Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Leverage X’s Grok AI To Amplify Malicious Links Via Promoted Posts

Hackers Leverage X’s Grok AI To Amplify Malicious Links Via Promoted Posts

Posted on September 4, 2025September 4, 2025 By CWS

A brand new cyber-attack, dubbed “Grokking,” is exploiting options on the social media platform X to unfold malicious hyperlinks on an enormous scale.

Scammers are manipulating the platform’s promoting system and its generative AI, Grok, to bypass safety measures and amplify dangerous domains. This system turns X’s personal instruments into unwilling accomplices in a widespread malvertising scheme.

Based on GuardioSecurity researcher Nati Tal, the assault begins with malware selling “video card” posts, which frequently use specific or sensational “grownup” content material to lure customers.

Whereas X’s insurance policies intention to fight malvertising by disallowing hyperlinks in promoted content material, these attackers have discovered a important loophole.

The malicious hyperlink shouldn’t be positioned in the primary physique of the submit however is as an alternative embedded within the small “From:” area positioned beneath the video participant.

X’s automated safety scans appear to overlook this space. Consequently, posts can unfold extensively and get anyplace from 100,000 to over 5 million paid impressions.

The second stage of the assault leverages the platform’s AI assistant, Grok. Curious customers, seeing the usually nameless and intriguing movies, ceaselessly flip to Grok to ask for the supply.

In its effort to supply a useful reply, the AI scans the submit for data and extracts the area identify from the “From:” area.

Grok then presents this malicious hyperlink on to the consumer in its reply. For example, when requested a couple of video’s origin, Grok has been noticed responding with hyperlinks to suspicious domains, Nati Tal stated.

This course of successfully “Grokks” the malicious hyperlink, not solely delivering it to inquisitive customers but in addition amplifying its visibility and perceived legitimacy.

By having the platform’s personal AI reference the area, the scammers might profit from enhanced website positioning and a strengthened status for his or her dangerous websites, making them appear extra reliable to unsuspecting customers.

Discover this Story Attention-grabbing! Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates.

Cyber Security News Tags:Amplify, Grok, Hackers, Leverage, Links, Malicious, Posts, Promoted

Post navigation

Previous Post: US, Allies Push for SBOMs to Bolster Cybersecurity
Next Post: Sola Security Raises $35M to Bring No-Code App Building to Cybersecurity Teams

Related Posts

Google Releases Urgent Chrome Security Patch for Critical Flaws Google Releases Urgent Chrome Security Patch for Critical Flaws Cyber Security News
Threat Actors With Stealer Malwares Processing Millions of Credentials a Day Threat Actors With Stealer Malwares Processing Millions of Credentials a Day Cyber Security News
Web3 Developer Environments Targeted by Social Engineering Campaign Leveraging Fake Interview Software Web3 Developer Environments Targeted by Social Engineering Campaign Leveraging Fake Interview Software Cyber Security News
McDonald’s AI Hiring Bot With Password ‘123456’ Leaks Millions of Job-Seekers Data McDonald’s AI Hiring Bot With Password ‘123456’ Leaks Millions of Job-Seekers Data Cyber Security News
SSH Keys Are Crucial for Secure Remote Access but Often Remain a Blind Spot in Enterprise Security SSH Keys Are Crucial for Secure Remote Access but Often Remain a Blind Spot in Enterprise Security Cyber Security News
Hundreds of Exposed Clawdbot Gateways Leave API Keys and Private Chats Vulnerable Hundreds of Exposed Clawdbot Gateways Leave API Keys and Private Chats Vulnerable Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files
  • Browser Extensions Pose AI Data Theft Risk
  • Citrix NetScaler Vulnerability Exploited Within Days
  • India to Prohibit Chinese CCTV Sales by 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files
  • Browser Extensions Pose AI Data Theft Risk
  • Citrix NetScaler Vulnerability Exploited Within Days
  • India to Prohibit Chinese CCTV Sales by 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark