking (232)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Galaxy S26 Ultra vs Galaxy S23 Ultra – Is it FINALLY time to upgrade? [Video]

    April 20, 2026

    That screenless Google band on Stephen Curry’s wrist may finally have a name

    April 20, 2026

    Starbucks’ New ChatGPT Integration Is a Potential Privacy Nightmare

    April 20, 2026
    Most Popular
    • Galaxy S26 Ultra vs Galaxy S23 Ultra – Is it FINALLY time to upgrade? [Video]
    • That screenless Google band on Stephen Curry’s wrist may finally have a name
    • Starbucks’ New ChatGPT Integration Is a Potential Privacy Nightmare
    • I replaced my entire streaming setup with a $30 device and free apps
    • Blood Strike – FPS for all 1.003.650015 APK Download by NetEase Games
    • The Ray-Ban Meta (Gen 1) smart glasses just scored a rare 25% discount at Amazon
    • The best robot vacuum in Australia: reliable, effective, effort-free automated cleaners
    • Monitor spec sheets hide the one thing that actually decides whether a display feels premium
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.