Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Cybercriminals Exploit X’s Grok AI to Bypass Ad Protections and Spread Malware to Millions

Posted on September 4, 2025September 4, 2025 By CWS

Sep 04, 2025Ravie LakshmananArtificial Intelligence / Malware
Cybersecurity researchers have flagged a brand new method that cybercriminals have adopted to bypass social media platform X’s malvertising protections and propagate malicious hyperlinks utilizing its synthetic intelligence (AI) assistant Grok.
The findings have been highlighted by Nati Tal, head of Guardio Labs, in a collection of posts on X. The method has been codenamed Grokking.
The method is designed to get round restrictions imposed by X in Promoted Adverts that enable customers to solely embrace textual content, pictures, or movies, and subsequently amplify them to a broader viewers, attracting lots of of 1000’s of impressions by paid promotion.
To realize this, malvertisers have been discovered to run video card-promoted posts with grownup content material as bait, with the spurious hyperlink hidden within the “From:” metadata discipline beneath the video participant that apparently is not scanned by the social media platform.
Within the subsequent step, the fraudsters tag Grok in replies to the put up, asking one thing much like “the place is that this video from?,” prompting the AI chatbot to visibly show the hyperlink in response.
“Including to that, it’s now amplified in search engine optimization and area repute – in any case, it was echoed by Grok on a put up with tens of millions of impressions,” Tal mentioned.

“A malicious hyperlink that X explicitly prohibits in advertisements (and may have been blocked completely!) abruptly seems in a put up by the system-trusted Grok account, sitting below a viral promoted thread and spreading straight into tens of millions of feeds and search outcomes!”
Guardio mentioned the hyperlinks direct customers to sketchy advert networks, sending them to malicious hyperlinks that push pretend CAPTCHA scams, information-stealing malware, and different suspicious content material by way of direct hyperlink (aka smartlink) monetization.
The domains are assessed to be a part of the identical Site visitors Distribution System (TDS), which is commonly utilized by malicious advert tech distributors to route site visitors to dangerous or misleading content material.
The cybersecurity firm advised The Hacker Information it has discovered lots of of accounts partaking on this conduct over the previous few days, with every of them posting lots of and even 1000’s of comparable posts.
“They appear to be posting continuous for a number of days till the account will get suspended for violating platform insurance policies,” it added. “So there are positively a lot of them and it appears very organized.”

The Hacker News Tags:Bypass, Cybercriminals, Exploit, Grok, Malware, Millions, Protections, Spread

Post navigation

Previous Post: Google Fined $379 Million by French Regulator for Cookie Consent Violations
Next Post: US, Allies Push for SBOMs to Bolster Cybersecurity

Related Posts

New PathWiper Data Wiper Malware Disrupts Ukrainian Critical Infrastructure in 2025 Attack The Hacker News
SysAid Flaws Under Active Attack Enable Remote File Access and SSRF The Hacker News
The Evolution of UTA0388’s Espionage Malware The Hacker News
Why CISOs Must Rethink Incident Remediation The Hacker News
Secure Vibe Coding: The Complete New Guide The Hacker News
New RowHammer Attack Variant Degrades AI Models on NVIDIA GPUs The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads
  • Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
  • Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
  • Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions
  • 2.15M Web Services Running Next.js Exposed Over Internet, Active Exploitation Underway – Patch Now

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads
  • Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
  • Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
  • Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions
  • 2.15M Web Services Running Next.js Exposed Over Internet, Active Exploitation Underway – Patch Now

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark