Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Cybercriminals Exploit X’s Grok AI to Bypass Ad Protections and Spread Malware to Millions

Posted on September 4, 2025September 4, 2025 By CWS

Sep 04, 2025Ravie LakshmananArtificial Intelligence / Malware
Cybersecurity researchers have flagged a brand new method that cybercriminals have adopted to bypass social media platform X’s malvertising protections and propagate malicious hyperlinks utilizing its synthetic intelligence (AI) assistant Grok.
The findings have been highlighted by Nati Tal, head of Guardio Labs, in a collection of posts on X. The method has been codenamed Grokking.
The method is designed to get round restrictions imposed by X in Promoted Adverts that enable customers to solely embrace textual content, pictures, or movies, and subsequently amplify them to a broader viewers, attracting lots of of 1000’s of impressions by paid promotion.
To realize this, malvertisers have been discovered to run video card-promoted posts with grownup content material as bait, with the spurious hyperlink hidden within the “From:” metadata discipline beneath the video participant that apparently is not scanned by the social media platform.
Within the subsequent step, the fraudsters tag Grok in replies to the put up, asking one thing much like “the place is that this video from?,” prompting the AI chatbot to visibly show the hyperlink in response.
“Including to that, it’s now amplified in search engine optimization and area repute – in any case, it was echoed by Grok on a put up with tens of millions of impressions,” Tal mentioned.

“A malicious hyperlink that X explicitly prohibits in advertisements (and may have been blocked completely!) abruptly seems in a put up by the system-trusted Grok account, sitting below a viral promoted thread and spreading straight into tens of millions of feeds and search outcomes!”
Guardio mentioned the hyperlinks direct customers to sketchy advert networks, sending them to malicious hyperlinks that push pretend CAPTCHA scams, information-stealing malware, and different suspicious content material by way of direct hyperlink (aka smartlink) monetization.
The domains are assessed to be a part of the identical Site visitors Distribution System (TDS), which is commonly utilized by malicious advert tech distributors to route site visitors to dangerous or misleading content material.
The cybersecurity firm advised The Hacker Information it has discovered lots of of accounts partaking on this conduct over the previous few days, with every of them posting lots of and even 1000’s of comparable posts.
“They appear to be posting continuous for a number of days till the account will get suspended for violating platform insurance policies,” it added. “So there are positively a lot of them and it appears very organized.”

The Hacker News Tags:Bypass, Cybercriminals, Exploit, Grok, Malware, Millions, Protections, Spread

Post navigation

Previous Post: Google Fined $379 Million by French Regulator for Cookie Consent Violations
Next Post: US, Allies Push for SBOMs to Bolster Cybersecurity

Related Posts

Password Manager Flaws, Apple 0-Day, Hidden AI Prompts, In-the-Wild Exploits & More The Hacker News
EncryptHub Targets Web3 Developers Using Fake AI Platforms to Deploy Fickle Stealer Malware The Hacker News
Nation-State Hacks, Spyware Alerts, Deepfake Malware, Supply Chain Backdoors The Hacker News
⚡ Weekly Recap — SharePoint Breach, Spyware, IoT Hijacks, DPRK Fraud, Crypto Drains and More The Hacker News
Microsoft Releases Urgent Patch for SharePoint RCE Flaw Exploited in Ongoing Cyber Attacks The Hacker News
Gold Melody IAB Exploits Exposed ASP.NET Machine Keys for Unauthorized Access to Targets The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • AI Supply Chain Attack Method Demonstrated Against Google, Microsoft Products
  • US Offers $10 Million for Three Russian Energy Firm Hackers
  • Sola Security Raises $35M to Bring No-Code App Building to Cybersecurity Teams
  • Hackers Leverage X’s Grok AI To Amplify Malicious Links Via Promoted Posts
  • US, Allies Push for SBOMs to Bolster Cybersecurity

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • AI Supply Chain Attack Method Demonstrated Against Google, Microsoft Products
  • US Offers $10 Million for Three Russian Energy Firm Hackers
  • Sola Security Raises $35M to Bring No-Code App Building to Cybersecurity Teams
  • Hackers Leverage X’s Grok AI To Amplify Malicious Links Via Promoted Posts
  • US, Allies Push for SBOMs to Bolster Cybersecurity

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News