Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Cybercriminals Exploit X’s Grok AI to Bypass Ad Protections and Spread Malware to Millions

Cybercriminals Exploit X’s Grok AI to Bypass Ad Protections and Spread Malware to Millions

Posted on September 4, 2025September 4, 2025 By CWS

Sep 04, 2025Ravie LakshmananArtificial Intelligence / Malware
Cybersecurity researchers have flagged a brand new method that cybercriminals have adopted to bypass social media platform X’s malvertising protections and propagate malicious hyperlinks utilizing its synthetic intelligence (AI) assistant Grok.
The findings have been highlighted by Nati Tal, head of Guardio Labs, in a collection of posts on X. The method has been codenamed Grokking.
The method is designed to get round restrictions imposed by X in Promoted Adverts that enable customers to solely embrace textual content, pictures, or movies, and subsequently amplify them to a broader viewers, attracting lots of of 1000’s of impressions by paid promotion.
To realize this, malvertisers have been discovered to run video card-promoted posts with grownup content material as bait, with the spurious hyperlink hidden within the “From:” metadata discipline beneath the video participant that apparently is not scanned by the social media platform.
Within the subsequent step, the fraudsters tag Grok in replies to the put up, asking one thing much like “the place is that this video from?,” prompting the AI chatbot to visibly show the hyperlink in response.
“Including to that, it’s now amplified in search engine optimization and area repute – in any case, it was echoed by Grok on a put up with tens of millions of impressions,” Tal mentioned.

“A malicious hyperlink that X explicitly prohibits in advertisements (and may have been blocked completely!) abruptly seems in a put up by the system-trusted Grok account, sitting below a viral promoted thread and spreading straight into tens of millions of feeds and search outcomes!”
Guardio mentioned the hyperlinks direct customers to sketchy advert networks, sending them to malicious hyperlinks that push pretend CAPTCHA scams, information-stealing malware, and different suspicious content material by way of direct hyperlink (aka smartlink) monetization.
The domains are assessed to be a part of the identical Site visitors Distribution System (TDS), which is commonly utilized by malicious advert tech distributors to route site visitors to dangerous or misleading content material.
The cybersecurity firm advised The Hacker Information it has discovered lots of of accounts partaking on this conduct over the previous few days, with every of them posting lots of and even 1000’s of comparable posts.
“They appear to be posting continuous for a number of days till the account will get suspended for violating platform insurance policies,” it added. “So there are positively a lot of them and it appears very organized.”

The Hacker News Tags:Bypass, Cybercriminals, Exploit, Grok, Malware, Millions, Protections, Spread

Post navigation

Previous Post: Google Fined $379 Million by French Regulator for Cookie Consent Violations
Next Post: US, Allies Push for SBOMs to Bolster Cybersecurity

Related Posts

Webinar on Securing AI Agents Against Cyber Threats Webinar on Securing AI Agents Against Cyber Threats The Hacker News
TARmageddon Flaw in Async-Tar Rust Library Could Enable Remote Code Execution TARmageddon Flaw in Async-Tar Rust Library Could Enable Remote Code Execution The Hacker News
UNC1549 Hacks 34 Devices in 11 Telecom Firms via LinkedIn Job Lures and MINIBIKE Malware UNC1549 Hacks 34 Devices in 11 Telecom Firms via LinkedIn Job Lures and MINIBIKE Malware The Hacker News
Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks The Hacker News
GitHub Account Compromise Led to Salesloft Drift Breach Affecting 22 Companies GitHub Account Compromise Led to Salesloft Drift Breach Affecting 22 Companies The Hacker News
FBI Warns of UNC6040 and UNC6395 Targeting Salesforce Platforms in Data Theft Attacks FBI Warns of UNC6040 and UNC6395 Targeting Salesforce Platforms in Data Theft Attacks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark