Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Leverage X’s Grok AI To Amplify Malicious Links Via Promoted Posts

Hackers Leverage X’s Grok AI To Amplify Malicious Links Via Promoted Posts

Posted on September 4, 2025September 4, 2025 By CWS

A brand new cyber-attack, dubbed “Grokking,” is exploiting options on the social media platform X to unfold malicious hyperlinks on an enormous scale.

Scammers are manipulating the platform’s promoting system and its generative AI, Grok, to bypass safety measures and amplify dangerous domains. This system turns X’s personal instruments into unwilling accomplices in a widespread malvertising scheme.

Based on GuardioSecurity researcher Nati Tal, the assault begins with malware selling “video card” posts, which frequently use specific or sensational “grownup” content material to lure customers.

Whereas X’s insurance policies intention to fight malvertising by disallowing hyperlinks in promoted content material, these attackers have discovered a important loophole.

The malicious hyperlink shouldn’t be positioned in the primary physique of the submit however is as an alternative embedded within the small “From:” area positioned beneath the video participant.

X’s automated safety scans appear to overlook this space. Consequently, posts can unfold extensively and get anyplace from 100,000 to over 5 million paid impressions.

The second stage of the assault leverages the platform’s AI assistant, Grok. Curious customers, seeing the usually nameless and intriguing movies, ceaselessly flip to Grok to ask for the supply.

In its effort to supply a useful reply, the AI scans the submit for data and extracts the area identify from the “From:” area.

Grok then presents this malicious hyperlink on to the consumer in its reply. For example, when requested a couple of video’s origin, Grok has been noticed responding with hyperlinks to suspicious domains, Nati Tal stated.

This course of successfully “Grokks” the malicious hyperlink, not solely delivering it to inquisitive customers but in addition amplifying its visibility and perceived legitimacy.

By having the platform’s personal AI reference the area, the scammers might profit from enhanced website positioning and a strengthened status for his or her dangerous websites, making them appear extra reliable to unsuspecting customers.

Discover this Story Attention-grabbing! Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates.

Cyber Security News Tags:Amplify, Grok, Hackers, Leverage, Links, Malicious, Posts, Promoted

Post navigation

Previous Post: US, Allies Push for SBOMs to Bolster Cybersecurity
Next Post: Sola Security Raises $35M to Bring No-Code App Building to Cybersecurity Teams

Related Posts

Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users Cyber Security News
Kibana Crowdstrike Connector Vulnerability Exposes Protected Credentials Kibana Crowdstrike Connector Vulnerability Exposes Protected Credentials Cyber Security News
Hackers Exploit Critical WebLogic RCE Flaw Rapidly Hackers Exploit Critical WebLogic RCE Flaw Rapidly Cyber Security News
Multiple vulnerabilities in Cisco Unified CCX Allow Attackers to Execute Arbitrary Commands Multiple vulnerabilities in Cisco Unified CCX Allow Attackers to Execute Arbitrary Commands Cyber Security News
Splunk Universal Forwarder on Windows Lets Non-Admin Users Access All Contents Splunk Universal Forwarder on Windows Lets Non-Admin Users Access All Contents Cyber Security News
ILSpy Site Hacked, Spreads Malware to Developers ILSpy Site Hacked, Spreads Malware to Developers Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Mythos Excels in Vulnerability Detection, Faces Varied Challenges
  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Mythos Excels in Vulnerability Detection, Faces Varied Challenges
  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark