Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Cybercriminals Exploit X’s Grok AI to Bypass Ad Protections and Spread Malware to Millions

Posted on September 4, 2025September 4, 2025 By CWS

Sep 04, 2025Ravie LakshmananArtificial Intelligence / Malware
Cybersecurity researchers have flagged a brand new method that cybercriminals have adopted to bypass social media platform X’s malvertising protections and propagate malicious hyperlinks utilizing its synthetic intelligence (AI) assistant Grok.
The findings have been highlighted by Nati Tal, head of Guardio Labs, in a collection of posts on X. The method has been codenamed Grokking.
The method is designed to get round restrictions imposed by X in Promoted Adverts that enable customers to solely embrace textual content, pictures, or movies, and subsequently amplify them to a broader viewers, attracting lots of of 1000’s of impressions by paid promotion.
To realize this, malvertisers have been discovered to run video card-promoted posts with grownup content material as bait, with the spurious hyperlink hidden within the “From:” metadata discipline beneath the video participant that apparently is not scanned by the social media platform.
Within the subsequent step, the fraudsters tag Grok in replies to the put up, asking one thing much like “the place is that this video from?,” prompting the AI chatbot to visibly show the hyperlink in response.
“Including to that, it’s now amplified in search engine optimization and area repute – in any case, it was echoed by Grok on a put up with tens of millions of impressions,” Tal mentioned.

“A malicious hyperlink that X explicitly prohibits in advertisements (and may have been blocked completely!) abruptly seems in a put up by the system-trusted Grok account, sitting below a viral promoted thread and spreading straight into tens of millions of feeds and search outcomes!”
Guardio mentioned the hyperlinks direct customers to sketchy advert networks, sending them to malicious hyperlinks that push pretend CAPTCHA scams, information-stealing malware, and different suspicious content material by way of direct hyperlink (aka smartlink) monetization.
The domains are assessed to be a part of the identical Site visitors Distribution System (TDS), which is commonly utilized by malicious advert tech distributors to route site visitors to dangerous or misleading content material.
The cybersecurity firm advised The Hacker Information it has discovered lots of of accounts partaking on this conduct over the previous few days, with every of them posting lots of and even 1000’s of comparable posts.
“They appear to be posting continuous for a number of days till the account will get suspended for violating platform insurance policies,” it added. “So there are positively a lot of them and it appears very organized.”

The Hacker News Tags:Bypass, Cybercriminals, Exploit, Grok, Malware, Millions, Protections, Spread

Post navigation

Previous Post: Google Fined $379 Million by French Regulator for Cookie Consent Violations
Next Post: US, Allies Push for SBOMs to Bolster Cybersecurity

Related Posts

HPE Issues Security Patch for StoreOnce Bug Allowing Remote Authentication Bypass The Hacker News
Chinese TA415 Uses VS Code Remote Tunnels to Spy on U.S. Economic Policy Experts The Hacker News
HiddenGh0st, Winos and kkRAT Exploit SEO, GitHub Pages in Chinese Malware Attacks The Hacker News
Over 70 Organizations Across Multiple Sectors Targeted by China-Linked Cyber Espionage Group The Hacker News
Why Built-In Protections Aren’t Enough for Modern Data Resilience The Hacker News
State-Sponsored Hackers Exploiting Libraesva Email Security Gateway Vulnerability The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Attacking Remote Desktop Protocol Services With 30,000+ New IP Addresses Daily
  • Automatic BitLocker Encryption May Silently Lock Away Your Data
  • CISA Warns of Windows SMB Vulnerability Actively Exploited in Attacks
  • 71,000+ WatchGuard Devices Vulnerable to Remote Code Execution Attacks
  • Five New Exploited Bugs Land in CISA’s Catalog — Oracle and Microsoft Among Targets

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Attacking Remote Desktop Protocol Services With 30,000+ New IP Addresses Daily
  • Automatic BitLocker Encryption May Silently Lock Away Your Data
  • CISA Warns of Windows SMB Vulnerability Actively Exploited in Attacks
  • 71,000+ WatchGuard Devices Vulnerable to Remote Code Execution Attacks
  • Five New Exploited Bugs Land in CISA’s Catalog — Oracle and Microsoft Among Targets

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News