Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Leverage X’s Grok AI To Amplify Malicious Links Via Promoted Posts

Hackers Leverage X’s Grok AI To Amplify Malicious Links Via Promoted Posts

Posted on September 4, 2025September 4, 2025 By CWS

A brand new cyber-attack, dubbed “Grokking,” is exploiting options on the social media platform X to unfold malicious hyperlinks on an enormous scale.

Scammers are manipulating the platform’s promoting system and its generative AI, Grok, to bypass safety measures and amplify dangerous domains. This system turns X’s personal instruments into unwilling accomplices in a widespread malvertising scheme.

Based on GuardioSecurity researcher Nati Tal, the assault begins with malware selling “video card” posts, which frequently use specific or sensational “grownup” content material to lure customers.

Whereas X’s insurance policies intention to fight malvertising by disallowing hyperlinks in promoted content material, these attackers have discovered a important loophole.

The malicious hyperlink shouldn’t be positioned in the primary physique of the submit however is as an alternative embedded within the small “From:” area positioned beneath the video participant.

X’s automated safety scans appear to overlook this space. Consequently, posts can unfold extensively and get anyplace from 100,000 to over 5 million paid impressions.

The second stage of the assault leverages the platform’s AI assistant, Grok. Curious customers, seeing the usually nameless and intriguing movies, ceaselessly flip to Grok to ask for the supply.

In its effort to supply a useful reply, the AI scans the submit for data and extracts the area identify from the “From:” area.

Grok then presents this malicious hyperlink on to the consumer in its reply. For example, when requested a couple of video’s origin, Grok has been noticed responding with hyperlinks to suspicious domains, Nati Tal stated.

This course of successfully “Grokks” the malicious hyperlink, not solely delivering it to inquisitive customers but in addition amplifying its visibility and perceived legitimacy.

By having the platform’s personal AI reference the area, the scammers might profit from enhanced website positioning and a strengthened status for his or her dangerous websites, making them appear extra reliable to unsuspecting customers.

Discover this Story Attention-grabbing! Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates.

Cyber Security News Tags:Amplify, Grok, Hackers, Leverage, Links, Malicious, Posts, Promoted

Post navigation

Previous Post: US, Allies Push for SBOMs to Bolster Cybersecurity
Next Post: Sola Security Raises $35M to Bring No-Code App Building to Cybersecurity Teams

Related Posts

4M+ Internet-Exposed Systems at Risk From Tunneling Protocol Vulnerabilities 4M+ Internet-Exposed Systems at Risk From Tunneling Protocol Vulnerabilities Cyber Security News
New ZuRu Malware Variant Weaponizes Termius SSH Client to Attack macOS Users New ZuRu Malware Variant Weaponizes Termius SSH Client to Attack macOS Users Cyber Security News
Attackers are Using WSL2 as a Stealthy Hideout Inside Windows Systems Attackers are Using WSL2 as a Stealthy Hideout Inside Windows Systems Cyber Security News
F5 BIG-IP Command Injection Vulnerability Let Attackers Execute Arbitrary System Commands F5 BIG-IP Command Injection Vulnerability Let Attackers Execute Arbitrary System Commands Cyber Security News
How Microsoft Azure Storage Logs Aid Forensics Following a Security Breach How Microsoft Azure Storage Logs Aid Forensics Following a Security Breach Cyber Security News
CrazyHunter Ransomware Attacking Healthcare Sector with Advanced Evasion Techniques CrazyHunter Ransomware Attacking Healthcare Sector with Advanced Evasion Techniques Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News