Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
AI Assistants Exploited as Malware Command Channels

AI Assistants Exploited as Malware Command Channels

Posted on February 17, 2026 By CWS

Cybersecurity experts have unveiled a new threat, revealing that artificial intelligence (AI) assistants with web browsing capabilities can be manipulated to serve as covert command-and-control (C2) channels for malware. This technique, demonstrated on platforms like Microsoft Copilot and xAI Grok, enables attackers to mask their operations within legitimate enterprise communications, thereby evading detection.

AI as a Covert Communication Tool

The method, termed ‘AI as a C2 proxy’ by Check Point, utilizes the integration of anonymous web access with browsing and summarization prompts. This approach allows adversaries to employ AI systems not only to accelerate cyber attack phases but also to dynamically generate malicious code that adapts based on data from compromised hosts.

AI tools have already amplified the capabilities of cybercriminals, assisting in reconnaissance, crafting phishing emails, and debugging code. However, using AI as a C2 proxy represents a significant advancement, as it transforms these systems into two-way communication channels by retrieving and responding to attacker-controlled URLs without needing an API key or account registration.

Challenges in Detection and Prevention

This strategy mirrors traditional tactics that exploit trusted services for malware distribution, often described as living-off-trusted-sites (LOTS). The technique requires initial compromise of a target machine to deploy malware, which then uses AI tools as communication conduits to relay commands from attacker servers.

Check Point highlights the potential for attackers to not only generate commands but also to develop evasion strategies using AI outputs to assess the value of further exploitation. The AI services can thus function as a decision engine, paving the way for automated, AI-driven malware operations.

Broader Implications for Cybersecurity

The disclosure follows a similar revelation by Palo Alto Networks Unit 42, which demonstrated how client-side API calls to trusted large language model (LLM) services can dynamically generate malicious scripts, transforming benign web pages into phishing sites. This method, akin to Last Mile Reassembly (LMR) attacks, involves assembling malware directly within the victim’s browser, bypassing traditional security measures.

Researchers warn that attackers could manipulate AI safety protocols to generate harmful code snippets, which are then executed in the victim’s environment. This underscores the growing complexity and sophistication of AI-enabled cyber threats, necessitating enhanced vigilance and new security strategies to counteract these evolving risks.

As AI continues to play a pivotal role in cyber operations, understanding and mitigating its misuse becomes critical. Organizations must adapt to this new landscape, ensuring robust defenses against AI-facilitated attack vectors.

The Hacker News Tags:AI abuse, AI security, AI tools, API threats, C2 proxies, Check Point, Copilot, cyber attack, Cybersecurity, Grok, LOTS, machine learning, malware threats, network security, Phishing

Post navigation

Previous Post: How CISOs Leverage Threat Intelligence to Prevent Breaches
Next Post: QR Codes Exploited in Rising Phishing and App Threats

Related Posts

Deepfakes. Fake Recruiters. Cloned CFOs — Learn How to Stop AI-Driven Attacks in Real Time Deepfakes. Fake Recruiters. Cloned CFOs — Learn How to Stop AI-Driven Attacks in Real Time The Hacker News
Why Unmonitored JavaScript Is Your Biggest Holiday Security Risk Why Unmonitored JavaScript Is Your Biggest Holiday Security Risk The Hacker News
RubyGems, PyPI Hit by Malicious Packages Stealing Credentials, Crypto, Forcing Security Changes RubyGems, PyPI Hit by Malicious Packages Stealing Credentials, Crypto, Forcing Security Changes The Hacker News
Google Patches 120 Flaws, Including Two Zero-Days Under Attack Google Patches 120 Flaws, Including Two Zero-Days Under Attack The Hacker News
CISA Highlights Exploited Vulnerabilities in Key Software CISA Highlights Exploited Vulnerabilities in Key Software The Hacker News
Watch This Webinar to Uncover Hidden Flaws in Login, AI, and Digital Trust — and Fix Them Watch This Webinar to Uncover Hidden Flaws in Login, AI, and Digital Trust — and Fix Them The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Node.js Developers Face Advanced Social Engineering Threat
  • Hackers Exploit Code Leak to Spread Malware via GitHub
  • Fortinet Issues Patch for Critical FortiClient EMS Vulnerability
  • Progress ShareFile Flaws Risk Server Takeover
  • European Commission Data Breach from Trivy Attack Unveiled

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Node.js Developers Face Advanced Social Engineering Threat
  • Hackers Exploit Code Leak to Spread Malware via GitHub
  • Fortinet Issues Patch for Critical FortiClient EMS Vulnerability
  • Progress ShareFile Flaws Risk Server Takeover
  • European Commission Data Breach from Trivy Attack Unveiled

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark