Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Cybercriminals Exploit X’s Grok AI to Bypass Ad Protections and Spread Malware to Millions

Cybercriminals Exploit X’s Grok AI to Bypass Ad Protections and Spread Malware to Millions

Posted on September 4, 2025September 4, 2025 By CWS

Sep 04, 2025Ravie LakshmananArtificial Intelligence / Malware
Cybersecurity researchers have flagged a brand new method that cybercriminals have adopted to bypass social media platform X’s malvertising protections and propagate malicious hyperlinks utilizing its synthetic intelligence (AI) assistant Grok.
The findings have been highlighted by Nati Tal, head of Guardio Labs, in a collection of posts on X. The method has been codenamed Grokking.
The method is designed to get round restrictions imposed by X in Promoted Adverts that enable customers to solely embrace textual content, pictures, or movies, and subsequently amplify them to a broader viewers, attracting lots of of 1000’s of impressions by paid promotion.
To realize this, malvertisers have been discovered to run video card-promoted posts with grownup content material as bait, with the spurious hyperlink hidden within the “From:” metadata discipline beneath the video participant that apparently is not scanned by the social media platform.
Within the subsequent step, the fraudsters tag Grok in replies to the put up, asking one thing much like “the place is that this video from?,” prompting the AI chatbot to visibly show the hyperlink in response.
“Including to that, it’s now amplified in search engine optimization and area repute – in any case, it was echoed by Grok on a put up with tens of millions of impressions,” Tal mentioned.

“A malicious hyperlink that X explicitly prohibits in advertisements (and may have been blocked completely!) abruptly seems in a put up by the system-trusted Grok account, sitting below a viral promoted thread and spreading straight into tens of millions of feeds and search outcomes!”
Guardio mentioned the hyperlinks direct customers to sketchy advert networks, sending them to malicious hyperlinks that push pretend CAPTCHA scams, information-stealing malware, and different suspicious content material by way of direct hyperlink (aka smartlink) monetization.
The domains are assessed to be a part of the identical Site visitors Distribution System (TDS), which is commonly utilized by malicious advert tech distributors to route site visitors to dangerous or misleading content material.
The cybersecurity firm advised The Hacker Information it has discovered lots of of accounts partaking on this conduct over the previous few days, with every of them posting lots of and even 1000’s of comparable posts.
“They appear to be posting continuous for a number of days till the account will get suspended for violating platform insurance policies,” it added. “So there are positively a lot of them and it appears very organized.”

The Hacker News Tags:Bypass, Cybercriminals, Exploit, Grok, Malware, Millions, Protections, Spread

Post navigation

Previous Post: Google Fined $379 Million by French Regulator for Cookie Consent Violations
Next Post: US, Allies Push for SBOMs to Bolster Cybersecurity

Related Posts

The Secret Defense Strategy of Four Critical Industries Combating Advanced Cyber Threats The Secret Defense Strategy of Four Critical Industries Combating Advanced Cyber Threats The Hacker News
Bitfinex Hack Convict Ilya Lichtenstein Released Early Under U.S. First Step Act Bitfinex Hack Convict Ilya Lichtenstein Released Early Under U.S. First Step Act The Hacker News
ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services The Hacker News
How to Browse the Web More Sustainably With a Green Browser How to Browse the Web More Sustainably With a Green Browser The Hacker News
Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm The Hacker News
Russia-Aligned Hackers Abuse Viber to Target Ukrainian Military and Government Russia-Aligned Hackers Abuse Viber to Target Ukrainian Military and Government The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark