Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Leverage X’s Grok AI To Amplify Malicious Links Via Promoted Posts

Posted on September 4, 2025September 4, 2025 By CWS

A brand new cyber-attack, dubbed “Grokking,” is exploiting options on the social media platform X to unfold malicious hyperlinks on an enormous scale.

Scammers are manipulating the platform’s promoting system and its generative AI, Grok, to bypass safety measures and amplify dangerous domains. This system turns X’s personal instruments into unwilling accomplices in a widespread malvertising scheme.

Based on GuardioSecurity researcher Nati Tal, the assault begins with malware selling “video card” posts, which frequently use specific or sensational “grownup” content material to lure customers.

Whereas X’s insurance policies intention to fight malvertising by disallowing hyperlinks in promoted content material, these attackers have discovered a important loophole.

The malicious hyperlink shouldn’t be positioned in the primary physique of the submit however is as an alternative embedded within the small “From:” area positioned beneath the video participant.

X’s automated safety scans appear to overlook this space. Consequently, posts can unfold extensively and get anyplace from 100,000 to over 5 million paid impressions.

The second stage of the assault leverages the platform’s AI assistant, Grok. Curious customers, seeing the usually nameless and intriguing movies, ceaselessly flip to Grok to ask for the supply.

In its effort to supply a useful reply, the AI scans the submit for data and extracts the area identify from the “From:” area.

Grok then presents this malicious hyperlink on to the consumer in its reply. For example, when requested a couple of video’s origin, Grok has been noticed responding with hyperlinks to suspicious domains, Nati Tal stated.

This course of successfully “Grokks” the malicious hyperlink, not solely delivering it to inquisitive customers but in addition amplifying its visibility and perceived legitimacy.

By having the platform’s personal AI reference the area, the scammers might profit from enhanced website positioning and a strengthened status for his or her dangerous websites, making them appear extra reliable to unsuspecting customers.

Discover this Story Attention-grabbing! Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates.

Cyber Security News Tags:Amplify, Grok, Hackers, Leverage, Links, Malicious, Posts, Promoted

Post navigation

Previous Post: US, Allies Push for SBOMs to Bolster Cybersecurity
Next Post: Sola Security Raises $35M to Bring No-Code App Building to Cybersecurity Teams

Related Posts

CISA Open-sources Malware and Forensic Analysis Tool Thorium to Public Availability Cyber Security News
Threat actors Breach High Value targets like Google in Salesforce Attacks Cyber Security News
Europol Disrupted “NoName057(16)” Hacking Group’s Infrastructure of 100+ Servers Worldwide Cyber Security News
Graphite Spyware Exploits Apple iOS Zero-Click Vulnerability to Attack Journalists Cyber Security News
Hands-on Cybersecurity Threat Hunting Guide for SOC Analysts and MSSPs Cyber Security News
Ransomware Actors Exploit Unpatched SimpleHelp RMM to Compromise Billing Software Provider Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Use Email Aliases for Privacy
  • 10 Best Cloud Penetration Testing Companies in 2025
  • 10 Best AI penetration Testing Companies in 2025
  • Noisy Bear Targets Kazakhstan Energy Sector With BarrelFire Phishing Campaign
  • “GPUGate” Malware Abuses Uses Google Ads and GitHub to Deliver Advanced Malware Payload

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Use Email Aliases for Privacy
  • 10 Best Cloud Penetration Testing Companies in 2025
  • 10 Best AI penetration Testing Companies in 2025
  • Noisy Bear Targets Kazakhstan Energy Sector With BarrelFire Phishing Campaign
  • “GPUGate” Malware Abuses Uses Google Ads and GitHub to Deliver Advanced Malware Payload

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News